GRACEWIPE: SECURE AND VERIFIABLE DELETION UNDER COERCION

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Network and Distributed System Security Symposium (22. : 2015 : San Diego, Calif.) Network and Distributed System Security Symposium 2015 (NDSS '15)
1. Verfasser: Zhao, Lianying (VerfasserIn)
Weitere Verfasser: Mannan, Mohammad (VerfasserIn)
Pages:2015
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
PARKING SENSORS: ANALYZING AND DETECTING PARKED DOMAINS 2020 Vissers, Thomas
EDGEMINER: AUTOMATICALLY DETECTING IMPLICIT CONTROL FLOW TRANSITIONS THROUGH THE ANDROID FRAMEWORK 2020 Cao, Yinzhi
DEEPDROID: DYNAMICALLY ENFORCING ENTERPRISE POLICY ON ANDROID DEVICES 2020 Wang, Xueqiang
VTINT: PROTECTING VIRTUAL FUNCTION TABLES' INTEGRITY 2020 Zhang, Chao
MACHINE LEARNING CLASSIFICATION OVER ENCRYPTED DATA 2020 Bost, Raphael
DEFY: A DENIABLE, ENCRYPTED FILE SYSTEM FOR LOG-STRUCTURED STORAGE 2020 Peters, Timothy M.
PRIVACY PRESERVING PAYMENTS IN CREDIT NETWORKS: ENABLING TRUST WITH PRIVACY IN ONLINE MARKETPLACES 2020 Moreno-Sanchez, Pedro
STACKARMOR: COMPREHENSIVE PROTECTION FROM STACK-BASED MEMORY ERROR VULNERABILITIES FOR BINARIES 2020 Chen, Xi
PRINCIPLED SAMPLING FOR ANOMALY DETECTION 2020 Juba, Brendan
ISOMERON: CODE RANDOMIZATION RESILIENT TO (JUST-IN-TIME) RETURN-ORIENTED PROGRAMMING 2020 Davi, Lucas
NSEC5: PROVABLY PREVENTING DNSSEC ZONE ENUMERATION 2020 Goldberg, Sharon
PREDICTING USERS' MOTIVATIONS BEHIND LOCATION CHECK-INS AND UTILITY IMPLICATIONS OF PRIVACY PROTECTION MECHANISMS 2020 Bilogrevic, Igor
EXPLOITING AND PROTECTING DYNAMIC CODE GENERATION 2020 Song, Chengyu
RUN-TIME MONITORING AND FORMAL ANALYSIS OF INFORMATION FLOWS IN CHRONIUM 2020 Bauer, Lujo
TOO LEJIT TO QUIT: EXTENDING JIT SPRAYING TO ARM 2020 Lian, Wilson
SEVEN MONTHS' WORTH OF MISTAKES: A LONGITUDINAL STUDY OF TYPOSQUATTING ABUSE 2020 Agten, Pieter
I DO NOT KNOW WHAT YOU VISITED LAST SUMMER: PROTECTING USERS FROM STATEFUL THIRD-PARTY WEB TRACKING WITH TRACKINGFREE BROWSER 2020 Pan, Xiang
SECRET: SECURE CHANNEL BETWEEN RICH EXECUTION ENVIRONMENT AND TRUSTED EXECUTION ENVIRONMENT 2020 Jang, Jinsoo
PREVENTING USE-AFTER-FREE WITH DANGLING POINTERS NULLIFICATION 2020 Lee, Byoungyoung
INTEGRATED CIRCUIT (IC) DECAMOUFLAGING: REVERSE ENGINEERING CAMOUFLAGED ICS WITHIN MINUTES 2020 Massad, Mohamed El
Alle Artikel auflisten