TEE-AIDED WRITE PROTECTION AGAINST PRIVILEGED DATA TAMPERING

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Network and Distributed System Security Symposium (26. : 2019 : San Diego, Calif.) Network and Distributed System Security Symposium 2019 ; Volume 2 of 2
1. Verfasser: Zhao, Lianying (VerfasserIn)
Weitere Verfasser: Mannan, Mohammad (VerfasserIn)
Pages:2019
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
UNVEILING YOUR KEYSTROKES: A CACHE-BASED SIDE-CHANNEL ATTACK ON GRAPHICS LIBRARIES 2020 Wang, Daimeng
COMPONENT-BASED FORMAL ANALYSIS OF 5G-AKA: CHANNEL ASSUMPTIONS AND SESSION CONFUSION 2020 Cremers, Cas
A SYSTEMATIC FRAMEWORK TO GENERATE INVARIANTS FOR ANOMALY DETECTION IN INDUSTRIAL CONTROL SYSTEMS 2020 Feng, Cheng
CONCURORAM: HIGH-THROUGHPUT STATELESS PARALLEL MULTI-CLIENT ORAM 2020 Chakraborti, Anrin
THE CRUX OF VOICE (IN)SECURITY: A BRAIN STUDY OF SPEAKER LEGITIMACY DETECTION 2020 Neupane, Ajaya
PRACTICAL HIDDEN VOICE ATTACKS AGAINST SPEECH AND SPEAKER RECOGNITION SYSTEMS 2020 Abdullah, Hadi
CYBERCRIMINAL MINDS: AN INVESTIGATIVE STUDY OF CRYPTOCURRENCY ABUSES IN THE DARK WEB 2020 Lee, Seunghyeon
ANONYMOUS MULTI-HOP LOCKS FOR BLOCKCHAIN SCALABILITY AND INTEROPERABILITY 2020 Malavolta, Giulio
SEREUM: PROTECTING EXISTING SMART CONTRACTS AGAINST RE-ENTRANCY ATTACKS 2020 Rodler, Michael
TEE-AIDED WRITE PROTECTION AGAINST PRIVILEGED DATA TAMPERING 2020 Zhao, Lianying
GRAPH-BASED SECURITY AND PRIVACY ANALYTICS VIA COLLECTIVE CLASSIFICATION WITH JOINT WEIGHT LEARNING AND PROPAGATION 2020 Wang, Binghui
DATA OBLIVIOUS ISA EXTENSIONS FOR SIDE CHANNEL-RESISTANT AND HIGH PERFORMANCE COMPUTING 2020 Yu, Jiyong
COCONUT: THRESHOLD ISSUANCE SELECTIVE DISCLOSURE CREDENTIALS WITH APPLICATIONS TO DISTRIBUTED LEDGERS 2020 Sonnino, Alberto
HOW TO END PASSWORD REUSE ON THE WEB 2020 Wang, Ke Coby
UWB WITH PULSE REORDERING: SECURING RANGING AGAINST RELAY AND PHYSICAL-LAYER ATTACKS 2020 Singh, Mridula
NEARBY THREATS: REVERSING, ANALYZING, AND ATTACKING GOOGLE'S 'NEARBY CONNECTIONS' ON ANDROID 2020 Antonioli, Daniele
RORAM: EFFICIENT RANGE ORAM WITH O(LOG2 N) LOCALITY 2020 Chakraborti, Anrin
PRIVATE CONTINUAL RELEASE OF REAL-VALUED DATA STREAMS 2020 Perrier, Victor
VAULT: FAST BOOTSTRAPPING FOR THE ALGORAND CRYPTOCURRENCY 2020 Leung, Derek
ESTABLISHING SOFTWARE ROOT OF TRUST UNCONDITIONALLY 2020 Gligor, Virgil D.
Alle Artikel auflisten