fASLR: Function-Based ASLR for Resource-Constrained IoT Systems

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:European Symposium on Research in Computer Security (27. : 2022 : Kopenhagen; Online) Computer security - ESORICS 2022 ; Part 2
1. Verfasser: Shao, Xinhui (VerfasserIn)
Weitere Verfasser: Luo, Lan (VerfasserIn), Ling, Zhen (VerfasserIn), Yan, Huaiyu (VerfasserIn), Wei, Yumeng (VerfasserIn), Fu, Xinwen (VerfasserIn)
Pages:2022
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2022
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Anonymous Traceback for End-to-End Encryption 2022 Kenney, Erin
Verifying the Quality of Outsourced Training on Clouds 2022 Li, Peiyang
Lighter is Better: A Lighter Multi-client Verifiable Outsourced Computation with Hybrid Homomorphic Encryption 2022 Wang, Xingkai
Robust and Scalable Process Isolation Against Spectre in the Cloud 2022 Schwarzl, Martin
SecQuant: Quantifying Container System Call Exposure 2022 Jang, Sunwoo
On Committing Authenticated-Encryption 2022 Chan, John
Quantum-Resistant Password-Based Threshold Single-Sign-On Authentication with Updatable Server Private Key 2022 Jiang, Jingwei
Continuous Authentication in Secure Messaging 2022 Dowling, Benjamin
Half-Aggregation of Schnorr Signatures with Tight Reductions 2022 Chen, Yanbo
IoTPrivComp: A Measurement Study of Privacy Compliance in IoT Apps 2022 Ahmad, Javaria
No-Label User-Level Membership Inference for ASR Model Auditing 2022 Miao, Yuantian
A Framework for Constructing Single Secret Leader Election from MPC 2022 Backes, Michael
AppBastion: Protection from Untrusted Apps and OSes on ARM 2022 Suciu, Darius
A Machine Learning Approach to Detect Differential Treatment of Anonymous Users 2022 Wagner, Isabel
A Tale of Four Gates: Privilege Escalation and Permission Bypasses on Android Through App Components 2022 Aldoseri, Abdulla
The Revenge of Password Crackers: Automated Training of Password Cracking Tools 2022 Campi, Alessia Michela Di
Fuzzy Authenticated Key Exchange with Tight Security 2022 Jiang, Mingming
Ring Signatures with User-Controlled Linkability 2022 Fiore, Dario
Verifiable Timed Linkable Ring Signatures for Scalable Payments for Monero 2022 Thyagarajan, Sri AravindaKrishnan
DualDory: Logarithmic-Verifier Linkable Ring Signatures Through Preprocessing 2022 Bootle, Jonathan
Alle Artikel auflisten