The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "NDSS"( http://dblp.L3S.de/Venues/NDSS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/ndss

Publication years (Num. hits)
1995 (18) 1996 (18) 1997 (15) 1998 (22) 1999 (24) 2000 (16) 2001 (19) 2002 (16) 2003 (18) 2004 (17) 2005 (17) 2006 (18) 2007 (18) 2008 (22) 2009 (21) 2010 (25) 2011 (29) 2012 (55) 2013 (65) 2014 (56) 2015 (51) 2016 (62) 2017 (69) 2018 (72) 2019 (91) 2020 (90) 2021 (88) 2022 (84) 2023 (95)
Publication types (Num. hits)
inproceedings(1182) proceedings(29)
Venues (Conferences, Journals, ...)
NDSS(1211)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 1211 publication records. Showing 1211 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Yuan Xiao 0001, Yinqian Zhang, Radu Teodorescu SPEECHMINER: A Framework for Investigating and Measuring Speculative Execution Vulnerabilities. Search on Bibsonomy NDSS The full citation details ... 2020 DBLP  BibTeX  RDF
1Sergey Frolov, Jack Wampler, Eric Wustrow Detecting Probe-resistant Proxies. Search on Bibsonomy NDSS The full citation details ... 2020 DBLP  BibTeX  RDF
1Shivam Bhasin, Anupam Chattopadhyay, Annelie Heuser, Dirmanto Jap, Stjepan Picek, Ritu Ranjan Shrivastwa Mind the Portability: A Warriors Guide through Realistic Profiled Side-channel Analysis. Search on Bibsonomy NDSS The full citation details ... 2020 DBLP  BibTeX  RDF
1Daniel Perez 0001, Benjamin Livshits Broken Metre: Attacking Resource Metering in EVM. Search on Bibsonomy NDSS The full citation details ... 2020 DBLP  BibTeX  RDF
1Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Mohamed Ali Kâafar On the Resilience of Biometric Authentication Systems against Random Inputs. Search on Bibsonomy NDSS The full citation details ... 2020 DBLP  BibTeX  RDF
1Dimitrios Sikeridis, Panos Kampanakis, Michael Devetsikiotis Post-Quantum Authentication in TLS 1.3: A Performance Study. Search on Bibsonomy NDSS The full citation details ... 2020 DBLP  BibTeX  RDF
1Faysal Hossain Shezan, Kaiming Cheng, Zhen Zhang, Yinzhi Cao, Yuan Tian 0001 TKPERM: Cross-platform Permission Knowledge Transfer to Detect Overprivileged Third-party Applications. Search on Bibsonomy NDSS The full citation details ... 2020 DBLP  BibTeX  RDF
1Jared M. Smith, Kyle Birkeland, Tyler McDaniel, Max Schuchard Withdrawing the BGP Re-Routing Curtain: Understanding the Security Impact of BGP Poisoning through Real-World Measurements. Search on Bibsonomy NDSS The full citation details ... 2020 DBLP  BibTeX  RDF
1Alireza Bahramali, Amir Houmansadr, Ramin Soltani, Dennis Goeckel, Don Towsley Practical Traffic Analysis Attacks on Secure Messaging Applications. Search on Bibsonomy NDSS The full citation details ... 2020 DBLP  BibTeX  RDF
1 27th Annual Network and Distributed System Security Symposium, NDSS 2020, San Diego, California, USA, February 23-26, 2020 Search on Bibsonomy NDSS The full citation details ... 2020 DBLP  BibTeX  RDF
1Sivaramakrishnan Ramanathan, Jelena Mirkovic, Minlan Yu BLAG: Improving the Accuracy of Blacklists. Search on Bibsonomy NDSS The full citation details ... 2020 DBLP  BibTeX  RDF
1Ioannis Demertzis, Javad Ghareh Chamani, Dimitrios Papadopoulos 0001, Charalampos Papamanthou Dynamic Searchable Encryption with Small Client Storage. Search on Bibsonomy NDSS The full citation details ... 2020 DBLP  BibTeX  RDF
