CUSTOS: PRACTICAL TAMPER-EVIDENT AUDITING OF OPERATING SYSTEMS USING TRUSTED EXECUTION

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Network and Distributed System Security Symposium (27. : 2020 : San Diego, Calif.) Network and Distributed System Security Symposium 2020 ; Volume 2 of 2
1. Verfasser: Paccagnella, Riccardo (VerfasserIn)
Weitere Verfasser: Datta, Pubali (VerfasserIn), Hassan, Wajih Ul (VerfasserIn), Bates, Adam (VerfasserIn), Fletcher, Christopher W (VerfasserIn), Miller, Andrew (VerfasserIn), Tian, Dave (VerfasserIn)
Pages:2020
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
BLAG: IMPROVING THE ACCURACY OF BLACKLISTS 2020 Ramanathan, Sivaramakrishnan
REVISITING LEAKAGE ABUSE ATTACKS 2020 Blackstone, Laura
METAL: A METADATA-HIDING FILE-SHARING SYSTEM 2020 Chen, Weikeng
DYNAMIC SEARCHABLE ENCRYPTION WITH SMALL CLIENT STORAGE 2020 Demertzis, Ioannis
IMPA4GT: IMPERSONATION ATTACKS IN 4G NETWORKS 2020 Rupprecht, David
DEEPBINDIFF: LEARNING PROGRAM-WIDE CODE REPRESENTATIONS FOR BINARY DIFFING 2020 Duan, Yue
PRECISELY CHARACTERIZING SECURITY IMPACT IN A FLOOD OF PATCHES VIA SYMBOLIC RULE COMPARISON 2020 Wu, Qiushi
OMEGALOG: HIGH-FIDELITY ATTACK INVESTIGATION VIA TRANSPARENT MULTI-LAYER LOG ANALYSIS 2020 Hassan, Wajih Ul
TRIDENT: EFFICIENT 4PC FRAMEWORK FOR PRIVACY PRESERVING MACHINE LEARNING 2020 Chaudhari, Harsh
WHEN MALWARE IS PACKIN' HEAT; LIMITS OF MACHINE LEARNING CLASSIFIERS BASED ON STATIC ANALYSIS FEATURES 2020 Aghakhani, Hojjat
COMPLEX SECURITY POLICY? A LONGITUDINAL ANALYSIS OF DEPLOYED CONTENT SECURITY POLICIES 2020 Roth, Sebastian
PROOF OF STORAGE-TIME: EFFICIENTLY CHECKING CONTINUOUS DATA AVAILABILTIY 2020 Ateniese, Giuseppe
TOWARDS PLAUSIBLE GRAPH ANONYMIZATION 2020 Zhang, Yang
DESENSITIZATION: PRIVACY-AWARE AND ATTACK-PRESERVING CRASH REPORT 2020 Ding, Ren
EASI: EDGE-BASED SENDER IDENTIFICATION ON RESOURCE-CONSTRAINED PLATFORMS FOR AUTOMOTIVE NETWORKS 2020 Kneib, Marcel
MACAO: A MALICIOUSLY-SECURE AND CLIENT-EFFICIENT ACTIVE ORAM 2020 Hoang, Thang
HETEROGENEOUS PRIVATE INFORMATION RETRIEVAL 2020 Mozaffari, Hamid
CDN JUDO: BREAKING THE CDN DOS PROTECTION WITH ITSELF 2020 Guo, Run
UNICORN: RUNTIME PROVENANCE-BASED DETECTOR FOR ADVANCED PERSISTENT THREATS 2020 Han, Xueyuan
SECURE SUBLINEAR TIME DIFFERENTIALLY PRIVATE MEDIAN COMPUTATION 2020 Böhler, Jonas
Alle Artikel auflisten