Towards Efficient Auditing for Real-Time Systems

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:European Symposium on Research in Computer Security (27. : 2022 : Kopenhagen; Online) Computer security - ESORICS 2022 ; Part 3
1. Verfasser: Bansal, Ayoosh (VerfasserIn)
Weitere Verfasser: Kandikuppa, Anant (VerfasserIn), Chen, Chien-Ying (VerfasserIn), Hasan, Monowar (VerfasserIn), Bates, Adam (VerfasserIn), Mohan, Sibin (VerfasserIn)
Pages:2022
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2022
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
A Composable Security Treatment of ECVRF and Batch Verifications 2022 Badertscher, Christian
A Tale of Two Models: Formal Verification of KEMTLS via Tamarin 2022 Celi, Sofía
Browser-Based CPU Fingerprinting 2022 Trampert, Leon
CPU Port Contention Without SMT 2022 Rokicki, Thomas
MaleficNet: Hiding Malware into Deep Neural Networks Using Spread-Spectrum Channel Coding 2022 Hitaj, Dorjan
Precise Extraction of Deep Learning Models via Side-Channel Attacks on Edge/Endpoint Devices 2022 Lee, Younghan
MLFM: Machine Learning Meets Formal Method for Faster Identification of Security Breaches in Network Functions Virtualization (NFV) 2022 Oqaily, Alaa
A Novel High-Performance Implementation of CRYSTALS-Kyber with AI Accelerator 2022 Wan, Lipeng
Efficient Hash-Based Redactable Signature for Smart Grid Applications 2022 Zhu, Fei
Multi-Freq-LDPy: Multiple Frequency Estimation Under Local Differential Privacy in Python 2022 Arcolezi, Héber H.
Polymorphic Protocols at the Example of Mitigating Web Bots 2022 See, August
Large Scale Analysis of DoH Deployment on the Internet 2022 García, Sebastián
PEA: Practical Private Epistasis Analysis Using MPC 2022 Hamacher, Kay
Hide and Seek: On the Stealthiness of Attacks Against Deep Learning Systems 2022 Liu, Zeyan
FLMJR: Improving Robustness of Federated Learning via Model Stability 2022 Guo, Qi
Real-Time Adversarial Perturbations Against Deep Reinforcement Learning Policies: Attacks and Defenses 2022 Tekgul, Buse G. A.
Can Industrial Intrusion Detection Be SIMPLE? 2022 Wolsing, Konrad
Detecting Cross-language Memory Management Issues in Rust 2022 Li, Zhuohua
Is Your Password Sexist? a Gamification-Based Analysis of the Cultural Context of Leaked Passwords 2022 Mølmark-O’Connor, Daniel
A Fast, Practical and Simple Shortest Path Protocol for Multiparty Computation 2022 Aly, Abdelrahaman
Alle Artikel auflisten