1Soroush Karami, Panagiotis Ilia, Konstantinos Solomos, Jason Polakis Carnus: Exploring the Privacy Threats of Browser Extension Fingerprinting. Search on Bibsonomy NDSS The full citation details ... 2020 DBLP  BibTeX  RDF
1Giada Stivala, Giancarlo Pellegrino Deceptive Previews: A Study of the Link Preview Trustworthiness in Social Platforms. Search on Bibsonomy NDSS The full citation details ... 2020 DBLP  BibTeX  RDF
1Matthew Smith 0006, Martin Strohmeier, Jon Harman, Vincent Lenders, Ivan Martinovic A View from the Cockpit: Exploring Pilot Reactions to Attacks on Avionic Systems. Search on Bibsonomy NDSS The full citation details ... 2020 DBLP  BibTeX  RDF
1Yanhao Wang, Xiangkun Jia, Yuwei Liu, Kyle Zeng, Tiffany Bao, Dinghao Wu, Purui Su Not All Coverage Measurements Are Equal: Fuzzing by Coverage Accounting for Input Prioritization. Search on Bibsonomy NDSS The full citation details ... 2020 DBLP  BibTeX  RDF
1Victor Le Pochat, Tim Van hamme, Sourena Maroofi, Tom van Goethem, Davy Preuveneers, Andrzej Duda, Wouter Joosen, Maciej Korczynski A Practical Approach for Taking Down Avalanche Botnets Under Real-World Constraints. Search on Bibsonomy NDSS The full citation details ... 2020 DBLP  BibTeX  RDF
1William Blair, Andrea Mambretti, Sajjad Arshad, Michael Weissbacher, William Robertson 0002, Engin Kirda, Manuel Egele HotFuzz: Discovering Algorithmic Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing. Search on Bibsonomy NDSS The full citation details ... 2020 DBLP  BibTeX  RDF
1Qiushi Wu, Yang He, Stephen McCamant, Kangjie Lu Precisely Characterizing Security Impact in a Flood of Patches via Symbolic Rule Comparison. Search on Bibsonomy NDSS The full citation details ... 2020 DBLP  BibTeX  RDF
1Shiqing Luo, Anh Nguyen, Chen Song 0001, Feng Lin 0004, Wenyao Xu, Zhisheng Yan OcuLock: Exploring Human Visual System for Authentication in Virtual Reality Head-mounted Display. Search on Bibsonomy NDSS The full citation details ... 2020 DBLP  BibTeX  RDF
1Qi Wang 0017, Wajih Ul Hassan, Ding Li 0001, Kangkook Jee, Xiao Yu 0007, Kexuan Zou, Junghwan Rhee, Zhengzhang Chen, Wei Cheng 0002, Carl A. Gunter, Haifeng Chen You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis. Search on Bibsonomy NDSS The full citation details ... 2020 DBLP  BibTeX  RDF
1Taekjin Lee, Seongil Wi, Suyoung Lee, Sooel Son FUSE: Finding File Upload Bugs via Penetration Testing. Search on Bibsonomy NDSS The full citation details ... 2020 DBLP  BibTeX  RDF
1Kyungtae Kim, Dae R. Jeong, Chung Hwan Kim, Yeongjin Jang, Insik Shin, Byoungyoung Lee HFL: Hybrid Fuzzing on the Linux Kernel. Search on Bibsonomy NDSS The full citation details ... 2020 DBLP  BibTeX  RDF
1Takuya Watanabe 0001, Eitaro Shioji, Mitsuaki Akiyama, Tatsuya Mori Melting Pot of Origins: Compromising the Intermediary Web Services that Rehost Websites. Search on Bibsonomy NDSS The full citation details ... 2020 DBLP  BibTeX  RDF
1Ram Sundara Raman, Adrian Stoll, Jakub Dalek, Reethika Ramesh, Will Scott, Roya Ensafi Measuring the Deployment of Network Censorship Filters at Global Scale. Search on Bibsonomy NDSS The full citation details ... 2020 DBLP  BibTeX  RDF
1Ben Gras, Cristiano Giuffrida, Michael Kurth, Herbert Bos, Kaveh Razavi ABSynthe: Automatic Blackbox Side-channel Synthesis on Commodity Microarchitectures. Search on Bibsonomy NDSS The full citation details ... 2020 DBLP  BibTeX  RDF
