KNOCK KNOCK, WHO'S THERE? MEMBERSHIP INFERENCE ON AGGREGATE LOCATION DATA

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Network and Distributed System Security Symposium (25. : 2018 : San Diego, Calif.) Network and Distributed System Security Symposium 2018 ; Volume 2 of 2
1. Verfasser: Pyrgelis, Apostolos (VerfasserIn)
Weitere Verfasser: Troncoso, Carmela (VerfasserIn), Cristofaro, Emiliano De (VerfasserIn)
Pages:2018
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
OS-LEVEL SIDE CHANNELS WITHOUT PROCFS: EXPLORING CROSS-APP INFORMATION LEAKAGE ON IOS 2020 Zhang, Xiaokuan
APPS, TRACKERS, PRIVACY, AND REGULATORS: A GLOBAL STUDY OF THE MOBILE TRACKING ECOSYSTEM 2020 Razaghpanah, Abbas
REDUCED COOLING REDUNDANCY: A NEW SECURITY VULNERABILITY IN A HOT DATA CENTER 2020 Gao, Xing
VEIL: PRIVATE BROWSING SEMANTICS WITHOUT BROWSER-SIDE ASSISTANCE 2020 Wang, Frank
GAME OF MISSUGGESTIONS: SEMANTIC ANALYSIS OF SEARCH-AUTOCOMPLETE MANIPULATIONS 2020 Wang, Peng
ACEDROID: NORMALIZING DIVERSE ANDROID ACCESS CONTROL CHECKS FOR INCONSISTENCY DETECTION 2020 Aafer, Yousra
BREAKAPP: AUTOMATED, FLEXIBLE APPLICATION COMPARTMENTALIZATION 2020 Vasilakis, Nikos
TLS-N: NON-REPUDIATION OVER TLS ENABLIGN UBIQUITOUS CONTENT SIGNING 2020 Ritzdorf, Hubert
CFIXX: OBJECT TYPE INTEGRITY FOR C++ 2020 Burow, Nathan
OBLIVIATE: A DATA OBLIVIOUS FILESYSTEM FOR INTEL SGX 2020 Ahmad, Adil
WHEN CODING STYLE SURVIVES COMPILATION: DE-ANONYMIZING PROGRAMMERS FROM EXECUTABLE BINARIES 2020 Caliskan, Aylin
TOWARDS SCALABLE CLUSTER AUDITING THROUGH GRAMMATICAL INFERENCE OVER PROVENANCE GRAPHS 2020 Hassan, Wajih Ul
INSTAGUARD: INSTANTLY DEPLOYABLE HOT-PATCHES FOR VULNERABLE SYSTEM PROGRAMS ON ANDROID 2020 Chen, Yaohui
RESOLVING THE PREDICAMENT OF ANDROID CUSTOM PERMISSIONS 2020 Tuncay, Guliz Seray
INVESTIGATING AD TRANSPARENCY MECHANISMS IN SOCIAL MEDIA: A CASE STUDY OF FACEBOOKS EXPLANATIONS 2020 Andreou, Athanasios
SETTLING PAYMENTS FAST AND PRIVATE: EFFICIENT DECENTRALIZED ROUTING FOR PATH-BASED TRANSACTIONS 2020 Roos, Stefanie
BACK TO THE EPILOGUE: EVADING CONTROL FLOW GUARD VIA UNALIGNED TARGETS 2020 Biondo, Andrea
ENHANCING MEMORY ERROR DETECTION FOR LARGE-SCALE APPLICATIONS AND FUZZ TESTING 2020 Han, Wookhyun
FINDING CLUES FOR YOUR SECRETS: SEMANTICS-DRIVEN, LEARNING-BASED PRIVACY DISCOVERY IN MOBILE APPS 2020 Nan, Yuhong
BUG FIXES, IMPROVEMENTS, ... AND PRIVACY LEAKS — A LONGITUDINAL STUDY OF PII LEAKS ACROSS ANDROID APP VERSIONS 2020 Ren, Jingjing
Alle Artikel auflisten