Title: |
Undermining Information Hiding (and What to Do about It) |
Article URLs: |
|
Alternative Article URLs: |
|
Authors: |
Enes Göktas |
-
Vrije Universiteit Amsterdam, The Netherlands, Computer Science Institute
|
Robert Gawlik |
-
Ruhr-Universität Bochum, Germany, Horst Görtz Institut for IT-Security (HGI)
|
Benjamin Kollenda |
-
Ruhr-Universität Bochum, Germany, Horst Görtz Institut for IT-Security (HGI)
|
Elias Athanasopoulos |
-
Vrije Universiteit Amsterdam, The Netherlands, Computer Science Institute
|
Georgios Portokalidis |
-
Stevens Institute of Technology, Department of Computer Science
|
Cristiano Giuffrida |
-
Vrije Universiteit Amsterdam, The Netherlands, Computer Science Institute
|
Herbert Bos |
-
Vrije Universiteit Amsterdam, The Netherlands, Computer Science Institute
|
Sharing: |
Unknown
|
Verification: |
Authors have
not verified
information
|
Artifact Evaluation Badge: |
none
|
Artifact URLs: |
|
Artifact Correspondence Email Addresses: |
|
NSF Award Numbers: |
|
DBLP Key: |
conf/uss/GoktasGKAPGB16
|
Author Comments: |
|