The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "NDSS"( http://dblp.L3S.de/Venues/NDSS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/ndss

Publication years (Num. hits)
1995 (18) 1996 (18) 1997 (15) 1998 (22) 1999 (24) 2000 (16) 2001 (19) 2002 (16) 2003 (18) 2004 (17) 2005 (17) 2006 (18) 2007 (18) 2008 (22) 2009 (21) 2010 (25) 2011 (29) 2012 (55) 2013 (65) 2014 (56) 2015 (51) 2016 (62) 2017 (69) 2018 (72) 2019 (91) 2020 (90) 2021 (88) 2022 (84) 2023 (95)
Publication types (Num. hits)
inproceedings(1182) proceedings(29)
Venues (Conferences, Journals, ...)
NDSS(1211)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 1211 publication records. Showing 1211 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Xing Gao 0001, Zhang Xu, Haining Wang, Li Li 0064, Xiaorui Wang Reduced Cooling Redundancy: A New Security Vulnerability in a Hot Data Center. Search on Bibsonomy NDSS The full citation details ... 2018 DBLP  BibTeX  RDF
1Ding Wang 0002, Haibo Cheng, Ping Wang 0003, Jeff Yan, Xinyi Huang 0001 A Security Analysis of Honeywords. Search on Bibsonomy NDSS The full citation details ... 2018 DBLP  BibTeX  RDF
1Daniela Becker, Jorge Guajardo, Karl-Heinz Zimmermann Revisiting Private Stream Aggregation: Lattice-Based PSA. Search on Bibsonomy NDSS The full citation details ... 2018 DBLP  BibTeX  RDF
1Sajin Sasy, Sergey Gorbunov 0001, Christopher W. Fletcher ZeroTrace : Oblivious Memory Primitives from Intel SGX. Search on Bibsonomy NDSS The full citation details ... 2018 DBLP  BibTeX  RDF
1Yushan Liu 0004, Mu Zhang 0001, Ding Li 0001, Kangkook Jee, Zhichun Li, Zhenyu Wu, Junghwan Rhee, Prateek Mittal Towards a Timely Causality Analysis for Enterprise Security. Search on Bibsonomy NDSS The full citation details ... 2018 DBLP  BibTeX  RDF
1Andrea Biondo, Mauro Conti, Daniele Lain Back To The Epilogue: Evading Control Flow Guard via Unaligned Targets. Search on Bibsonomy NDSS The full citation details ... 2018 DBLP  BibTeX  RDF
1Alexandra-Mihaela Olteanu, Kévin Huguenin, Italo Dacosta, Jean-Pierre Hubaux Consensual and Privacy-Preserving Sharing of Multi-Subject and Interdependent Data. Search on Bibsonomy NDSS The full citation details ... 2018 DBLP  BibTeX  RDF
1Giorgos Tsirantonakis, Panagiotis Ilia, Sotiris Ioannidis, Elias Athanasopoulos, Michalis Polychronakis A Large-scale Analysis of Content Modification by Open HTTP Proxies. Search on Bibsonomy NDSS The full citation details ... 2018 DBLP  BibTeX  RDF
1Jaeho Lee, Dan S. Wallach Removing Secrets from Android's TLS. Search on Bibsonomy NDSS The full citation details ... 2018 DBLP  BibTeX  RDF
1Earlence Fernandes, Amir Rahmati, Jaeyeon Jung, Atul Prakash 0001 Decentralized Action Integrity for Trigger-Action IoT Platforms. Search on Bibsonomy NDSS The full citation details ... 2018 DBLP  BibTeX  RDF
1Samuel Jero, Md. Endadul Hoque, David R. Choffnes, Alan Mislove, Cristina Nita-Rotaru Automated Attack Discovery in TCP Congestion Control Using a Model-guided Approach. Search on Bibsonomy NDSS The full citation details ... 2018 DBLP  BibTeX  RDF
1Bo Li 0058, Phani Vadrevu, Kyu Hyung Lee, Roberto Perdisci JSgraph: Enabling Reconstruction of Web Attacks via Efficient Tracking of Live In-Browser JavaScript Executions. Search on Bibsonomy NDSS The full citation details ... 2018 DBLP  BibTeX  RDF
1Shitong Zhu, Xunchao Hu, Zhiyun Qian, Zubair Shafiq, Heng Yin 0001 Measuring and Disrupting Anti-Adblockers Using Differential Execution Analysis. Search on Bibsonomy NDSS The full citation details ... 2018 DBLP  BibTeX  RDF
1Yousra Aafer, Jianjun Huang 0001, Yi Sun, Xiangyu Zhang 0001, Ninghui Li, Chen Tian 0002 AceDroid: Normalizing Diverse Android Access Control Checks for Inconsistency Detection. Search on Bibsonomy NDSS The full citation details ... 2018 DBLP  BibTeX  RDF
1Huandong Wang, Chen Gao, Yong Li 0008, Gang Wang 0011, Depeng Jin, Jingbo Sun De-anonymization of Mobility Trajectories: Dissecting the Gaps between Theory and Practice. Search on Bibsonomy NDSS The full citation details ... 2018 DBLP  BibTeX  RDF
1Athanasios Andreou, Giridhari Venkatadri, Oana Goga, Krishna P. Gummadi, Patrick Loiseau, Alan Mislove Investigating Ad Transparency Mechanisms in Social Media: A Case Study of Facebooks Explanations. Search on Bibsonomy NDSS The full citation details ... 2018 DBLP  BibTeX  RDF
