INTEGRATED CIRCUIT (IC) DECAMOUFLAGING: REVERSE ENGINEERING CAMOUFLAGED ICS WITHIN MINUTES

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Network and Distributed System Security Symposium (22. : 2015 : San Diego, Calif.) Network and Distributed System Security Symposium 2015 (NDSS '15)
1. Verfasser: Massad, Mohamed El (VerfasserIn)
Weitere Verfasser: Garg, Siddharth (VerfasserIn), Tripunitara, Mahesh (VerfasserIn)
Pages:2015
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
PARKING SENSORS: ANALYZING AND DETECTING PARKED DOMAINS 2020 Vissers, Thomas
EDGEMINER: AUTOMATICALLY DETECTING IMPLICIT CONTROL FLOW TRANSITIONS THROUGH THE ANDROID FRAMEWORK 2020 Cao, Yinzhi
DEEPDROID: DYNAMICALLY ENFORCING ENTERPRISE POLICY ON ANDROID DEVICES 2020 Wang, Xueqiang
VTINT: PROTECTING VIRTUAL FUNCTION TABLES' INTEGRITY 2020 Zhang, Chao
MACHINE LEARNING CLASSIFICATION OVER ENCRYPTED DATA 2020 Bost, Raphael
DEFY: A DENIABLE, ENCRYPTED FILE SYSTEM FOR LOG-STRUCTURED STORAGE 2020 Peters, Timothy M.
PRIVACY PRESERVING PAYMENTS IN CREDIT NETWORKS: ENABLING TRUST WITH PRIVACY IN ONLINE MARKETPLACES 2020 Moreno-Sanchez, Pedro
STACKARMOR: COMPREHENSIVE PROTECTION FROM STACK-BASED MEMORY ERROR VULNERABILITIES FOR BINARIES 2020 Chen, Xi
PRINCIPLED SAMPLING FOR ANOMALY DETECTION 2020 Juba, Brendan
ISOMERON: CODE RANDOMIZATION RESILIENT TO (JUST-IN-TIME) RETURN-ORIENTED PROGRAMMING 2020 Davi, Lucas
NSEC5: PROVABLY PREVENTING DNSSEC ZONE ENUMERATION 2020 Goldberg, Sharon
PREDICTING USERS' MOTIVATIONS BEHIND LOCATION CHECK-INS AND UTILITY IMPLICATIONS OF PRIVACY PROTECTION MECHANISMS 2020 Bilogrevic, Igor
EXPLOITING AND PROTECTING DYNAMIC CODE GENERATION 2020 Song, Chengyu
RUN-TIME MONITORING AND FORMAL ANALYSIS OF INFORMATION FLOWS IN CHRONIUM 2020 Bauer, Lujo
TOO LEJIT TO QUIT: EXTENDING JIT SPRAYING TO ARM 2020 Lian, Wilson
IDENTIFYING CROSS-ORIGIN RESOURCE STATUS USING APPLICATION CACHE 2020 Lee, Sangho
INFORMATION FLOW ANALYSIS OF ANDROID APPLICATIONS IN DROIDSAFE 2020 Gordon, Michael I.
WHAT'S IN YOUR DONGLE AND BANK ACCOUNT? MANDATORY AND DISCRETIONARY PROTECTION OF ANDROID EXTERNAL RESOURCES 2020 Demetriou, Soteris
THWARTING CACHE SIDE-CHANNEL ATTACKS THROUGH DYNAMIC SOFTWARE DIVERSITY 2020 Crane, Stephen
BLOOM COOKIES: WEB SEARCH PERSONALIZATION WITHOUT USER TRACKING 2020 Mor, Nitesh
Alle Artikel auflisten