I DO NOT KNOW WHAT YOU VISITED LAST SUMMER: PROTECTING USERS FROM STATEFUL THIRD-PARTY WEB TRACKING WITH TRACKINGFREE BROWSER

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Network and Distributed System Security Symposium (22. : 2015 : San Diego, Calif.) Network and Distributed System Security Symposium 2015 (NDSS '15)
1. Verfasser: Pan, Xiang (VerfasserIn)
Weitere Verfasser: Cao, Yinzhi (VerfasserIn), Chen, Yan (VerfasserIn)
Pages:2015
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
UPGRADING HTTPS IN MID-AIR: AN EMPIRICAL STUDY OF STRICT TRANSPORT SECURITY AND KEY PINNING 2020 Bonneau, Joseph
COPPERDROID: AUTOMATIC RECONSTRUCTION OF ANDROID MALWARE BEHAVIORS 2020 Tam, Kimberly
PHONEYPOT: DATA-DRIVEN UNDERSTANDING OF TELEPHONY THREATS 2020 Gupta, Payas
FREESENTRY: PROTECTING AGAINST USE-AFTER-FREE VULNERABILITIES DUE TO DANGLING POINTERS 2020 Younan, Yves
EKHUNTER: A COUNTER-OFFENSIVE TOOLKIT FOR EXPLOIT KIT INFILTRATION 2020 Eshete, Birhanu
GRACEWIPE: SECURE AND VERIFIABLE DELETION UNDER COERCION 2020 Zhao, Lianying
CHECKING MORE AND ALERTING LESS: DETECTING PRIVACY LEAKAGES VIA ENHANCED DATA-FLOW ANALYSIS AND PEER VOTING 2020 Lu, Kangjie
SPACED REPETITION AND MNEMONICS ENABLE RECALL OF MULTIPLE STRONG PASSWORDS 2020 Blocki, Jeremiah
ABY — A FRAMEWORK FOR EFFICIENT MIXED-PROTOCOL SECURE TWO-PARTY COMPUTATION 2020 Demmler, Daniel
THE DEVIL IS IN THE CONSTANTS: BYPASSING DEFENSES IN BROWSER JIT ENGINES 2020 Athanasakis, Michalis
FIRMALICE — AUTOMATIC DETECTION OF AUTHENTICATION BYPASS VULNERABILITIES IN BINARY FIRMWARE 2020 Shoshitaishvili, Yan
NO MORE GOTOS: DECOMPILATION USING PATTERN-INDEPENDENT CONTROL- FLOW STRUCTURING AND SEMANTIC-PRESERVING TRANSFORMATIONS 2020 Yakdan, Khaled
IDENTIFYING CROSS-ORIGIN RESOURCE STATUS USING APPLICATION CACHE 2020 Lee, Sangho
INFORMATION FLOW ANALYSIS OF ANDROID APPLICATIONS IN DROIDSAFE 2020 Gordon, Michael I.
WHAT'S IN YOUR DONGLE AND BANK ACCOUNT? MANDATORY AND DISCRETIONARY PROTECTION OF ANDROID EXTERNAL RESOURCES 2020 Demetriou, Soteris
THWARTING CACHE SIDE-CHANNEL ATTACKS THROUGH DYNAMIC SOFTWARE DIVERSITY 2020 Crane, Stephen
BLOOM COOKIES: WEB SEARCH PERSONALIZATION WITHOUT USER TRACKING 2020 Mor, Nitesh
ON YOUR SOCIAL NETWORK DE-ANONYMIZABLITY: QUANTIFICATION AND LARGE SCALE EVALUATION WITH SEED KNOWLEDGE 2020 Ji, Shouling
EFFICIENT RAM AND CONTROL FLOW IN VERIFIABLE OUTSOURCED COMPUTATION 2020 Wahby, Riad
INTEGRO: LEVERAGING VICTIM PREDICTION FOR ROBUST FAKE ACCOUNT DETECTION IN OSNS 2020 Boshmaf, Yazan
Alle Artikel auflisten