PHANTOMCACHE: OBFUSCATING CACHE CONFLICTS WITH LOCALIZED RANDOMIZATION

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Network and Distributed System Security Symposium (27. : 2020 : San Diego, Calif.) Network and Distributed System Security Symposium 2020 ; Volume 1 of 2
1. Verfasser: Tan, Qinhan (VerfasserIn)
Weitere Verfasser: Zeng, Zhihua (VerfasserIn), Bu, Kai (VerfasserIn), Ren, Kui (VerfasserIn)
Pages:2020
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
HFL: HYBRID FUZZING ON THE LINUX KERNEL 2020 Kim, Kyungtae
HYPER-CUBE: HIGH-DIMENSIONAL HYPERVISOR FUZZING 2020 Schumilo, Sergej
MEASURING THE DEPLOYMENT OF NETWORK CENSORSHIP FILTERS AT GLOBAL SCALE 2020 Raman, Ram Sundara
NOT ALL COVERAGE MEASUREMENTS ARE EQUAL: FUZZING BY COVERAGE ACCOUNTING FOR INPUT PRIORITIZATION 2020 Wang, Yanhao
PACKET-LEVEL SIGNATURES FOR SMART HOME DEVICES 2020 Trimananda, Rahmadi
AUTOMATED CROSS-PLATFORM REVERSE ENGINEERING OF CAN BUS COMMANDS FROM MOBILE APPS 2020 Wen, Haohuang
BROKEN METRE: ATTACKING RESOURCE METERING IN EVM 2020 Perez, Daniel
SNAPPY: FAST ON-CHAIN PAYMENTS WITH PRACTICAL COLLATERALS 2020 Mavroudis, Vasilios
FINDING SAFETY IN NUMBERS WITH SECURE ALLEGATION ESCROWS 2020 Arun, Venkat
μRAI: SECURING EMBEDDED SYSTEMS WITH RETURN ADDRESS INTEGRITY 2020 Almakhdhub, Naif Saleh
SODA: A GENERIC ONLINE DETECTION FRAMEWORK FOR SMART CONTRACTS 2020 Chen, Ting
A PRACTICAL APPROACH FOR TAKING DOWN AVALANCHE BOTNETS UNDER REAL-WORLD CONSTRAINTS 2020 Pochat, Victor Le
PHANTOMCACHE: OBFUSCATING CACHE CONFLICTS WITH LOCALIZED RANDOMIZATION 2020 Tan, Qinhan
HOLD THE DOOR! FINGERPRINTING YOUR CAR KEY TO PREVENT KEYLESS ENTRY CAR THEFT 2020 Joo, Kyungho
MELTING POT OF ORIGINS: COMPROMISING THE INTERMEDIARY WEB SERVICES THAT REHOST WEBSITES 2020 Watanabe, Takuya
DECEPTIVE PREVIEWS: A STUDY OF THE LINK PREVIEW TRUSTWORTHINESS IN SOCIAL PLATFORMS 2020 Stivala, Giada
DETECTING PROBE-RESISTANT PROXIES 2020 Frolov, Sergey
SURFINGATTACK: INTERACTIVE HIDDEN ATTACK ON VOICE ASSISTANTS USING ULTRASONIC GUIDED WAVES 2020 Yan, Qiben
FLOWPRINT: SEMI-SUPERVISED MOBILE-APP FINGERPRINTING ON ENCRYPTED NETWORK TRAFFIC 2020 Ede, Thijs Van
BOBTAIL: IMPROVED BLOCKCHAIN SECURITY WITH LOW-VARIANCE MINING 2020 Bissias, George
Alle Artikel auflisten