UPGRADING HTTPS IN MID-AIR: AN EMPIRICAL STUDY OF STRICT TRANSPORT SECURITY AND KEY PINNING

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Network and Distributed System Security Symposium (22. : 2015 : San Diego, Calif.) Network and Distributed System Security Symposium 2015 (NDSS '15)
1. Verfasser: Bonneau, Joseph (VerfasserIn)
Weitere Verfasser: Kranch, Michael (VerfasserIn)
Pages:2015
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
SEVEN MONTHS' WORTH OF MISTAKES: A LONGITUDINAL STUDY OF TYPOSQUATTING ABUSE 2020 Agten, Pieter
I DO NOT KNOW WHAT YOU VISITED LAST SUMMER: PROTECTING USERS FROM STATEFUL THIRD-PARTY WEB TRACKING WITH TRACKINGFREE BROWSER 2020 Pan, Xiang
SECRET: SECURE CHANNEL BETWEEN RICH EXECUTION ENVIRONMENT AND TRUSTED EXECUTION ENVIRONMENT 2020 Jang, Jinsoo
PREVENTING USE-AFTER-FREE WITH DANGLING POINTERS NULLIFICATION 2020 Lee, Byoungyoung
INTEGRATED CIRCUIT (IC) DECAMOUFLAGING: REVERSE ENGINEERING CAMOUFLAGED ICS WITHIN MINUTES 2020 Massad, Mohamed El
OPAQUE CONTROL-FLOW INTEGRITY 2020 Mohan, Vishwath
PREVENTING LUNCHTIME ATTACKS: FIGHTING INSIDER THREATS WITH EYE MOVEMENT BIOMETRICS 2020 Eberz, Simon
VERIFIED CONTRIBUTIVE CHANNEL BINDINGS FOR COMPOUND AUTHENTICATION 2020 Bhargavan, Karthikeyan
MIND YOUR BLOCKS: ON THE STEALTHINESS OF MALICIOUS BGP HIJACKS 2020 Vervier, Pierre-Antoine
SPHINX: DETECTING SECURITY ATTACKS IN SOFTWARE-DEFINED NETWORKS 2020 Dhawan, Mohan
P2C: UNDERSTANDING OUTPUT DATA FILES VIA ON-THE-FLY TRANSFORMATION FROM PRODUCER TO CONSUMER EXECUTIONS 2020 Kwon, Yonghwi
UPGRADING HTTPS IN MID-AIR: AN EMPIRICAL STUDY OF STRICT TRANSPORT SECURITY AND KEY PINNING 2020 Bonneau, Joseph
COPPERDROID: AUTOMATIC RECONSTRUCTION OF ANDROID MALWARE BEHAVIORS 2020 Tam, Kimberly
PHONEYPOT: DATA-DRIVEN UNDERSTANDING OF TELEPHONY THREATS 2020 Gupta, Payas
FREESENTRY: PROTECTING AGAINST USE-AFTER-FREE VULNERABILITIES DUE TO DANGLING POINTERS 2020 Younan, Yves
EKHUNTER: A COUNTER-OFFENSIVE TOOLKIT FOR EXPLOIT KIT INFILTRATION 2020 Eshete, Birhanu
GRACEWIPE: SECURE AND VERIFIABLE DELETION UNDER COERCION 2020 Zhao, Lianying
CHECKING MORE AND ALERTING LESS: DETECTING PRIVACY LEAKAGES VIA ENHANCED DATA-FLOW ANALYSIS AND PEER VOTING 2020 Lu, Kangjie
SPACED REPETITION AND MNEMONICS ENABLE RECALL OF MULTIPLE STRONG PASSWORDS 2020 Blocki, Jeremiah
ABY — A FRAMEWORK FOR EFFICIENT MIXED-PROTOCOL SECURE TWO-PARTY COMPUTATION 2020 Demmler, Daniel
Alle Artikel auflisten