Towards Transparent Control-Flow Integrity in Safety-Critical Systems

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Information Security Conference (23. : 2020 : Online) Information security
1. Verfasser: Kuzhiyelil, Don (VerfasserIn)
Weitere Verfasser: Zieris, Philipp (VerfasserIn), Kadar, Marine (VerfasserIn), Tverdyshev, Sergey (VerfasserIn), Fohler, Gerhard (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Anonymous IBE from Quadratic Residuosity with Fast Encryption 2020 Zhao, Xiaopeng
Rotational Cryptanalysis of Salsa Core Function 2020 Ito, Ryoma
Analyzing the Chain of Trust Model Based on Entity Dependence 2020 Cheng, Ge
Evaluation on the Security of Commercial Cloud Container Services 2020 Wu, Yifei
Why Current Statistical Approaches to Ransomware Detection Fail 2020 Pont, Jamie
Characterizing Erasable Accounts in Ethereum 2020 Li, Xiaoqi
Walls Have Ears: Eavesdropping User Behaviors via Graphics-Interrupt-Based Side Channel 2020 Ma, Haoyu
A Framework for Estimating Privacy Risk Scores of Mobile Apps 2020 Chang, Kai Chih
Towards Transparent Control-Flow Integrity in Safety-Critical Systems 2020 Kuzhiyelil, Don
Privacy-Preserving Computation of the Earth Mover’s Distance 2020 Blanco-Justicia, Alberto
Time-Specific Signatures 2020 Ishizaka, Masahito
Two-Server Verifiable Homomorphic Secret Sharing for High-Degree Polynomials 2020 Chen, Xin
Integerwise Functional Bootstrapping on TFHE 2020 Okada, Hiroki
Minimal Rare-Pattern-Based Outlier Detection Method for Data Streams by Considering Anti-monotonic Constraints 2020 Cai, Saihua
BlockVoke – Fast, Blockchain-Based Certificate Revocation for PKIs and the Web of Trust 2020 Garba, Abba
Compatible Certificateless and Identity-Based Cryptosystems for Heterogeneous loT 2020 Behnia, Rouzbeh
Public-PEZ Cryptography 2020 Murata, Soma
Searching for Balanced S-Boxes with High Nonlinearity, Low Differential Uniformity, and Improved DPA-Resistance 2020 Xu, Youle
On the Struggle Bus: A Detailed Security Analysis of the m-tickets App 2020 Maroto, Jorge Sanz
ELD: Adaptive Detection of Malicious Nodes under Mix-Energy-Depleting-Attacks Using Edge Learning in IoT Networks 2020 Ma, Zuchao
Alle Artikel auflisten