Title/Authors | Title | Research Artifacts
[?] A research
artifact is any by-product of a research project that is not
directly included in the published research paper. In Computer
Science research this is often source code and data sets, but
it could also be media, documentation, inputs to proof
assistants, shell-scripts to run experiments, etc.
|
Details |
---|
Walkie-Talkie: An Efficient Defense Against Passive Website Fingerprinting Attacks Tao Wang, Ian Goldberg |
Walkie-Talkie: An Efficient Defense Against Passive Website Fingerprinting Attacks Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Ania M. Piotrowska, Jamie Hayes, Tariq Elahi, Sebastian Meiser, George Danezis |
Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Towards Efficient Heap Overflow Discovery Xiangkun Jia, Chao Zhang, Purui Su, Yi Yang, Huafeng Huang, Dengguo Feng |
Towards Efficient Heap Overflow Discovery Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
"I Have No Idea What I'm Doing" - On the Usability of Deploying HTTPS Katharina Krombholz, Wilfried Mayer, Martin Schmiedecker, Edgar R. Weippl |
"I Have No Idea What I'm Doing" - On the Usability of Deploying HTTPS Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Attacking the Brain: Races in the SDN Control Plane Lei Xu, Jeff Huang, Sungmin Hong, Jialong Zhang, Guofei Gu |
Attacking the Brain: Races in the SDN Control Plane Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Xiaolong Bai, Zhe Zhou, XiaoFeng Wang, Zhou Li, Xianghang Mi, Nan Zhang, Tongxin Li, Shi-Min Hu, Kehuan Zhang |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Peter Ney, Karl Koscher, Lee Organick, Luis Ceze, Tadayoshi Kohno |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Predicting the Resilience of Obfuscated Code Against Symbolic Execution Attacks via Machine Learning Sebastian Banescu, Christian S. Collberg, Alexander Pretschner |
Predicting the Resilience of Obfuscated Code Against Symbolic Execution Attacks via Machine Learning Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Extension Breakdown: Security Analysis of Browsers Extension Resources Control Policies Iskander Sánchez-Rola, Igor Santos, Davide Balzarotti |
Extension Breakdown: Security Analysis of Browsers Extension Resources Control Policies Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
AuthentiCall: Efficient Identity and Content Authentication for Phone Calls Bradley Reaves, Logan Blue, Hadi Abdullah, Luis Vargas, Patrick Traynor, Thomas Shrimpton |
AuthentiCall: Efficient Identity and Content Authentication for Phone Calls Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
AWare: Preventing Abuse of Privacy-Sensitive Sensors via Operation Bindings Giuseppe Petracca, Ahmad Atamli-Reineh, Yuqiong Sun, Jens Grossklags, Trent Jaeger |
AWare: Preventing Abuse of Privacy-Sensitive Sensors via Operation Bindings Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Prime+Abort: A Timer-Free High-Precision L3 Cache Attack using Intel TSX Craig Disselkoen, David Kohlbrenner, Leo Porter, Dean M. Tullsen |
Prime+Abort: A Timer-Free High-Precision L3 Cache Attack using Intel TSX Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Ninja: Towards Transparent Tracing and Debugging on ARM Zhenyu Ning, Fengwei Zhang |
Ninja: Towards Transparent Tracing and Debugging on ARM Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
CLKSCREW: Exposing the Perils of Security-Oblivious Energy Management Adrian Tang, Simha Sethumadhavan, Salvatore J. Stolfo |
CLKSCREW: Exposing the Perils of Security-Oblivious Energy Management Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Hacking in Darkness: Return-oriented Programming against Secure Enclaves Jae-Hyuk Lee, Jin Soo Jang, Yeongjin Jang, Nohyun Kwak, Yeseul Choi, Changho Choi, Taesoo Kim, Marcus Peinado, Brent ByungHoon Kang |
Hacking in Darkness: Return-oriented Programming against Secure Enclaves Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Pengfei Wang, Jens Krinke, Kai Lu, Gen Li, Steve Dodier-Lazaro |
Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing Sangho Lee, Ming-Wei Shih, Prasun Gera, Taesoo Kim, Hyesoon Kim, Marcus Peinado |
Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Efficient Protection of Path-Sensitive Control Security Ren Ding, Chenxiong Qian, Chengyu Song, William Harris, Taesoo Kim, Wenke Lee |