1Zhenfeng Zhang, Yuchen Wang, Kang Yang 0002 Strong Authentication without Temper-Resistant Hardware and Application to Federated Identities. Search on Bibsonomy NDSS The full citation details ... 2020 DBLP  BibTeX  RDF
1Weikeng Chen, Raluca Ada Popa Metal: A Metadata-Hiding File-Sharing System. Search on Bibsonomy NDSS The full citation details ... 2020 DBLP  BibTeX  RDF
1Venkat Arun, Aniket Kate, Deepak Garg 0001, Peter Druschel, Bobby Bhattacharjee Finding Safety in Numbers with Secure Allegation Escrows. Search on Bibsonomy NDSS The full citation details ... 2020 DBLP  BibTeX  RDF
1Arpita Patra, Ajith Suresh BLAZE: Blazing Fast Privacy-Preserving Machine Learning. Search on Bibsonomy NDSS The full citation details ... 2020 DBLP  BibTeX  RDF
1Honggang Yu, Kaichen Yang, Teng Zhang 0002, Yun-Yun Tsai, Tsung-Yi Ho, Yier Jin CloudLeak: Large-Scale Deep Learning Models Stealing Through Adversarial Examples. Search on Bibsonomy NDSS The full citation details ... 2020 DBLP  BibTeX  RDF
1Jonghoon Kwon, Taeho Lee 0003, Claude Hähni, Adrian Perrig SVLAN: Secure & Scalable Network Virtualization. Search on Bibsonomy NDSS The full citation details ... 2020 DBLP  BibTeX  RDF
1Peter Ney, Luis Ceze, Tadayoshi Kohno Genotype Extraction and False Relative Attacks: Security Risks to Third-Party Genetic Genealogy Services Beyond Identity Inference. Search on Bibsonomy NDSS The full citation details ... 2020 DBLP  BibTeX  RDF
1Qiben Yan, Kehai Liu, Qin Zhou, Hanqing Guo, Ning Zhang 0017 SurfingAttack: Interactive Hidden Attack on Voice Assistants Using Ultrasonic Guided Waves. Search on Bibsonomy NDSS The full citation details ... 2020 DBLP  BibTeX  RDF
1Tao Chen 0033, Longfei Shangguan, Zhenjiang Li, Kyle Jamieson Metamorph: Injecting Inaudible Commands into Over-the-air Voice Controlled Systems. Search on Bibsonomy NDSS The full citation details ... 2020 DBLP  BibTeX  RDF
1Jonas Böhler, Florian Kerschbaum Secure Sublinear Time Differentially Private Median Computation. Search on Bibsonomy NDSS The full citation details ... 2020 DBLP  BibTeX  RDF
1Vasilios Mavroudis, Karl Wüst, Aritra Dhar, Kari Kostiainen, Srdjan Capkun Snappy: Fast On-chain Payments with Practical Collaterals. Search on Bibsonomy NDSS The full citation details ... 2020 DBLP  BibTeX  RDF
1David Rupprecht, Katharina Kohls, Thorsten Holz, Christina Pöpper IMP4GT: IMPersonation Attacks in 4G NeTworks. Search on Bibsonomy NDSS The full citation details ... 2020 DBLP  BibTeX  RDF
1Thijs van Ede, Riccardo Bortolameotti, Andrea Continella, Jingjing Ren, Daniel J. Dubois, Martina Lindorfer, David R. Choffnes, Maarten van Steen, Andreas Peter FlowPrint: Semi-Supervised Mobile-App Fingerprinting on Encrypted Network Traffic. Search on Bibsonomy NDSS The full citation details ... 2020 DBLP  BibTeX  RDF
1Saeid Tizpaz-Niari, Pavol Cerný, Ashutosh Trivedi 0001 Data-Driven Debugging for Functional Side Channels. Search on Bibsonomy NDSS The full citation details ... 2020 DBLP  BibTeX  RDF
1Kyungho Joo, Wonsuk Choi, Dong Hoon Lee 0001 Hold the Door! Fingerprinting Your Car Key to Prevent Keyless Entry Car Theft. Search on Bibsonomy NDSS The full citation details ... 2020 DBLP  BibTeX  RDF
1Run Guo, Weizhong Li, Baojun Liu, Shuang Hao, Jia Zhang 0004, Haixin Duan, Kaiwen Sheng, Jianjun Chen 0005, Ying Liu 0024 CDN Judo: Breaking the CDN DoS Protection with Itself. Search on Bibsonomy NDSS The full citation details ... 2020 DBLP  BibTeX  RDF
