DISCOVRE: EFFICIENT CROSS-ARCHITECTURE IDENTIFICATION OF BUGS IN BINARY CODE

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Network and Distributed System Security Symposium (23. : 2016 : San Diego, Calif.) Network and Distributed System Security Symposium 2016 (NDSS '16) ; Volume 1 of 2
1. Verfasser: Eschweiler, Sebastian (VerfasserIn)
Weitere Verfasser: Yakdan, Khaled (VerfasserIn), Gerhards-Padilla, Elmar (VerfasserIn)
Pages:2016
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
TLS IN THE WILD: AN INTERNET-WIDE ANALYSIS OF TLS-BASED PROTOCOLS FOR ELECTRONIC COMMUNICATION 2020 Holz, Ralph
IT'S FREE FOR A REASON: EXPLORING THE ECOSYSTEM OF FREE LIVE STREAMING SERVICES 2020 Rafique, M. Zubair
CROSSFIRE: AN ANALYSIS OF FIREFOX EXTENSION-REUSE VULNERABILITIES 2020 Buyukkayhan, Ahmet
TOWARDS SDN-DEFINED PROGRAMMABLE BYOD (BRING YOUR OWN DEVICE) SECURITY 2020 Hong, Sungmin
WHAT MOBILE ADS KNOW ABOUT MOBILE USERS 2020 Son, Sooel
PRACTICAL ATTACKS AGAINST PRIVACY AND AVAILABILITY IN 4G/LTE MOBILE COMMUNICATION SYSTEMS 2020 Shaik, Altaf
ATTACKING THE NETWORK TIME PROTOCOL 2020 Malhotra, Aanchal
SPIFFY: INDUCING COST-DETECTABILITY TRADEOFFS FOR PERSISTENT LINK-FLOODING ATTACKS 2020 Kang, Min Suk
PROTECTING C++ DYNAMIC DISPATCH THROUGH VTABLE INTERLEAVING 2020 Bounov, Dimitar
TRANSCRIPT COLLISION ATTACKS: BREAKING AUTHENTICATION IN TLS, IKE AND SSH 2020 Bhargavan, Karthikeyan
KILLED BY PROXY: ANALYZING CLIENT-END TLS INTERCEPTION SOFTWARE 2020 Carnavalet, Xavier De Carné De
DON'T FORGET TO LOCK THE BACK DOOR! A CHARACTERIZATION OF IPV6 NETWORK SECURITY POLICY 2020 Czyz, Jakub
ARE THESE ADS SAFE: DETECTING HIDDEN ATTACKS THROUGH THE MOBILE APP-WEB INTERFACES 2020 Rastogi, Vaibhav
ATTACK PATTERNS FOR BLACK-BOX SECURITY TESTING OF MULTI-PARTY WEB APPLICATIONS 2020 Sudhodanan, Avinash
FORWARDING-LOOP ATTACKS IN CONTENT DELIVERY NETWORKS 2020 Chen, Jianjun
EQUIHASH: ASYMMETRIC PROOF-OF-WORK BASED ON THE GENERALIZED BIRTHDAY PROBLEM 2020 Biryukov, Alex
THE PRICE OF FREE: PRIVACY LEAKAGE IN PERSONALIZED MOBILE IN-APPS ADS 2020 Meng, Wei
TRACKING MOBILE WEB USERS THROUGH MOTION SENSORS: ATTACKS AND DEFENSES 2020 Das, Anupam
TOWARDS AUTOMATED DYNAMIC ANALYSIS FOR LINUX-BASED EMBEDDED FIRMWARE 2020 Chen, Daming D.
VTRUST: REGAINING TRUST ON VIRTUAL CALLS 2020 Zhang, Chao
Alle Artikel auflisten