Efficient Protection of Path-Sensitive Control Security Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Neural Nets Can Learn Function Type Signatures From Binaries Zheng Leong Chua, Shiqi Shen, Prateek Saxena, Zhenkai Liang |
Neural Nets Can Learn Function Type Signatures From Binaries Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Seeing Through The Same Lens: Introspecting Guest Address Space At Native Speed Siqi Zhao, Xuhua Ding, Wen Xu, Dawu Gu |
Seeing Through The Same Lens: Introspecting Guest Address Space At Native Speed Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
vTZ: Virtualizing ARM TrustZone Zhichao Hua, Jinyu Gu, Yubin Xia, Haibo Chen, Binyu Zang, Haibing Guan |
vTZ: Virtualizing ARM TrustZone Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Loophole: Timing Attacks on Shared Event Loops in Chrome Pepe Vila, Boris Köpf |
Loophole: Timing Attacks on Shared Event Loops in Chrome Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
6thSense: A Context-aware Sensor-based Attack Detector for Smart Devices Amit Kumar Sikder, Hidayet Aksu, A. Selcuk Uluagac |
6thSense: A Context-aware Sensor-based Attack Detector for Smart Devices Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
CAn't Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory Ferdinand Brasser, Lucas Davi, David Gens, Christopher Liebchen, Ahmad-Reza Sadeghi |
CAn't Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
BLENDER: Enabling Local Search with a Hybrid Differential Privacy Model Brendan Avent, Aleksandra Korolova, David Zeber, Torgeir Hovden, Benjamin Livshits |
BLENDER: Enabling Local Search with a Hybrid Differential Privacy Model Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Understanding the Mirai Botnet Manos Antonakakis, Tim April, Michael Bailey, Matt Bernhard, Elie Bursztein, Jaime Cochran, Zakir Durumeric, J. Alex Halderman, Luca Invernizzi, Michalis Kallitsis, Deepak Kumar, Chaz Lever, Zane Ma, Joshua Mason, Damian Menscher, Chad Seaman, Nick Sullivan, Kurt Thomas, Yi Zhou |
Understanding the Mirai Botnet Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Not able to share produced artifacts
Verification:
Authors have
verified
information
|
DeTor: Provably Avoiding Geographic Regions in Tor Zhihao Li, Stephen Herwig, Dave Levin |
DeTor: Provably Avoiding Geographic Regions in Tor Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Game of Registrars: An Empirical Analysis of Post-Expiration Domain Name Takeovers Tobias Lauinger, Abdelberi Chaabane, Ahmet Salih Buyukkayhan, Kaan Onarlioglu, William Robertson |
Game of Registrars: An Empirical Analysis of Post-Expiration Domain Name Takeovers Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Strong and Efficient Cache Side-Channel Protection using Hardware Transactional Memory Daniel Gruss, Julian Lettner, Felix Schuster, Olga Ohrimenko, István Haller, Manuel Costa |
Strong and Efficient Cache Side-Channel Protection using Hardware Transactional Memory Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Detecting Credential Spearphishing in Enterprise Settings Grant Ho, Aashish Sharma, Mobin Javed, Vern Paxson, David A. Wagner |
Detecting Credential Spearphishing in Enterprise Settings Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
SmartPool: Practical Decentralized Pooled Mining Loi Luu, Yaron Velner, Jason Teutsch, Prateek Saxena |
SmartPool: Practical Decentralized Pooled Mining Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
When the Weakest Link is Strong: Secure Collaboration in the Case of the Panama Papers Susan E. McGregor, Elizabeth Anne Watkins, Mahdi Nasrullah Al-Ameen, Kelly Caine, Franziska Roesner |
When the Weakest Link is Strong: Secure Collaboration in the Case of the Panama Papers Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Locally Differentially Private Protocols for Frequency Estimation Tianhao Wang, Jeremiah Blocki, Ninghui Li, Somesh Jha |
Locally Differentially Private Protocols for Frequency Estimation Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
David McCann, Elisabeth Oswald, Carolyn Whitnall |
Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Adaptive Android Kernel Live Patching Yue Chen, Yulong Zhang, Zhi Wang, Liangzhao Xia, Chenfu Bao, Tao Wei |
Adaptive Android Kernel Live Patching Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
ORide: A Privacy-Preserving yet Accountable Ride-Hailing Service Anh Pham, Italo Dacosta, Guillaume Endignoux, Juan Ramón Troncoso-Pastoriza, Kévin Huguenin, Jean-Pierre Hubaux |
ORide: A Privacy-Preserving yet Accountable Ride-Hailing Service Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
On the effectiveness of mitigations against floating-point timing channels David Kohlbrenner, Hovav Shacham |
On the effectiveness of mitigations against floating-point timing channels Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Exploring User Perceptions of Discrimination in Online Targeted Advertising Angelisa C. Plane, Elissa M. Redmiles, Michelle L. Mazurek, Michael Carl Tschantz |
Exploring User Perceptions of Discrimination in Online Targeted Advertising Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Dead Store Elimination (Still) Considered Harmful Zhaomo Yang, Brian Johannesmeyer, Anders Trier Olesen, Sorin Lerner, Kirill Levchenko |
Dead Store Elimination (Still) Considered Harmful Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Malton: Towards On-Device Non-Invasive Mobile Malware Analysis for ART Lei Xue, Yajin Zhou, Ting Chen, Xiapu Luo, Guofei Gu |
Malton: Towards On-Device Non-Invasive Mobile Malware Analysis for ART Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
ROTE: Rollback Protection for Trusted Execution Sinisa Matetic, Mansoor Ahmed, Kari Kostiainen, Aritra Dhar, David M. Sommer, Arthur Gervais, Ari Juels, Srdjan Capkun |
ROTE: Rollback Protection for Trusted Execution Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Venerable Variadic Vulnerabilities Vanquished Priyam Biswas, Alessandro Di Federico, Scott A. Carr, Prabhu Rajasekaran, Stijn Volckaert, Yeoul Na, Michael Franz, Mathias Payer |
Venerable Variadic Vulnerabilities Vanquished Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Global Measurement of DNS Manipulation Paul Pearce, Ben Jones, Frank Li, Roya Ensafi, Nick Feamster, Nicholas Weaver, Vern Paxson |
Global Measurement of DNS Manipulation Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
CacheD: Identifying Cache-Based Timing Channels in Production Software Shuai Wang, Pei Wang, Xiao Liu, Danfeng Zhang, Dinghao Wu |
CacheD: Identifying Cache-Based Timing Channels in Production Software Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A Privacy Analysis of Cross-device Tracking Sebastian Zimmeck, Jie S. Li, Hyungtae Kim, Steven M. Bellovin, Tony Jebara |
A Privacy Analysis of Cross-device Tracking Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
TrustBase: An Architecture to Repair and Strengthen Certificate-based Authentication Mark O'Neill, Scott Heidbrink, Scott Ruoti, Jordan Whitehead, Dan Bunker, Luke Dickinson, Travis Hendershot, Joshua Reynolds, Kent E. Seamons, Daniel Zappala |
TrustBase: An Architecture to Repair and Strengthen Certificate-based Authentication Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Identifier Binding Attacks and Defenses in Software-Defined Networks Samuel Jero, William Koch, Richard Skowyra, Hamed Okhravi, Cristina Nita-Rotaru, David Bigelow |
Identifier Binding Attacks and Defenses in Software-Defined Networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Measuring the Insecurity of Mobile Deep Links of Android Fang Liu, Chun Wang, Andres Pico, Danfeng Yao, Gang Wang |
Measuring the Insecurity of Mobile Deep Links of Android Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Characterizing the Nature and Dynamics of Tor Exit Blocking Rachee Singh, Rishab Nithyanand, Sadia Afroz, Paul Pearce, Michael Carl Tschantz, Phillipa Gill, Vern Paxson |
Characterizing the Nature and Dynamics of Tor Exit Blocking Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data Md Nahid Hossain, Sadegh M. Milajerdi, Junao Wang, Birhanu Eshete, Rigel Gjomemo, R. Sekar, Scott D. Stoller, V. N. Venkatakrishnan |
SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Detecting Android Root Exploits by Learning from Root Providers Ioannis Gasparis, Zhiyun Qian, Chengyu Song, Srikanth V. Krishnamurthy |