1Xiaokuan Zhang, Xueqiang Wang, Xiaolong Bai, Yinqian Zhang, XiaoFeng Wang 0001 OS-level Side Channels without Procfs: Exploring Cross-App Information Leakage on iOS. Search on Bibsonomy NDSS The full citation details ... 2018 DBLP  BibTeX  RDF
1Weilin Xu, David Evans 0001, Yanjun Qi Feature Squeezing: Detecting Adversarial Examples in Deep Neural Networks. Search on Bibsonomy NDSS The full citation details ... 2018 DBLP  BibTeX  RDF
1Haizhong Zheng, Minhui Xue, Hao Lu, Shuang Hao, Haojin Zhu, Xiaohui Liang, Keith W. Ross Smoke Screener or Straight Shooter: Detecting Elite Sybil Attacks in User-Review Social Networks. Search on Bibsonomy NDSS The full citation details ... 2018 DBLP  BibTeX  RDF
1Antonio Bianchi, Yanick Fratantonio, Aravind Machiry, Christopher Kruegel, Giovanni Vigna, Simon Pak Ho Chung, Wenke Lee Broken Fingers: On the Usage of the Fingerprint API in Android. Search on Bibsonomy NDSS The full citation details ... 2018 DBLP  BibTeX  RDF
1Kangjie Lu, Marie-Therese Walter, David Pfaff, Stefan Nümberger, Wenke Lee, Michael Backes 0001 Unleashing Use-Before-Initialization Vulnerabilities in the Linux Kernel Using Targeted Stack Spraying. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Simon Birnbach, Richard Baker 0008, Ivan Martinovic Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Luke Valenta, David Adrian, Antonio Sanso, Shaanan Cohney, Joshua Fried, Marcella Hastings, J. Alex Halderman, Nadia Heninger Measuring small subgroup attacks against Diffie-Hellman. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Adam J. Aviv, Seung Geol Choi, Travis Mayberry, Daniel S. Roche ObliviSync: Practical Oblivious File Backup and Synchronization. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Ruoyu Wang 0001, Yan Shoshitaishvili, Antonio Bianchi, Aravind Machiry, John Grosen, Paul Grosen, Christopher Kruegel, Giovanni Vigna Ramblr: Making Reassembly Great Again. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Yu Feng 0001, Osbert Bastani, Ruben Martins, Isil Dillig, Saswat Anand Automated Synthesis of Semantic Malware Signatures using Maximum Satisfiability. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Robert Rudd, Richard Skowyra, David Bigelow, Veer Dedhia, Thomas Hobson, Stephen Crane, Christopher Liebchen, Per Larsen, Lucas Davi, Michael Franz, Ahmad-Reza Sadeghi, Hamed Okhravi Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Ethan Heilman, Leen Alshenibr, Foteini Baldimtsi, Alessandra Scafuro, Sharon Goldberg TumbleBit: An Untrusted Bitcoin-Compatible Anonymous Payment Hub. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Yunhan Jack Jia, Qi Alfred Chen, Shiqi Wang 0002, Amir Rahmati, Earlence Fernandes, Zhuoqing Morley Mao, Atul Prakash 0001 ContexloT: Towards Providing Contextual Integrity to Appified IoT Platforms. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Wenjie Lu, Shohei Kawasaki, Jun Sakuma Using Fully Homomorphic Encryption for Statistical Analysis of Categorical, Ordinal and Numerical Data. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Shweta Shinde, Dat Le Tien, Shruti Tople, Prateek Saxena Panoply: Low-TCB Linux Applications With SGX Enclaves. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Gregory J. Duck, Roland H. C. Yap, Lorenzo Cavallaro Stack Bounds Protection with Low Fat Pointers. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Jaebaek Seo, Byoungyoung Lee, Seong Min Kim, Ming-Wei Shih, Insik Shin, Dongsu Han, Taesoo Kim SGX-Shield: Enabling Address Space Layout Randomization for SGX Programs. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Weitao Xu, Guohao Lan, Qi Lin, Sara Khalifa, Neil Bergmann, Mahbub Hassan, Wen Hu KEH-Gait: Towards a Mobile Healthcare User Authentication System by Kinetic Energy Harvesting. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Xinyang Ge, Mathias Payer, Trent Jaeger An Evil Copy: How the Loader Betrays You. