ENABLING CLIENT-SIDE CRASH-RESISTANCE TO OVERCOME DIVERSIFICATION AND INFORMATION HIDING

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Network and Distributed System Security Symposium (23. : 2016 : San Diego, Calif.) Network and Distributed System Security Symposium 2016 (NDSS '16) ; Volume 2 of 2
1. Verfasser: Gawlik, Robert (VerfasserIn)
Weitere Verfasser: Kollenda, Benjamin (VerfasserIn), Koppe, Philipp (VerfasserIn), Garmany, Behrad (VerfasserIn), Holz, Thorsten (VerfasserIn)
Pages:2016
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
SKEE: A LIGHTWEIGHT SECURE KERNEL-LEVEL EXECUTION ENVIRONMENT FOR ARM 2020 Azab, Ahmed
DO YOU SEE WHAT ISEE? DIFFERENTIAL TREATMENT OF ANONYMOUS USERS 2020 Khattak, Sheharbano
EXTRACT ME IF YOU CAN: ABUSING PDF PARSERS IN MALWARE DETECTORS 2020 Carmony, Curtis
ENABLING CLIENT-SIDE CRASH-RESISTANCE TO OVERCOME DIVERSIFICATION AND INFORMATION HIDING 2020 Gawlik, Robert
GOING NATIVE: USING A LARGE-SCALE ANALYSIS OF ANDROID APPS TO CREATE A PRACTICAL NATIVE-CODE SANDBOXING POLICY 2020 Afonso, Vitor
LIFE AFTER APP UNINSTALLATION: ARE THE DATA STILL ALIVE? DATA RESIDUE ATTACKS ON ANDROID 2020 Zhang, Xiao
INTELLIDROID: A TARGETED INPUT GENERATOR FOR THE DYNAMIC ANALYSIS OF ANDROID MALWARE 2020 Wong, Michelle Y.
AUTOMATIC FORGERY OF CRYPTOGRAPHICALLY CONSISTENT MESSAGES TO IDENTIFY SECURITY VULNERABILITIES IN MOBILE SERVICES 2020 Zuo, Chaoshun
HARVESTING RUNTIME VALUES IN ANDROID APPLICATIONS THAT FEATURE ANTI-ANALYSIS TECHNIQUES 2020 Rasthofer, Siegfried
PITFALLS IN DESIGNING ZERO-EFFORT DEAUTHENTICATION: OPPORTUNISTIC HUMAN OBSERVATION ATTACKS 2020 Huhta, Otto
WHO’S IN CONTROL OF YOUR CONTROL SYSTEM? DEVICE FINGERPRINTING FOR CYBER-PHYSICAL SYSTEMS 2020 Formby, David
OPENSGX: AN OPEN PLATFORM FOR SGX RESEARCH 2020 Jain, Prerit
PRIVACY-PRESERVING SHORTEST PATH COMPUTATION 2020 Wu, David J.
AUTOMATICALLY EVADING CLASSIFIERS: A CASE STUDY ON PDF MALWARE CLASSIFIERS 2020 Xu, Weilin
LO-PHI: LOW-OBSERVABLE PHYSICAL HOST INSTRUMENTATION FOR MALWARE ANALYSIS 2020 Spensky, Chad
LEAKAGE-RESILIENT LAYOUT RANDOMIZATION FOR MOBILE DEVICES 2020 Braden, Kjell
KRATOS: DISCOVERING INCONSISTENT SECURITY POLICY ENFORCEMENT IN THE ANDROID FRAMEWORK 2020 Shao, Yuru
ENFORCING KERNEL SECURITY INVARIANTS WITH DATA FLOW INTEGRITY 2020 Song, Chengyu
DIFFERENTIALLY PRIVATE PASSWORD FREQUENCY LISTS 2020 Blocki, Jeremiah
EFFICIENT PRIVATE STATISTICS WITH SUCCINCT SKETCHES 2020 Melis, Luca
Alle Artikel auflisten