Detecting Android Root Exploits by Learning from Root Providers Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Qapla: Policy compliance for database-backed systems Aastha Mehta, Eslam Elnikety, Katura Harvey, Deepak Garg, Peter Druschel |
Qapla: Policy compliance for database-backed systems Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
REM: Resource-Efficient Mining for Blockchains Fan Zhang, Ittay Eyal, Robert Escriva, Ari Juels, Robbert van Renesse |
REM: Resource-Efficient Mining for Blockchains Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
AutoLock: Why Cache Attacks on ARM Are Harder Than You Think Marc Green, Leandro Rodrigues Lima, Andreas Zankl, Gorka Irazoqui, Johann Heyszl, Thomas Eisenbarth |
AutoLock: Why Cache Attacks on ARM Are Harder Than You Think Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Transcend: Detecting Concept Drift in Malware Classification Models Roberto Jordaney, Kumar Sharad, Santanu Kumar Dash, Zhi Wang, Davide Papini, Ilia Nouretdinov, Lorenzo Cavallaro |
Transcend: Detecting Concept Drift in Malware Classification Models Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
USB Snooping Made Easy: Crosstalk Leakage Attacks on USB Hubs Yang Su, Daniel Genkin, Damith Chinthana Ranasinghe, Yuval Yarom |
USB Snooping Made Easy: Crosstalk Leakage Attacks on USB Hubs Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Same-Origin Policy: Evaluation in Modern Browsers Jörg Schwenk, Marcus Niemietz, Christian Mainka |
Same-Origin Policy: Evaluation in Modern Browsers Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
MCMix: Anonymous Messaging via Secure Multiparty Computation Nikolaos Alexopoulos, Aggelos Kiayias, Riivo Talviste, Thomas Zacharias |
MCMix: Anonymous Messaging via Secure Multiparty Computation Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Kirill Nikitin, Eleftherios Kokoris-Kogias, Philipp Jovanovic, Nicolas Gailly, Linus Gasser, Ismail Khoffi, Justin Cappos, Bryan Ford |
Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Phoenix: Rebirth of a Cryptographic Password-Hardening Service Russell W. F. Lai, Christoph Egger, Dominique Schröder, Sherman S. M. Chow |
Phoenix: Rebirth of a Cryptographic Password-Hardening Service Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels Sergej Schumilo, Cornelius Aschermann, Robert Gawlik, Sebastian Schinzel, Thorsten Holz |
kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Vale: Verifying High-Performance Cryptographic Assembly Code Barry Bond, Chris Hawblitzel, Manos Kapritsos, K. Rustan M. Leino, Jacob R. Lorch, Bryan Parno, Ashay Rane, Srinath T. V. Setty, Laure Thompson |
Vale: Verifying High-Performance Cryptographic Assembly Code Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
DR. CHECKER: A Soundy Analysis for Linux Kernel Drivers Aravind Machiry, Chad Spensky, Jake Corina, Nick Stephens, Christopher Kruegel, Giovanni Vigna |
DR. CHECKER: A Soundy Analysis for Linux Kernel Drivers Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
CCSP: Controlled Relaxation of Content Security Policies by Runtime Policy Composition Stefano Calzavara, Alvise Rabitti, Michele Bugliesi |
CCSP: Controlled Relaxation of Content Security Policies by Runtime Policy Composition Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Constant-Time Callees with Variable-Time Callers Cesar Pereida García, Billy Bob Brumley |
Constant-Time Callees with Variable-Time Callers Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A Longitudinal, End-to-End View of the DNSSEC Ecosystem Taejoong Chung, Roland van Rijswijk-Deij, Balakrishnan Chandrasekaran, David R. Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Christo Wilson |
A Longitudinal, End-to-End View of the DNSSEC Ecosystem Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
HELP: Helper-Enabled In-Band Device Pairing Resistant Against Signal Cancellation Nirnimesh Ghose, Loukas Lazos, Ming Li |
HELP: Helper-Enabled In-Band Device Pairing Resistant Against Signal Cancellation Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
MPI: Multiple Perspective Attack Investigation with Semantic Aware Execution Partitioning Shiqing Ma, Juan Zhai, Fei Wang, Kyu Hyung Lee, Xiangyu Zhang, Dongyan Xu |