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Andrea Continella, Yanick Fratantonio, Martina Lindorfer, Alessandro Puccetti, Ali Zand, Christopher Kruegel, Giovanni Vigna Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Andre Pawlowski, Moritz Contag, Victor van der Veen, Chris Ouwehand, Thorsten Holz, Herbert Bos, Elias Athanasopoulos, Cristiano Giuffrida MARX: Uncovering Class Hierarchies in C++ Programs. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Claude Fachkha, Elias Bou-Harb, Anastasis Keliris, Nasir D. Memon, Mustaque Ahamad Internet-scale Probing of CPS: Inference, Characterization and Orchestration Analysis. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Sebastian Zimmeck, Ziqi Wang 0007, Lieyong Zou, Roger Iyengar, Bin Liu 0017, Florian Schaub, Shomir Wilson, Norman M. Sadeh, Steven M. Bellovin, Joel R. Reidenberg Automated Analysis of Privacy Requirements for Mobile Apps. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Tim Ruffing, Pedro Moreno-Sanchez, Aniket Kate P2P Mixing and Unlinkable Bitcoin Transactions. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Guixin Ye, Zhanyong Tang, Dingyi Fang, Xiaojiang Chen, Kwang In Kim, Ben Taylor 0001, Zheng Wang 0001 Cracking Android Pattern Lock in Five Attempts. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Arpita Patra, Pratik Sarkar, Ajith Suresh Fast Actively Secure OT Extension for Short Secrets. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Yonghwi Kwon 0001, Brendan Saltaformaggio, I Luk Kim, Kyu Hyung Lee, Xiangyu Zhang 0001, Dongyan Xu Self Destructing Exploit Executions via Input Perturbation. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Srdjan Matic, Carmela Troncoso, Juan Caballero Dissecting Tor Bridges: A Security Evaluation of their Private and Public Infrastructures. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Giulio Malavolta, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1 24th Annual Network and Distributed System Security Symposium, NDSS 2017, San Diego, California, USA, February 26 - March 1, 2017 Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Ghada Dessouky, Farinaz Koushanfar, Ahmad-Reza Sadeghi, Thomas Schneider 0003, Shaza Zeitouni, Michael Zohner Pushing the Communication Barrier in Secure Computation using Lookup Tables. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Ben Gras, Kaveh Razavi, Erik Bosman, Herbert Bos, Cristiano Giuffrida ASLR on the Line: Practical Cache Attacks on the MMU. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Clémentine Maurice, Manuel Weber, Michael Schwarz 0001, Lukas Giner, Daniel Gruss, Carlo Alberto Boano, Stefan Mangard, Kay Römer Hello from the Other Side: SSH over Robust Cache Covert Channels in the Cloud. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Zakir Durumeric, Zane Ma, Drew Springall, Richard Barnes 0001, Nick Sullivan, Elie Bursztein, Michael D. Bailey, J. Alex Halderman, Vern Paxson The Security Impact of HTTPS Interception. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Ian Miers, Payman Mohassel IO-DSSE: Scaling Dynamic Searchable Encryption to Millions of Indexes By Improving Locality. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Akshaya Mani, Micah Sherr HisTorε: Differentially Private and Robust Statistics Collection for Tor. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Wenbo Yang, Yuanyuan Zhang 0002, Juanru Li, Hui Liu, Qing Wang, Yueheng Zhang, Dawu Gu Show Me the Money! Finding Flawed Implementations of Third-party In-app Payment in Android Apps. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Jesper Buus Nielsen, Thomas Schneider 0003, Roberto Trifiletti Constant Round Maliciously Secure 2PC with Function-independent Preprocessing using LEGO. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Johannes Kiesel, Benno Stein 0001, Stefan Lucks A Large-scale Analysis of the Mnemonic Password Advice. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Seungsoo Lee, Changhoon Yoon, Chanhee Lee, Seungwon Shin, Vinod Yegneswaran, Phillip A. Porras DELTA: A Security Assessment Framework for Software-Defined Networks. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Simon Eberz, Nicola Paoletti, Marc Roeschlin, Andrea Patané, Marta Kwiatkowska, Ivan Martinovic Broken Hearted: How To Attack ECG Biometrics. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Guolei Yang, Neil Zhenqiang Gong, Ying Cai Fake Co-visitation Injection Attacks to Recommender Systems. