OPAQUE CONTROL-FLOW INTEGRITY

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Network and Distributed System Security Symposium (22. : 2015 : San Diego, Calif.) Network and Distributed System Security Symposium 2015 (NDSS '15)
1. Verfasser: Mohan, Vishwath (VerfasserIn)
Weitere Verfasser: Larsen, Per (VerfasserIn), Brunthaler, Stefan (VerfasserIn), Hamlen, Kevin W. (VerfasserIn), Franz, Michael (VerfasserIn)
Pages:2015
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
UPGRADING HTTPS IN MID-AIR: AN EMPIRICAL STUDY OF STRICT TRANSPORT SECURITY AND KEY PINNING 2020 Bonneau, Joseph
COPPERDROID: AUTOMATIC RECONSTRUCTION OF ANDROID MALWARE BEHAVIORS 2020 Tam, Kimberly
PHONEYPOT: DATA-DRIVEN UNDERSTANDING OF TELEPHONY THREATS 2020 Gupta, Payas
FREESENTRY: PROTECTING AGAINST USE-AFTER-FREE VULNERABILITIES DUE TO DANGLING POINTERS 2020 Younan, Yves
EKHUNTER: A COUNTER-OFFENSIVE TOOLKIT FOR EXPLOIT KIT INFILTRATION 2020 Eshete, Birhanu
GRACEWIPE: SECURE AND VERIFIABLE DELETION UNDER COERCION 2020 Zhao, Lianying
CHECKING MORE AND ALERTING LESS: DETECTING PRIVACY LEAKAGES VIA ENHANCED DATA-FLOW ANALYSIS AND PEER VOTING 2020 Lu, Kangjie
SPACED REPETITION AND MNEMONICS ENABLE RECALL OF MULTIPLE STRONG PASSWORDS 2020 Blocki, Jeremiah
ABY — A FRAMEWORK FOR EFFICIENT MIXED-PROTOCOL SECURE TWO-PARTY COMPUTATION 2020 Demmler, Daniel
THE DEVIL IS IN THE CONSTANTS: BYPASSING DEFENSES IN BROWSER JIT ENGINES 2020 Athanasakis, Michalis
FIRMALICE — AUTOMATIC DETECTION OF AUTHENTICATION BYPASS VULNERABILITIES IN BINARY FIRMWARE 2020 Shoshitaishvili, Yan
NO MORE GOTOS: DECOMPILATION USING PATTERN-INDEPENDENT CONTROL- FLOW STRUCTURING AND SEMANTIC-PRESERVING TRANSFORMATIONS 2020 Yakdan, Khaled
SEVEN MONTHS' WORTH OF MISTAKES: A LONGITUDINAL STUDY OF TYPOSQUATTING ABUSE 2020 Agten, Pieter
I DO NOT KNOW WHAT YOU VISITED LAST SUMMER: PROTECTING USERS FROM STATEFUL THIRD-PARTY WEB TRACKING WITH TRACKINGFREE BROWSER 2020 Pan, Xiang
SECRET: SECURE CHANNEL BETWEEN RICH EXECUTION ENVIRONMENT AND TRUSTED EXECUTION ENVIRONMENT 2020 Jang, Jinsoo
PREVENTING USE-AFTER-FREE WITH DANGLING POINTERS NULLIFICATION 2020 Lee, Byoungyoung
INTEGRATED CIRCUIT (IC) DECAMOUFLAGING: REVERSE ENGINEERING CAMOUFLAGED ICS WITHIN MINUTES 2020 Massad, Mohamed El
OPAQUE CONTROL-FLOW INTEGRITY 2020 Mohan, Vishwath
PREVENTING LUNCHTIME ATTACKS: FIGHTING INSIDER THREATS WITH EYE MOVEMENT BIOMETRICS 2020 Eberz, Simon
VERIFIED CONTRIBUTIVE CHANNEL BINDINGS FOR COMPOUND AUTHENTICATION 2020 Bhargavan, Karthikeyan
Alle Artikel auflisten