The Grant Negotiation and Authorization Protocol: Attacking, Fixing, and Verifying an Emerging Standard

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:European Symposium on Research in Computer Security (28. : 2023 : Den Haag) Computer security - ESORICS 2023 ; Part 3
1. Verfasser: Helmschmidt, Florian (VerfasserIn)
Weitere Verfasser: Hosseyni, Pedram (VerfasserIn), Küsters, Ralf (VerfasserIn), Pruiksma, Klaas (VerfasserIn), Waldmann, Clara (VerfasserIn), Würtele, Tim (VerfasserIn)
Pages:2023
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2024
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Indirect Meltdown: Building Novel Side-Channel Attacks from Transient-Execution Attacks 2024 Weber, Daniel
Tamarin-Based Analysis of Bluetooth Uncovers Two Practical Pairing Confusion Attacks 2024 Claverie, Tristan
Everlasting ROBOT: The Marvin Attack 2024 Kario, Hubert
The Grant Negotiation and Authorization Protocol: Attacking, Fixing, and Verifying an Emerging Standard 2024 Helmschmidt, Florian
Tactics for Account Access Graphs 2024 Arnaboldi, Luca
Accessorize in the Dark: A Security Analysis of Near-Infrared Face Recognition 2024 Cohen, Amit
Layered Symbolic Security Analysis in DY* 2024 Bhargavan, Karthikeyan
Attacking Logo-Based Phishing Website Detectors with Adversarial Perturbations 2024 Lee, Jehyun
n-MVTL Attack: Optimal Transaction Reordering Attack on DeFi 2024 Wang, Jianhuan
Syntax-Aware Mutation for Testing the Solidity Compile 2024 Mitropoulos, Charalambos
Machine-Checked Proofs of Accountability: How to sElect Who is to Blame 2024 Dragan, Constantin Catlin
A Rowhammer Reproduction Study Using the Blacksmith Fuzzer 2024 Gerlach, Lukas
You Reset I Attack! A Master Password Guessing Attack Against Honey Password Vaults 2024 Rao, Tingting
JWTKey: Automatic Cryptographic Vulnerability Detection in JWT Applications 2024 Xu, Bowen
stoRNA: Stateless Transparent Proofs of Storage-time 2024 Rabaninejad, Reyhaneh
ConGISATA: A Framework for Continuous Gamified Information Security Awareness Training and Assessment 2024 Cohen, Ofir
Reviving Meltdown 3a 2024 Weber, Daniel
MARF: A Memory-Aware CLFLUSH-Based Intra- and Inter-CPU Side-Channel Attack 2024 Kim, Sowoong
Exploring Genomic Sequence Alignment for Improving Side-Channel Analysis 2024 Uchoa, Heitor
Hiding Your Signals: A Security Analysis of PPG-Based Biometric Authentication 2024 Li, Lin
Alle Artikel auflisten