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Yeongpil Cho, Donghyun Kwon, Hayoon Yi, Yunheung Paek Dynamic Virtual Address Range Adjustment for Intra-Level Privilege Separation on ARM. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Ming-Wei Shih, Sangho Lee 0001, Taesoo Kim, Marcus Peinado T-SGX: Eradicating Controlled-Channel Attacks Against Enclave Programs. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Enrico Mariconti, Lucky Onwuzurike, Panagiotis Andriotis, Emiliano De Cristofaro, Gordon J. Ross, Gianluca Stringhini MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Lucas Davi, David Gens, Christopher Liebchen, Ahmad-Reza Sadeghi PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Kristen Dorey, Nicholas Chang-Fong, Aleksander Essex Indiscreet Logs: Diffie-Hellman Backdoors in TLS. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Aaron Johnson 0001, Rob Jansen, Aaron D. Jaggard, Joan Feigenbaum, Paul Syverson Avoiding The Man on the Wire: Improving Tor's Security with Trust-Aware Path Selection. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Phani Vadrevu, Jienan Liu, Bo Li 0058, Babak Rahbarinia, Kyu Hyung Lee, Roberto Perdisci Enabling Reconstruction of Attacks on Users via Efficient Browsing Snapshots. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Xiaorui Pan, Xueqiang Wang, Yue Duan, XiaoFeng Wang 0001, Heng Yin 0001 Dark Hazard: Learning-based, Large-Scale Discovery of Hidden Sensitive Operations in Android Apps. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Sanjay Rawat 0001, Vivek Jain, Ashish Kumar, Lucian Cojocar, Cristiano Giuffrida, Herbert Bos VUzzer: Application-aware Evolutionary Fuzzing. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Aravind Machiry, Eric Gustafson, Chad Spensky, Christopher Salls, Nick Stephens, Ruoyu Wang 0001, Antonio Bianchi, Yung Ryn Choe, Christopher Kruegel, Giovanni Vigna BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Le Shi, Yuming Wu, Yubin Xia, Nathan Dautenhahn, Haibo Chen 0001, Binyu Zang, Jinming Li Deconstructing Xen. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Lei Yu 0002, Ling Liu 0001, Calton Pu Dynamic Differential Location Privacy with Personalized Error Bounds. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Kartik Nayak, Christopher W. Fletcher, Ling Ren 0001, Nishanth Chandran, Satya V. Lokam, Elaine Shi, Vipul Goyal HOP: Hardware makes Obfuscation Practical. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Yushun Wang, Taous Madi, Suryadipta Majumdar, Yosr Jarraya, Amir Alimohammadifar, Makan Pourzandi, Lingyu Wang 0001, Mourad Debbabi TenantGuard: Scalable Runtime Verification of Cloud-Wide VM-Level Network Isolation. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Bum Jun Kwon, Virinchi Srinivas, Amol Deshpande, Tudor Dumitras Catching Worms, Trojan Horses and PUPs: Unsupervised Detection of Silent Delivery Campaigns. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Tianlong Yu, Seyed Kaveh Fayaz, Michael P. Collins, Vyas Sekar, Srinivasan Seshan PSI: Precise Security Instrumentation for Enterprise Networks. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Stevens Le Blond, Cédric Gilbert, Utkarsh Upadhyay, Manuel Gomez-Rodriguez, David R. Choffnes A Broad View of the Ecosystem of Socially Engineered Exploit Documents. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Claude Castelluccia, Markus Dürmuth, Maximilian Golla, Fatma Deniz Towards Implicit Visual Memory-Based Authentication. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Giorgi Maisuradze, Michael Backes 0001, Christian Rossow Dachshund: Digging for and Securing (Non-)Blinded Constants in JIT Code. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Yossi Gilad, Avichai Cohen, Amir Herzberg, Michael Schapira, Haya Schulmann Are We There Yet? On RPKI's Deployment and Security. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Alyssa Milburn, Herbert Bos, Cristiano Giuffrida Safelnit: Comprehensive and Practical Mitigation of Uninitialized Read Vulnerabilities. