COMPONENT-BASED FORMAL ANALYSIS OF 5G-AKA: CHANNEL ASSUMPTIONS AND SESSION CONFUSION

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Network and Distributed System Security Symposium (26. : 2019 : San Diego, Calif.) Network and Distributed System Security Symposium 2019 ; Volume 2 of 2
1. Verfasser: Cremers, Cas (VerfasserIn)
Weitere Verfasser: Dehnel-Wild, Martin (VerfasserIn)
Pages:2019
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
CODEALCHEMIST: SEMANTICS-AWARE CODE GENERATION TO FIND VULNERABILITIES IN JAVASCRIPT ENGINES 2020 Han, Hyungseok
PROFIT: DETECTING AND QUANTIFYING SIDE CHANNELS IN NETWORKED APPLICATIONS 2020 Rosner, Nicolás
UNDERSTANDING OPEN PORTS IN ANDROID APPLICATIONS: DISCOVERY, DIAGNOSIS, AND SECURITY ASSESSMENT 2020 Wu, Daoyuan
BADBLUETOOTH: BREAKING ANDROID SECURITY MECHANISMS VIA MALICIOUS BLUETOOTH PERIPHERALS 2020 Xu, Fenghao
IOTGUARD: DYNAMIC ENFORCEMENT OF SECURITY AND SAFETY POLICY IN COMMODITY IOT 2020 Celik, Z. Berkay
ICSREF: A FRAMEWORK FOR AUTOMATED REVERSE ENGINEERING OF INDUSTRIAL CONTROL SYSTEMS BINARIES 2020 Keliris, Anastasis
STATISTICAL PRIVACY FOR STREAMING TRAFFIC 2020 Zhang, Xiaokuan
ADVERSARIAL ATTACKS AGAINST AUTOMATIC SPEECH RECOGNITION SYSTEMS VIA PSYCHOACOUSTIC HIDING 2020 Schönherr, Lea
TIMBER-V: TAG-ISOLATED MEMORY BRINGING FINE-GRAINED ENCLAVES TO RISC-V 2020 Weiser, Samuel
ENEMY AT THE GATEWAYS: CENSORSHIP-RESILIENT PROXY DISTRIBUTION USING GAME THEORY 2020 Nasr, Milad
NEURAL MACHINE TRANSLATION INSPIRED BINARY CODE SIMILARITY COMPARISON BEYOND FUNCTION PAIRS 2020 Zuo, Fei
UNVEILING YOUR KEYSTROKES: A CACHE-BASED SIDE-CHANNEL ATTACK ON GRAPHICS LIBRARIES 2020 Wang, Daimeng
COMPONENT-BASED FORMAL ANALYSIS OF 5G-AKA: CHANNEL ASSUMPTIONS AND SESSION CONFUSION 2020 Cremers, Cas
A SYSTEMATIC FRAMEWORK TO GENERATE INVARIANTS FOR ANOMALY DETECTION IN INDUSTRIAL CONTROL SYSTEMS 2020 Feng, Cheng
CONCURORAM: HIGH-THROUGHPUT STATELESS PARALLEL MULTI-CLIENT ORAM 2020 Chakraborti, Anrin
THE CRUX OF VOICE (IN)SECURITY: A BRAIN STUDY OF SPEAKER LEGITIMACY DETECTION 2020 Neupane, Ajaya
PRACTICAL HIDDEN VOICE ATTACKS AGAINST SPEECH AND SPEAKER RECOGNITION SYSTEMS 2020 Abdullah, Hadi
CYBERCRIMINAL MINDS: AN INVESTIGATIVE STUDY OF CRYPTOCURRENCY ABUSES IN THE DARK WEB 2020 Lee, Seunghyeon
ANONYMOUS MULTI-HOP LOCKS FOR BLOCKCHAIN SCALABILITY AND INTEROPERABILITY 2020 Malavolta, Giulio
SEREUM: PROTECTING EXISTING SMART CONTRACTS AGAINST RE-ENTRANCY ATTACKS 2020 Rodler, Michael
Alle Artikel auflisten