1Harsh Chaudhari, Rahul Rachuri, Ajith Suresh Trident: Efficient 4PC Framework for Privacy Preserving Machine Learning. Search on Bibsonomy NDSS The full citation details ... 2020 DBLP  BibTeX  RDF
1Runqing Yang, Shiqing Ma, Haitao Xu 0002, Xiangyu Zhang 0001, Yan Chen 0004 UIScope: Accurate, Instrumentation-free, and Visible Attack Investigation for GUI Applications. Search on Bibsonomy NDSS The full citation details ... 2020 DBLP  BibTeX  RDF
1Reethika Ramesh, Ram Sundara Raman, Matthew Bernhard, Victor Ongkowijaya, Leonid Evdokimov, Anne Edmundson, Steven Sprecher, Muhammad Ikram, Roya Ensafi Decentralized Control: A Case Study of Russia. Search on Bibsonomy NDSS The full citation details ... 2020 DBLP  BibTeX  RDF
1Hojjat Aghakhani, Fabio Gritti, Francesco Mecca, Martina Lindorfer, Stefano Ortolani, Davide Balzarotti, Giovanni Vigna, Christopher Kruegel When Malware is Packin' Heat; Limits of Machine Learning Classifiers Based on Static Analysis Features. Search on Bibsonomy NDSS The full citation details ... 2020 DBLP  BibTeX  RDF
1Tianhao Wang 0001, Milan Lopuhaä-Zwakenberg, Zitao Li, Boris Skoric, Ninghui Li Locally Differentially Private Frequency Estimation with Consistency. Search on Bibsonomy NDSS The full citation details ... 2020 DBLP  BibTeX  RDF
1Alessandro Mantovani, Simone Aonzo, Xabier Ugarte-Pedrero, Alessio Merlo, Davide Balzarotti Prevalence and Impact of Low-Entropy Packing Schemes in the Malware Ecosystem. Search on Bibsonomy NDSS The full citation details ... 2020 DBLP  BibTeX  RDF
1Teemu Rytilahti, Thorsten Holz On Using Application-Layer Middlebox Protocols for Peeking Behind NAT Gateways. Search on Bibsonomy NDSS The full citation details ... 2020 DBLP  BibTeX  RDF
1Avinash Sudhodanan, Soheil Khodayari, Juan Caballero Cross-Origin State Inference (COSI) Attacks: Leaking Web Site States through XS-Leaks. Search on Bibsonomy NDSS The full citation details ... 2020 DBLP  BibTeX  RDF
1Parinya Ekparinya, Vincent Gramoli, Guillaume Jourjon The Attack of the Clones Against Proof-of-Authority. Search on Bibsonomy NDSS The full citation details ... 2020 DBLP  BibTeX  RDF
1Hui Lin, Jianing Zhuang, Yih-Chun Hu, Huayu Zhou DefRec: Establishing Physical Function Virtualization to Disrupt Reconnaissance of Power Grids' Cyber-Physical Infrastructures. Search on Bibsonomy NDSS The full citation details ... 2020 DBLP  BibTeX  RDF
1Aritra Dhar, Enis Ulqinaku, Kari Kostiainen, Srdjan Capkun ProtectIOn: Root-of-Trust for IO in Compromised Platforms. Search on Bibsonomy NDSS The full citation details ... 2020 DBLP  BibTeX  RDF
1Yanzi Zhu, Zhujun Xiao, Yuxin Chen 0001, Zhijing Li 0001, Max Liu, Ben Y. Zhao, Heather Zheng Et Tu Alexa? When Commodity WiFi Devices Turn into Adversarial Motion Sensors. Search on Bibsonomy NDSS The full citation details ... 2020 DBLP  BibTeX  RDF
1Ren Ding 0001, Hong Hu 0004, Wen Xu 0002, Taesoo Kim DESENSITIZATION: Privacy-Aware and Attack-Preserving Crash Report. Search on Bibsonomy NDSS The full citation details ... 2020 DBLP  BibTeX  RDF
1Trevor Smith, Luke Dickenson, Kent E. Seamons Let's Revoke: Scalable Global Certificate Revocation. Search on Bibsonomy NDSS The full citation details ... 2020 DBLP  BibTeX  RDF