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Luis Garcia 0001, Ferdinand Brasser, Mehmet Hazar Cintuglu, Ahmad-Reza Sadeghi, Osama A. Mohammed, Saman A. Zonouz Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Zhenhua Li 0001, Weiwei Wang 0002, Christo Wilson, Jian Chen, Chen Qian 0001, Taeho Jung, Lan Zhang 0002, Kebin Liu, Xiangyang Li 0001, Yunhao Liu 0001 FBS-Radar: Uncovering Fake Base Stations at Scale in the Wild. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Najmeh Miramirkhani, Oleksii Starov, Nick Nikiforakis Dial One for Scam: A Large-Scale Analysis of Technical Support Scams. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Tobias Lauinger, Abdelberi Chaabane, Sajjad Arshad, William Robertson 0002, Christo Wilson, Engin Kirda Thou Shalt Not Depend on Me: Analysing the Use of Outdated JavaScript Libraries on the Web. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Yinzhi Cao, Song Li 0006, Erik Wijmans (Cross-)Browser Fingerprinting via OS and Hardware Level Features. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Chuangang Ren, Peng Liu 0005, Sencun Zhu WindowGuard: Systematic Protection of GUI Security in Android. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Wilson Lian, Hovav Shacham, Stefan Savage A Call to ARMs: Understanding the Costs and Benefits of JIT Spraying Mitigations. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Juan Deng, Hongda Li 0002, Hongxin Hu, Kuang-Ching Wang, Gail-Joon Ahn, Ziming Zhao 0001, Wonkyu Han On the Safety and Efficiency of Virtual Firewall Elasticity Control. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Benjamin Greschbach, Tobias Pulls, Laura M. Roberts, Philipp Winter, Nick Feamster The Effect of DNS on Tor's Anonymity. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Jason A. Donenfeld WireGuard: Next Generation Kernel Network Tunnel. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Luca Melis, George Danezis, Emiliano De Cristofaro Efficient Private Statistics with Succinct Sketches. Search on Bibsonomy NDSS The full citation details ... 2016 DBLP  BibTeX  RDF
1Siegfried Rasthofer, Steven Arzt, Marc Miltenberger, Eric Bodden Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques. Search on Bibsonomy NDSS The full citation details ... 2016 DBLP  BibTeX  RDF
1Kjell Braden, Lucas Davi, Christopher Liebchen, Ahmad-Reza Sadeghi, Stephen Crane, Michael Franz, Per Larsen Leakage-Resilient Layout Randomization for Mobile Devices. Search on Bibsonomy NDSS The full citation details ... 2016 DBLP  BibTeX  RDF
1Shiqing Ma, Xiangyu Zhang 0001, Dongyan Xu ProTracer: Towards Practical Provenance Tracing by Alternating Between Logging and Tainting. Search on Bibsonomy NDSS The full citation details ... 2016 DBLP  BibTeX  RDF
1Soteris Demetriou, Whitney Merrill, Wei Yang 0013, Aston Zhang, Carl A. Gunter Free for All! Assessing User Data Exposure to Advertising Libraries on Android. Search on Bibsonomy NDSS The full citation details ... 2016 DBLP  BibTeX  RDF
1Michelle Y. Wong, David Lie IntelliDroid: A Targeted Input Generator for the Dynamic Analysis of Android Malware. Search on Bibsonomy NDSS The full citation details ... 2016 DBLP  BibTeX  RDF
1Chaoshun Zuo, Wubing Wang, Zhiqiang Lin, Rui Wang Automatic Forgery of Cryptographically Consistent Messages to Identify Security Vulnerabilities in Mobile Services. Search on Bibsonomy NDSS The full citation details ... 2016 DBLP  BibTeX  RDF
1Aanchal Malhotra, Isaac E. Cohen, Erik Brakke, Sharon Goldberg Attacking the Network Time Protocol. Search on Bibsonomy NDSS The full citation details ... 2016 DBLP  BibTeX  RDF
1Changchang Liu, Prateek Mittal LinkMirage: Enabling Privacy-preserving Analytics on Social Relationships. Search on Bibsonomy NDSS The full citation details ... 2016 DBLP  BibTeX  RDF
1Chao Zhang 0008, Dawn Song, Scott A. Carr, Mathias Payer, Tongxin Li, Yu Ding, Chengyu Song VTrust: Regaining Trust on Virtual Calls. Search on Bibsonomy NDSS The full citation details ... 2016 DBLP  BibTeX  RDF
1Rishab Nithyanand, Oleksii Starov, Phillipa Gill, Adva Zair, Michael Schapira Measuring and Mitigating AS-level Adversaries Against Tor. Search on Bibsonomy NDSS The full citation details ... 2016 DBLP  BibTeX  RDF
Displaying result #501 - #600 of 1211 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license