K-MINER: UNCOVERING MEMORY CORRUPTION IN LINUX

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Network and Distributed System Security Symposium (25. : 2018 : San Diego, Calif.) Network and Distributed System Security Symposium 2018 ; Volume 1 of 2
1. Verfasser: Gens, David (VerfasserIn)
Weitere Verfasser: Schmitt, Simon (VerfasserIn), Davi, Lucas (VerfasserIn), Sadeghi, Ahmad-Reza (VerfasserIn)
Pages:2018
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
RTCAPTCHA: A REAL-TIME CAPTCHA BASED LIVENESS DETECTION SYSTEM 2020 Uzun, Erkam
MIND YOUR KEYS? A SECURITY EVALUATION OF JAVA KEYSTORES 2020 Focardi, Riccardo
FEATURE SQUEEZING: DETECTING ADVERSARIAL EXAMPLES IN DEEP NEURAL NETWORKS 2020 Xu, Weilin
DEVICE PAIRING AT THE TOUCH OF AN ELECTRODE 2020 Roeschlin, Marc
FACE FLASHING: A SECURE LIVENESS DETECTION PROTOCOL BASED ON LIGHT REFLECTIONS 2020 Tang, Di
TOWARDS MEASURING THE EFFECTIVENESS OF TELEPHONY BLACKLISTS 2020 Pandit, Sharbani
AUTOMATED GENERATION OF EVENT-ORIENTED EXPLOITS IN ANDROID HYBRID APPS 2020 Yang, Guangliang
K-MINER: UNCOVERING MEMORY CORRUPTION IN LINUX 2020 Gens, David
FEAR AND LOGGING IN THE INTERNET OF THINGS 2020 Wang, Qi
PREVENTING (NETWORK) TIME TRAVEL WITH CHRONOS 2020 Deutsch, Omer
GUTI REALLOCATION DEMYSTIFIED: CELLULAR LOCATION TRACKING WITH CHANGING TEMPORARY IDENTIFIER 2020 Hong, Byeongdo
AUTOMATED WEBSITE FINGERPRINTING THROUGH DEEP LEARNING 2020 Rimmer, Vera
ZEROTRACE : OBLIVIOUS MEMORY PRIMITIVES FROM INTEL SGX 2020 Sasy, Sajin
THINGS YOU MAY NOT KNOW ABOUT ANDROID (UN)PACKERS: A SYSTEMATIC STUDY BASED ON WHOLE-SYSTEM EMULATION 2020 Duan, Yue
SECURING REAL-TIME MICROCONTROLLER SYSTEMS THROUGH CUSTOMIZED MEMORY VIEW SWITCHING 2020 Kim, Chung Hwan
WHAT YOU CORRUPT IS NOT YOU CRASH: CHALLENGES IN FUZZING EMBEDDED DEVICES 2020 Muench, Marius
EXPOSING CONGESTION ATTACK ON EMERGING CONNECTED VEHICLE BASED TRAFFIC SIGNAL CONTROL 2020 Chen, Qi Alfred
DIDN'T YOU HEAR ME? – TOWARDS MORE SUCCESSFUL WEB VULNERABILITY NOTIFICATIONS 2020 Stock, Ben
REMOVING SECRETS FROM ANDROID'S TLS 2020 Lee, Jaeho
AUTOMATED ATTACK DISCOVERY IN TCP CONGESTION CONTROL USING A MODEL-GUIDED APPROACH 2020 Jero, Samuel
Alle Artikel auflisten