1Riccardo Paccagnella, Pubali Datta, Wajih Ul Hassan, Adam Bates 0001, Christopher W. Fletcher, Andrew Miller, Dave Tian Custos: Practical Tamper-Evident Auditing of Operating Systems Using Trusted Execution. Search on Bibsonomy NDSS The full citation details ... 2020 DBLP  BibTeX  RDF
1Daimeng Wang, Ajaya Neupane, Zhiyun Qian, Nael B. Abu-Ghazaleh, Srikanth V. Krishnamurthy, Edward J. M. Colbert, Paul L. Yu Unveiling your keystrokes: A Cache-based Side-channel Attack on Graphics Libraries. Search on Bibsonomy NDSS The full citation details ... 2019 DBLP  BibTeX  RDF
1Dokyung Song, Felicitas Hetzelt, Dipanjan Das 0002, Chad Spensky, Yeoul Na, Stijn Volckaert, Giovanni Vigna, Christopher Kruegel, Jean-Pierre Seifert, Michael Franz PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary. Search on Bibsonomy NDSS The full citation details ... 2019 DBLP  BibTeX  RDF
1Abdallah Dawoud, Sven Bugiel DroidCap: OS Support for Capability-based Permissions in Android. Search on Bibsonomy NDSS The full citation details ... 2019 DBLP  BibTeX  RDF
1Jaeho Lee, Ang Chen 0001, Dan S. Wallach Total Recall: Persistence of Passwords in Android. Search on Bibsonomy NDSS The full citation details ... 2019 DBLP  BibTeX  RDF
1Victor Le Pochat, Tom van Goethem, Samaneh Tajalizadehkhoob, Maciej Korczynski, Wouter Joosen Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation. Search on Bibsonomy NDSS The full citation details ... 2019 DBLP  BibTeX  RDF
1Cas Cremers, Martin Dehnel-Wild Component-Based Formal Analysis of 5G-AKA: Channel Assumptions and Session Confusion. Search on Bibsonomy NDSS The full citation details ... 2019 DBLP  BibTeX  RDF
1Inken Hagestedt, Yang Zhang 0016, Mathias Humbert, Pascal Berrang, Haixu Tang, XiaoFeng Wang 0001, Michael Backes 0001 MBeacon: Privacy-Preserving Beacons for DNA Methylation Data. Search on Bibsonomy NDSS The full citation details ... 2019 DBLP  BibTeX  RDF
1Sze Yiu Chau, Moosa Yahyazadeh, Omar Chowdhury, Aniket Kate, Ninghui Li Analyzing Semantic Correctness with Symbolic Execution: A Case Study on PKCS#1 v1.5 Signature Verification. Search on Bibsonomy NDSS The full citation details ... 2019 DBLP  BibTeX  RDF
1Cormac Herley, Stuart E. Schechter Distinguishing Attacks from Legitimate Authentication Traffic at Scale. Search on Bibsonomy NDSS The full citation details ... 2019 DBLP  BibTeX  RDF
1Zheng Leong Chua, Yanhao Wang, Teodora Baluta, Prateek Saxena, Zhenkai Liang, Purui Su One Engine To Serve 'em All: Inferring Taint Rules Without Architectural Semantics. Search on Bibsonomy NDSS The full citation details ... 2019 DBLP  BibTeX  RDF
1Victor Perrier, Hassan Jameel Asghar, Dali Kaafar Private Continual Release of Real-Valued Data Streams. Search on Bibsonomy NDSS The full citation details ... 2019 DBLP  BibTeX  RDF
1Luis Vargas, Logan Blue, Vanessa Frost, Christopher Patton, Nolen Scaife, Kevin R. B. Butler, Patrick Traynor Digital Healthcare-Associated Infection: A Case Study on the Security of a Major Multi-Campus Hospital System. Search on Bibsonomy NDSS The full citation details ... 2019 DBLP  BibTeX  RDF
1Marius Steffens, Christian Rossow, Martin Johns, Ben Stock Don't Trust The Locals: Investigating the Prevalence of Persistent Client-Side Cross-Site Scripting in the Wild. Search on Bibsonomy NDSS The full citation details ... 2019 DBLP  BibTeX  RDF
