An Evil Copy: How the Loader Betrays You

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Network and Distributed System Security Symposium (24. : 2017 : San Diego, Calif.) Network and Distributed System Security Symposium 2017 ; Volume 2 of 2
1. Verfasser: Ge, X. (VerfasserIn)
Weitere Verfasser: Payer, M. (VerfasserIn), Jaeger, T. (VerfasserIn)
Pages:2017
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Safelnit: Comprehensive and Practical Mitigation of Uninitialized Read Vulnerabilities 2020 Milburn, A.
Dynamic Virtual Address Range Adjustment for Intra-Level Privilege Separation on ARM 2020 Cho, Y.
The Effect of DNS on Tor's Anonymity 2020 Greschbach, B.
ContexloT: Towards Providing Contextual Integrity to Appified loT Platforms 2020 Jia, Y. J.
A Call to ARMs: Understanding the Costs and Benefits of JIT Spraying Mitigations 2020 Lian, W.
Hello from the Other Side: SSH over Robust Cache Covert Channels in the Cloud 2020 Maurice, C.
TenantGuard: Scalable Runtime Verification of Cloud-Wide VM-Level Network Isolation 2020 Wang, Y.
SGX-Shield: Enabling Address Space Layout Randomization for SGX Programs 2020 Seo, J.
PANOPLY: Low-TCB Linux Applications With SGX Enclaves 2020 Shinde, S.
Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit 2020 Garcia, L.
Wi-Fly? : Detecting Privacy Invasion Attacks by Consumer Drones 2020 Birnbach, S.
ASLR on the Line: Practical Cache Attacks on the MMU 2020 Gras, B.
Stack Bounds Protection with Low Fat Pointers 2020 Duck, G. J.
Unleashing Use-Before-Initialization Vulnerabilities in the Linux Kernel Using Targeted Stack Spraying 2020 Lu, K.
Ramblr: Making Reassembly Great Again 2020 Wang, R.
Dachshund: Digging for and Securing Against (Non-)Blinded Constants in JIT Code 2020 Maisuradze, G.
Are We There Yet? On RPKI's Deployment and Security 2020 Gilad, Y.
Dissecting Tor Bridges: A Security Evaluation of their Private and Public Infrastructures 2020 Matic, S.
HisTore: Differentially Private and Robust Statistics Collection for Tor 2020 Mani, A.
T-SGX: Eradicating Controlled-Channel Attacks Against Enclave Programs 2020 Shih, M.-W.
Alle Artikel auflisten