MPI: Multiple Perspective Attack Investigation with Semantic Aware Execution Partitioning Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
How the Web Tangled Itself: Uncovering the History of Client-Side Web (In)Security Ben Stock, Martin Johns, Marius Steffens, Michael Backes |
How the Web Tangled Itself: Uncovering the History of Client-Side Web (In)Security Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
PDF Mirage: Content Masking Attack Against Information-Based Online Services Ian D. Markwood, Dakun Shen, Yao Liu, Zhuo Lu |
PDF Mirage: Content Masking Attack Against Information-Based Online Services Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Oscar: A Practical Page-Permissions-Based Scheme for Thwarting Dangling Pointers Thurston H. Y. Dang, Petros Maniatis, David A. Wagner |
Oscar: A Practical Page-Permissions-Based Scheme for Thwarting Dangling Pointers Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
PlatPal: Detecting Malicious Documents with Platform Diversity Meng Xu, Taesoo Kim |
PlatPal: Detecting Malicious Documents with Platform Diversity Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Reverse Engineering x86 Processor Microcode Philipp Koppe, Benjamin Kollenda, Marc Fyrbiak, Christian Kison, Robert Gawlik, Christof Paar, Thorsten Holz |
Reverse Engineering x86 Processor Microcode Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Syntia: Synthesizing the Semantics of Obfuscated Code Tim Blazytko, Moritz Contag, Cornelius Aschermann, Thorsten Holz |
Syntia: Synthesizing the Semantics of Obfuscated Code Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Ensuring Authorized Updates in Multi-user Database-Backed Applications Kevin Eykholt, Atul Prakash, Barzan Mozafari |
Ensuring Authorized Updates in Multi-user Database-Backed Applications Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
BootStomp: On the Security of Bootloaders in Mobile Devices Nilo Redini, Aravind Machiry, Dipanjan Das, Yanick Fratantonio, Antonio Bianchi, Eric Gustafson, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna |
BootStomp: On the Security of Bootloaders in Mobile Devices Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
SmartAuth: User-Centered Authorization for the Internet of Things Yuan Tian, Nan Zhang, Yue-Hsun Lin, XiaoFeng Wang, Blase Ur, Xianzheng Guo, Patrick Tague |
SmartAuth: User-Centered Authorization for the Internet of Things Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
BinSim: Trace-based Semantic Binary Diffing via System Call Sliced Segment Equivalence Checking Jiang Ming, Dongpeng Xu, Yufei Jiang, Dinghao Wu |
BinSim: Trace-based Semantic Binary Diffing via System Call Sliced Segment Equivalence Checking Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Measuring HTTPS Adoption on the Web Adrienne Porter Felt, Richard Barnes, April King, Chris Palmer, Chris Bentzel, Parisa Tabriz |
Measuring HTTPS Adoption on the Web Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Speeding up detection of SHA-1 collision attacks using unavoidable attack conditions Marc Stevens, Daniel Shumow |
Speeding up detection of SHA-1 collision attacks using unavoidable attack conditions Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Telling Your Secrets without Page Faults: Stealthy Page Table-Based Attacks on Enclaved Execution Jo Van Bulck, Nico Weichbrodt, Rüdiger Kapitza, Frank Piessens, Raoul Strackx |
Telling Your Secrets without Page Faults: Stealthy Page Table-Based Attacks on Enclaved Execution Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Digtool: A Virtualization-Based Framework for Detecting Kernel Vulnerabilities Jianfeng Pan, Guanglu Yan, Xiaocao Fan |
Digtool: A Virtualization-Based Framework for Detecting Kernel Vulnerabilities Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Christian Bayens, Tuan Le, Luis Garcia, Raheem A. Beyah, Mehdi Javanmard, Saman A. Zonouz |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts Jun Xu, Dongliang Mu, Xinyu Xing, Peng Liu, Ping Chen, Bing Mao |
Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Beauty and the Burst: Remote Identification of Encrypted Video Streams Roei Schuster, Vitaly Shmatikov, Eran Tromer |
Beauty and the Burst: Remote Identification of Encrypted Video Streams Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|