1 26th Annual Network and Distributed System Security Symposium, NDSS 2019, San Diego, California, USA, February 24-27, 2019 Search on Bibsonomy NDSS The full citation details ... 2019 DBLP  BibTeX  RDF
1Yangyong Zhang, Lei Xu 0024, Abner Mendoza, Guangliang Yang 0001, Phakpoom Chinprutthiwong, Guofei Gu Life after Speech Recognition: Fuzzing Semantic Misinterpretation for Voice Assistant Applications. Search on Bibsonomy NDSS The full citation details ... 2019 DBLP  BibTeX  RDF
1Hyunwoo Lee 0001, Zach Smith, Junghwan Lim, Gyeongjae Choi, Selin Chun, Taejoong Chung, Ted Taekyoung Kwon maTLS: How to Make TLS middlebox-aware? Search on Bibsonomy NDSS The full citation details ... 2019 DBLP  BibTeX  RDF
1Cheng Feng 0004, Venkata Reddy Palleti, Aditya Mathur, Deeph Chana A Systematic Framework to Generate Invariants for Anomaly Detection in Industrial Control Systems. Search on Bibsonomy NDSS The full citation details ... 2019 DBLP  BibTeX  RDF
1Milad Nasr, Sadegh Farhang, Amir Houmansadr, Jens Grossklags Enemy At the Gateways: Censorship-Resilient Proxy Distribution Using Game Theory. Search on Bibsonomy NDSS The full citation details ... 2019 DBLP  BibTeX  RDF
1Qingchuan Zhao, Chaoshun Zuo, Giancarlo Pellegrino, Zhiqiang Lin Geo-locating Drivers: A Study of Sensitive Data Leakage in Ride-Hailing Services. Search on Bibsonomy NDSS The full citation details ... 2019 DBLP  BibTeX  RDF
1Min Hong Yun, Lin Zhong 0001 Ginseng: Keeping Secrets in Registers When You Distrust the Operating System. Search on Bibsonomy NDSS The full citation details ... 2019 DBLP  BibTeX  RDF
1Sina Faezi, Sujit Rokka Chhetri, Arnav Vaibhav Malawade, John Charles Chaput, William H. Grover, Philip Brisk, Mohammad Abdullah Al Faruque Oligo-Snoop: A Non-Invasive Side Channel Attack Against DNA Synthesis Machines. Search on Bibsonomy NDSS The full citation details ... 2019 DBLP  BibTeX  RDF
1Lea Schönherr, Katharina Kohls, Steffen Zeiler, Thorsten Holz, Dorothea Kolossa Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding. Search on Bibsonomy NDSS The full citation details ... 2019 DBLP  BibTeX  RDF
1Meng Luo 0002, Pierre Laperdrix, Nima Honarmand, Nick Nikiforakis Time Does Not Heal All Wounds: A Longitudinal Analysis of Security-Mechanism Support in Mobile Browsers. Search on Bibsonomy NDSS The full citation details ... 2019 DBLP  BibTeX  RDF
1Bingsheng Zhang, Roman Oliynykov, Hamed Balogun A Treasury System for Cryptocurrencies: Enabling Better Collaborative Intelligence. Search on Bibsonomy NDSS The full citation details ... 2019 DBLP  BibTeX  RDF
1Hadi Abdullah, Washington Garcia, Christian Peeters, Patrick Traynor, Kevin R. B. Butler, Joseph Wilson Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems. Search on Bibsonomy NDSS The full citation details ... 2019 DBLP  BibTeX  RDF
1Michael Rodler, Wenting Li, Ghassan O. Karame, Lucas Davi Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks. Search on Bibsonomy NDSS The full citation details ... 2019 DBLP  BibTeX  RDF
1Jack Wampler, Ian Martiny, Eric Wustrow ExSpectre: Hiding Malware in Speculative Execution. Search on Bibsonomy NDSS The full citation details ... 2019 DBLP  BibTeX  RDF
1Ahmed Salem 0001, Yang Zhang 0016, Mathias Humbert, Pascal Berrang, Mario Fritz, Michael Backes 0001 ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models. Search on Bibsonomy NDSS The full citation details ... 2019 DBLP  BibTeX  RDF
