TOWARDS TAMING PRIVILEGE-ESCALATION ATTACKS ON ANDROID

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Network and Distributed System Security Symposium (19. : 2012 : San Diego, Calif.) Network and Distributed System Security Symposium 2012 (NDSS '12)
1. Verfasser: Bugiel, Sven (VerfasserIn)
Weitere Verfasser: Davi, Lucas (VerfasserIn), Dmitrienko, Alexandra (VerfasserIn), Fischer, Thomas (VerfasserIn), Sadeghi, Ahmad-Reza (VerfasserIn), Shastry, Bhargava (VerfasserIn)
Pages:2012
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
PERSISTENT OSPF ATTACKS 2020 Nakibly, Gabi
YOU ARE WHAT YOU LIKE! INFORMATION LEAKAGE THROUGH USERS' INTERESTS 2020 Chaabane, Abdelberi
ANDANA: ANONYMOUS NAMED DATA NETWORKING APPLICATION 2020 Dibenedetto, Steven
X-VINE: SECURE AND PSEUDONYMOUS ROUTING IN DHTS USING SOCIAL NETWORKS 2020 Mittal, Prateek
TRACK ME IF YOU CAN: ON THE EFFECTIVENESS OF CONTEXT-BASED IDENTIFIER CHANGES IN DEPLOYED MOBILE NETWORKS 2020 Bindschaedler, Laurent
YOU CAN RUN, BUT YOU CAN'T HIDE: EXPOSING NETWORK LOCATION FOR TARGETED DOS ATTACKS IN CELLULAR NETWORKS 2020 Qian, Zhiyun
WEAPONIZING FEMTOCELLS: THE EFFECT OF ROGUE DEVICES ON MOBILE TELECOMMUNICATIONS 2020 Golde, Nico
MAKING ARGUMENT SYSTEMS FOR OUTSOURCED COMPUTATION PRACTICAL (SOMETIMES) 2020 Setty, Srinath
LARGE-SCALE PRIVACY-PRESERVING MAPPING OF HUMAN GENOMIC SEQUENCES ON HYBRID CLOUDS 2020 Chen, Yangyi
TOWARDS PRACTICAL OBLIVIOUS RAM 2020 Stefanov, Emil
DISTANCE HIJACKING ATTACKS ON DISTANCE BOUNDING PROTOCOLS 2020 Cremers, Cas
THROTTLING TOR BANDWIDTH PARASITES 2020 Jansen, Rob
NEWTON MEETS VIVALDI: USING PHYSICAL LAWS TO SECURE VIRTUAL COORDINATE SYSTEMS 2020 Seibert, Jeff
ABUSE DETECTION AND PREVENTION SYSTEMS AT A LARGE SCALE VIDEO SHARING WEBSITE 2020 Chen, Yu-To
ACCESS PATTERN DISCLOSURE ON SEARCHABLE ENCRYPTION: RAMIFICATION ATTACK AND MITIGATION 2020 Islam, Mohammad
ACCOUNTABLE WIRETAPPING -OR- I KNOW THEY CAN HEAR YOU NOW 2020 Bates, Adam
SHADOW: RUNNING TOR IN A BOX FOR ACCURATE AND EFFICIENT EXPERIMENTATION 2020 Jansen, Rob
SMART: SECURE AND MINIMAL ARCHITECTURE FOR (ESTABLISHING DYNAMIC) ROOF OF TRUST 2020 Eldefrawy, Karim
USING REPLICATED EXECUTION FOR A MORE SECURE AND RELIABLE WEB BROWSER 2020 Xue, Hui
CHROME EXTENSIONS: THREAT ANALYSIS AND COUNTERMEASURES 2020 Liu, Lei
Alle Artikel auflisten