LIFE AFTER SPEECH RECOGNITION: FUZZING SEMANTIC MISINTERPRETATION FOR VOICE ASSISTANT APPLICATIONS

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Network and Distributed System Security Symposium (26. : 2019 : San Diego, Calif.) Network and Distributed System Security Symposium 2019 ; Volume 2 of 2
1. Verfasser: Zhang, Yangyong (VerfasserIn)
Weitere Verfasser: Xu, Lei (VerfasserIn), Mendoza, Abner (VerfasserIn), Yang, Guangliang (VerfasserIn), Chinprutthiwong, Phakpoom (VerfasserIn), Gu, Guofei (VerfasserIn)
Pages:2019
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
CRCOUNT: POINTER INVALIDATION WITH REFERENCE COUNTING TO MITIGATE USE-AFTER-FREE IN LEGACY C/C++ 2020 Shin, Jangseop
AUTOMATING PATCHING OF VULNERABLE OPEN-SOURCE SOFTWARE VERSIONS IN APPLICATION BINARIES 2020 Duan, Ruian
OLIGO-SNOOP: A NON-INVASIVE SIDE CHANNEL ATTACK AGAINST DNA SYNTHESIS MACHINES 2020 Faezi, Sina
PRIVACY ATTACKS TO THE 4G AND 5G CELLULAR PAGING PROTOCOLS USING SIDE CHANNEL INFORMATION 2020 Hussain, Syed Rafiul
TOTAL RECALL: PERSISTENCE OF PASSWORDS IN ANDROID 2020 Lee, Jaeho
DISTINGUISHING ATTACKS FROM LEGITIMATE AUTHENTICATION TRAFFIC AT SCALE 2020 Herley, Cormac
ROBUST PERFORMANCE METRICS FOR AUTHENTICATION SYSTEMS 2020 Sugrim, Shridatt
RFDIDS: RADIO FREQUENCY-BASED DISTRIBUTED INTRUSION DETECTION SYSTEM FOR THE POWER GRID 2020 Shekari, Tohid
DIAT: DATA INTEGRITY ATTESTATION FOR RESILIENT COLLABORATION OF AUTONOMOUS SYSTEM 2020 Abera, Tigist
BALANCING IMAGE PRIVACY AND USABILITY WITH THUMBNAIL-PRESERVING ENCRYPTION 2020 Tajik, Kimia
LIFE AFTER SPEECH RECOGNITION: FUZZING SEMANTIC MISINTERPRETATION FOR VOICE ASSISTANT APPLICATIONS 2020 Zhang, Yangyong
CONSTRUCTING AN ADVERSARY SOLVER FOR EQUIHASH 2020 Bai, Xiaofei
OBFUSCURO: A COMMODITY OBFUSCATION ENGINE ON INTEL SGX 2020 Ahmad, Adil
DATA OBLIVIOUS ISA EXTENSIONS FOR SIDE CHANNEL-RESISTANT AND HIGH PERFORMANCE COMPUTING 2020 Yu, Jiyong
COCONUT: THRESHOLD ISSUANCE SELECTIVE DISCLOSURE CREDENTIALS WITH APPLICATIONS TO DISTRIBUTED LEDGERS 2020 Sonnino, Alberto
HOW TO END PASSWORD REUSE ON THE WEB 2020 Wang, Ke Coby
UWB WITH PULSE REORDERING: SECURING RANGING AGAINST RELAY AND PHYSICAL-LAYER ATTACKS 2020 Singh, Mridula
NEARBY THREATS: REVERSING, ANALYZING, AND ATTACKING GOOGLE'S 'NEARBY CONNECTIONS' ON ANDROID 2020 Antonioli, Daniele
RORAM: EFFICIENT RANGE ORAM WITH O(LOG2 N) LOCALITY 2020 Chakraborti, Anrin
PRIVATE CONTINUAL RELEASE OF REAL-VALUED DATA STREAMS 2020 Perrier, Victor
Alle Artikel auflisten