TIMBER-V: TAG-ISOLATED MEMORY BRINGING FINE-GRAINED ENCLAVES TO RISC-V

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Network and Distributed System Security Symposium (26. : 2019 : San Diego, Calif.) Network and Distributed System Security Symposium 2019 ; Volume 2 of 2
1. Verfasser: Weiser, Samuel (VerfasserIn)
Weitere Verfasser: Werner, Mario (VerfasserIn), Brasser, Ferdinand (VerfasserIn), Malenko, Maja (VerfasserIn), Mangard, Stefan (VerfasserIn), Sadeghi, Ahmad- Reza (VerfasserIn)
Pages:2019
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
UNVEILING YOUR KEYSTROKES: A CACHE-BASED SIDE-CHANNEL ATTACK ON GRAPHICS LIBRARIES 2020 Wang, Daimeng
COMPONENT-BASED FORMAL ANALYSIS OF 5G-AKA: CHANNEL ASSUMPTIONS AND SESSION CONFUSION 2020 Cremers, Cas
A SYSTEMATIC FRAMEWORK TO GENERATE INVARIANTS FOR ANOMALY DETECTION IN INDUSTRIAL CONTROL SYSTEMS 2020 Feng, Cheng
CONCURORAM: HIGH-THROUGHPUT STATELESS PARALLEL MULTI-CLIENT ORAM 2020 Chakraborti, Anrin
THE CRUX OF VOICE (IN)SECURITY: A BRAIN STUDY OF SPEAKER LEGITIMACY DETECTION 2020 Neupane, Ajaya
PRACTICAL HIDDEN VOICE ATTACKS AGAINST SPEECH AND SPEAKER RECOGNITION SYSTEMS 2020 Abdullah, Hadi
CYBERCRIMINAL MINDS: AN INVESTIGATIVE STUDY OF CRYPTOCURRENCY ABUSES IN THE DARK WEB 2020 Lee, Seunghyeon
ANONYMOUS MULTI-HOP LOCKS FOR BLOCKCHAIN SCALABILITY AND INTEROPERABILITY 2020 Malavolta, Giulio
SEREUM: PROTECTING EXISTING SMART CONTRACTS AGAINST RE-ENTRANCY ATTACKS 2020 Rodler, Michael
TEE-AIDED WRITE PROTECTION AGAINST PRIVILEGED DATA TAMPERING 2020 Zhao, Lianying
GRAPH-BASED SECURITY AND PRIVACY ANALYTICS VIA COLLECTIVE CLASSIFICATION WITH JOINT WEIGHT LEARNING AND PROPAGATION 2020 Wang, Binghui
CRCOUNT: POINTER INVALIDATION WITH REFERENCE COUNTING TO MITIGATE USE-AFTER-FREE IN LEGACY C/C++ 2020 Shin, Jangseop
AUTOMATING PATCHING OF VULNERABLE OPEN-SOURCE SOFTWARE VERSIONS IN APPLICATION BINARIES 2020 Duan, Ruian
OLIGO-SNOOP: A NON-INVASIVE SIDE CHANNEL ATTACK AGAINST DNA SYNTHESIS MACHINES 2020 Faezi, Sina
PRIVACY ATTACKS TO THE 4G AND 5G CELLULAR PAGING PROTOCOLS USING SIDE CHANNEL INFORMATION 2020 Hussain, Syed Rafiul
TOTAL RECALL: PERSISTENCE OF PASSWORDS IN ANDROID 2020 Lee, Jaeho
DISTINGUISHING ATTACKS FROM LEGITIMATE AUTHENTICATION TRAFFIC AT SCALE 2020 Herley, Cormac
ROBUST PERFORMANCE METRICS FOR AUTHENTICATION SYSTEMS 2020 Sugrim, Shridatt
RFDIDS: RADIO FREQUENCY-BASED DISTRIBUTED INTRUSION DETECTION SYSTEM FOR THE POWER GRID 2020 Shekari, Tohid
DIAT: DATA INTEGRITY ATTESTATION FOR RESILIENT COLLABORATION OF AUTONOMOUS SYSTEM 2020 Abera, Tigist
Alle Artikel auflisten