GENOTYPE EXTRACTION AND FALSE RELATIVE ATTACKS: SECURITY RISKS TO THIRD-PARTY GENETIC GENEALOGY SERVICES BEYOND IDENTITY INFERENCE

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Network and Distributed System Security Symposium (27. : 2020 : San Diego, Calif.) Network and Distributed System Security Symposium 2020 ; Volume 2 of 2
1. Verfasser: Ney, Peter (VerfasserIn)
Weitere Verfasser: Ceze, Luis (VerfasserIn), Kohno, Tadayoshi (VerfasserIn)
Pages:2020
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
BLAG: IMPROVING THE ACCURACY OF BLACKLISTS 2020 Ramanathan, Sivaramakrishnan
REVISITING LEAKAGE ABUSE ATTACKS 2020 Blackstone, Laura
METAL: A METADATA-HIDING FILE-SHARING SYSTEM 2020 Chen, Weikeng
DYNAMIC SEARCHABLE ENCRYPTION WITH SMALL CLIENT STORAGE 2020 Demertzis, Ioannis
IMPA4GT: IMPERSONATION ATTACKS IN 4G NETWORKS 2020 Rupprecht, David
DEEPBINDIFF: LEARNING PROGRAM-WIDE CODE REPRESENTATIONS FOR BINARY DIFFING 2020 Duan, Yue
PRECISELY CHARACTERIZING SECURITY IMPACT IN A FLOOD OF PATCHES VIA SYMBOLIC RULE COMPARISON 2020 Wu, Qiushi
OMEGALOG: HIGH-FIDELITY ATTACK INVESTIGATION VIA TRANSPARENT MULTI-LAYER LOG ANALYSIS 2020 Hassan, Wajih Ul
TRIDENT: EFFICIENT 4PC FRAMEWORK FOR PRIVACY PRESERVING MACHINE LEARNING 2020 Chaudhari, Harsh
WHEN MALWARE IS PACKIN' HEAT; LIMITS OF MACHINE LEARNING CLASSIFIERS BASED ON STATIC ANALYSIS FEATURES 2020 Aghakhani, Hojjat
COMPLEX SECURITY POLICY? A LONGITUDINAL ANALYSIS OF DEPLOYED CONTENT SECURITY POLICIES 2020 Roth, Sebastian
PROOF OF STORAGE-TIME: EFFICIENTLY CHECKING CONTINUOUS DATA AVAILABILTIY 2020 Ateniese, Giuseppe
TOWARDS PLAUSIBLE GRAPH ANONYMIZATION 2020 Zhang, Yang
DESENSITIZATION: PRIVACY-AWARE AND ATTACK-PRESERVING CRASH REPORT 2020 Ding, Ren
DEFREC: ESTABLISHING PHYSICAL FUNCTION VIRTUALIZATION TO DISRUPT RECONNAISSANCE OF POWER GRIDS' CYBER-PHYSICAL INFRASTRUCTURES 2020 Lin, Hui
YOU ARE WHAT YOU DO: HUNTING STEALTHY MALWARE VIA DATA PROVENANCE ANALYSIS 2020 Wang, Qi
STRONG AUTHENTICATION WITHOUT TEMPER-RESISTANT HARDWARE AND APPLICATION TO FEDERATED IDENTITIES 2020 Zhang, Zhenfeng
COMPLIANCE CAUTIONS: INVESTIGATING SECURITY ISSUES ASSOCIATED WITH U.S. DIGITAL-SECURITY STANDARDS 2020 Stevens, Rock
SPEECHMINER: A FRAMEWORK FOR INVESTIGATING AND MEASURING SPECULATIVE EXECUTION VULNERABILITIES 2020 Xiao, Yuan
CONTEXT: A GENERIC APPROACH FOR MITIGATING SPECTRE 2020 Schwarz, Michael
Alle Artikel auflisten