1Virgil D. Gligor, Shan Leung Maverick Woo Establishing Software Root of Trust Unconditionally. Search on Bibsonomy NDSS The full citation details ... 2019 DBLP  BibTeX  RDF
1Wajih Ul Hassan, Shengjian Guo, Ding Li 0001, Zhengzhang Chen, Kangkook Jee, Zhichun Li, Adam Bates 0001 NoDoze: Combatting Threat Alert Fatigue with Automated Provenance Triage. Search on Bibsonomy NDSS The full citation details ... 2019 DBLP  BibTeX  RDF
1Anastasis Keliris, Michail Maniatakos ICSREF: A Framework for Automated Reverse Engineering of Industrial Control Systems Binaries. Search on Bibsonomy NDSS The full citation details ... 2019 DBLP  BibTeX  RDF
1Samuel Weiser, Mario Werner, Ferdinand Brasser, Maja Malenko, Stefan Mangard, Ahmad-Reza Sadeghi TIMBER-V: Tag-Isolated Memory Bringing Fine-grained Enclaves to RISC-V. Search on Bibsonomy NDSS The full citation details ... 2019 DBLP  BibTeX  RDF
1Sergey Frolov, Eric Wustrow The use of TLS in Censorship Circumvention. Search on Bibsonomy NDSS The full citation details ... 2019 DBLP  BibTeX  RDF
1Tohid Shekari, Christian Bayens, Morris Cohen, Lukas Graber, Raheem Beyah RFDIDS: Radio Frequency-based Distributed Intrusion Detection System for the Power Grid. Search on Bibsonomy NDSS The full citation details ... 2019 DBLP  BibTeX  RDF
1Nicolás Rosner, Ismet Burak Kadron, Lucas Bang, Tevfik Bultan Profit: Detecting and Quantifying Side Channels in Networked Applications. Search on Bibsonomy NDSS The full citation details ... 2019 DBLP  BibTeX  RDF
1Orçun Çetin, Carlos Gañán, Lisette Altena, Takahiro Kasama, Daisuke Inoue, Kazuki Tamiya, Ying Tie, Katsunari Yoshioka, Michel van Eeten Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai. Search on Bibsonomy NDSS The full citation details ... 2019 DBLP  BibTeX  RDF
1Ke Coby Wang, Michael K. Reiter How to End Password Reuse on the Web. Search on Bibsonomy NDSS The full citation details ... 2019 DBLP  BibTeX  RDF
1Daniele Antonioli, Nils Ole Tippenhauer, Kasper Bonne Rasmussen Nearby Threats: Reversing, Analyzing, and Attacking Google's 'Nearby Connections' on Android. Search on Bibsonomy NDSS The full citation details ... 2019 DBLP  BibTeX  RDF
1Anrin Chakraborti, Adam J. Aviv, Seung Geol Choi, Travis Mayberry, Daniel S. Roche, Radu Sion rORAM: Efficient Range ORAM with O(log2 N) Locality. Search on Bibsonomy NDSS The full citation details ... 2019 DBLP  BibTeX  RDF
1Adil Ahmad, Byunggill Joe, Yuan Xiao 0001, Yinqian Zhang, Insik Shin, Byoungyoung Lee OBFUSCURO: A Commodity Obfuscation Engine on Intel SGX. Search on Bibsonomy NDSS The full citation details ... 2019 DBLP  BibTeX  RDF
1Cornelius Aschermann, Tommaso Frassetto, Thorsten Holz, Patrick Jauernig, Ahmad-Reza Sadeghi, Daniel Teuchert NAUTILUS: Fishing for Deep Bugs with Grammars. Search on Bibsonomy NDSS The full citation details ... 2019 DBLP  BibTeX  RDF
1HyungSeok Han, DongHyeon Oh, Sang Kil Cha CodeAlchemist: Semantics-Aware Code Generation to Find Vulnerabilities in JavaScript Engines. Search on Bibsonomy NDSS The full citation details ... 2019 DBLP  BibTeX  RDF
1Shiqing Ma, Yingqi Liu, Guanhong Tao 0001, Wen-Chuan Lee, Xiangyu Zhang 0001 NIC: Detecting Adversarial Samples with Neural Network Invariant Checking. Search on Bibsonomy NDSS The full citation details ... 2019 DBLP  BibTeX  RDF
Displaying result #301 - #400 of 1211 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license