Are We There Yet? On RPKI's Deployment and Security

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Network and Distributed System Security Symposium (24. : 2017 : San Diego, Calif.) Network and Distributed System Security Symposium 2017 ; Volume 2 of 2
1. Verfasser: Gilad, Y. (VerfasserIn)
Weitere Verfasser: Cohen, A. (VerfasserIn), Herzberg, A. (VerfasserIn), Schapira, M. (VerfasserIn), Shulman, H. (VerfasserIn)
Pages:2017
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Dachshund: Digging for and Securing Against (Non-)Blinded Constants in JIT Code 2020 Maisuradze, G.
Are We There Yet? On RPKI's Deployment and Security 2020 Gilad, Y.
Dissecting Tor Bridges: A Security Evaluation of their Private and Public Infrastructures 2020 Matic, S.
HisTore: Differentially Private and Robust Statistics Collection for Tor 2020 Mani, A.
T-SGX: Eradicating Controlled-Channel Attacks Against Enclave Programs 2020 Shih, M.-W.
An Evil Copy: How the Loader Betrays You 2020 Ge, X.
Automated Analysis of Privacy Requirements for Mobile Apps 2020 Zimmeck, S.
PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables 2020 Davi, L.
MARX: Uncovering Class Hierarchies in C++ Programs 2020 Pawlowski, A.
Dynamic Differential Location Privacy with Personalized Error Bounds 2020 Yu, L.
Avoding The Man on the Wire: Improving Tor's Security with Trust-Aware Path Selection 2020 Johnson, A.
HOP: Hardware makes Obfuscation Practical 2020 Nayak, K.
BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments 2020 Machiry, A.
FBS-Radar: Uncovering Fake Base Stations at Scale in the Wild 2020 Li, Z.
Internet-scale Probing of CPS: Inference, Characterization and Orchestration Analysis 2020 Fachkha, C.
Address-Oblivious Code Reuse: On the Effectiveness of Leakage-Resilient Diversity 2020 Rudd, R.
VUzzer: Application-aware Evolutionary Fuzzing 2020 Rawat, S.
Self Destructing Exploit Executions via Input Perturbation 2020 Kwon, Y.
Safelnit: Comprehensive and Practical Mitigation of Uninitialized Read Vulnerabilities 2020 Milburn, A.
Dynamic Virtual Address Range Adjustment for Intra-Level Privilege Separation on ARM 2020 Cho, Y.
Alle Artikel auflisten