The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "NDSS"( http://dblp.L3S.de/Venues/NDSS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/ndss

Publication years (Num. hits)
1995 (18) 1996 (18) 1997 (15) 1998 (22) 1999 (24) 2000 (16) 2001 (19) 2002 (16) 2003 (18) 2004 (17) 2005 (17) 2006 (18) 2007 (18) 2008 (22) 2009 (21) 2010 (25) 2011 (29) 2012 (55) 2013 (65) 2014 (56) 2015 (51) 2016 (62) 2017 (69) 2018 (72) 2019 (91) 2020 (90) 2021 (88) 2022 (84) 2023 (95)
Publication types (Num. hits)
inproceedings(1182) proceedings(29)
Venues (Conferences, Journals, ...)
NDSS(1211)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 1211 publication records. Showing 1211 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Sooel Son, Daehyeok Kim, Vitaly Shmatikov What Mobile Ads Know About Mobile Users. Search on Bibsonomy NDSS The full citation details ... 2016 DBLP  BibTeX  RDF
1Changchang Liu, Supriyo Chakraborty, Prateek Mittal Dependence Makes You Vulnberable: Differential Privacy Under Dependent Tuples. Search on Bibsonomy NDSS The full citation details ... 2016 DBLP  BibTeX  RDF
1Kangjie Lu, Wenke Lee, Stefan Nürnberger, Michael Backes 0001 How to Make ASLR Win the Clone Wars: Runtime Re-Randomization. Search on Bibsonomy NDSS The full citation details ... 2016 DBLP  BibTeX  RDF
1George Danezis, Sarah Meiklejohn Centrally Banked Cryptocurrencies. Search on Bibsonomy NDSS The full citation details ... 2016 DBLP  BibTeX  RDF
1Ahmed M. Azab, Kirk Swidowski, Rohan Bhutkar, Jia Ma, Wenbo Shen, Ruowen Wang, Peng Ning SKEE: A lightweight Secure Kernel-level Execution Environment for ARM. Search on Bibsonomy NDSS The full citation details ... 2016 DBLP  BibTeX  RDF
1Xiao Zhang, Kailiang Ying, Yousra Aafer, Zhenshen Qiu, Wenliang Du Life after App Uninstallation: Are the Data Still Alive? Data Residue Attacks on Android. Search on Bibsonomy NDSS The full citation details ... 2016 DBLP  BibTeX  RDF
1Anupam Das 0001, Nikita Borisov, Matthew Caesar 0001 Tracking Mobile Web Users Through Motion Sensors: Attacks and Defenses. Search on Bibsonomy NDSS The full citation details ... 2016 DBLP  BibTeX  RDF
1Xavier de Carné de Carnavalet, Mohammad Mannan Killed by Proxy: Analyzing Client-end TLS Interce. Search on Bibsonomy NDSS The full citation details ... 2016 DBLP  BibTeX  RDF
1Weilin Xu, Yanjun Qi, David Evans 0001 Automatically Evading Classifiers: A Case Study on PDF Malware Classifiers. Search on Bibsonomy NDSS The full citation details ... 2016 DBLP  BibTeX  RDF
1Eunjo Lee, Jiyoung Woo, Hyoungshick Kim, Aziz Mohaisen, Huy Kang Kim You are a Game Bot!: Uncovering Game Bots in MMORPGs via Self-similarity in the Wild. Search on Bibsonomy NDSS The full citation details ... 2016 DBLP  BibTeX  RDF
1Otto Huhta, Swapnil Udar, Mika Juuti, Prakash Shrestha, Nitesh Saxena, N. Asokan Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic Human Observation Attacks. Search on Bibsonomy NDSS The full citation details ... 2016 DBLP  BibTeX  RDF
1Chengyu Song, Byoungyoung Lee, Kangjie Lu, William Harris, Taesoo Kim, Wenke Lee Enforcing Kernel Security Invariants with Data Flow Integrity. Search on Bibsonomy NDSS The full citation details ... 2016 DBLP  BibTeX  RDF
1M. Zubair Rafique, Tom van Goethem, Wouter Joosen, Christophe Huygens, Nick Nikiforakis It's Free for a Reason: Exploring the Ecosystem of Free Live Streaming Services. Search on Bibsonomy NDSS The full citation details ... 2016 DBLP  BibTeX  RDF
1Curtis Carmony, Xunchao Hu, Heng Yin 0001, Abhishek Vasisht Bhaskar, Mu Zhang 0001 Extract Me If You Can: Abusing PDF Parsers in Malware Detectors. Search on Bibsonomy NDSS The full citation details ... 2016 DBLP  BibTeX  RDF
1Yuru Shao, Qi Alfred Chen, Zhuoqing Morley Mao, Jason Ott, Zhiyun Qian Kratos: Discovering Inconsistent Security Policy Enforcement in the Android Framework. Search on Bibsonomy NDSS The full citation details ... 2016 DBLP  BibTeX  RDF
1Wei Meng 0001, Ren Ding, Simon P. Chung, Steven Han, Wenke Lee The Price of Free: Privacy Leakage in Personalized Mobile In-Apps Ads. Search on Bibsonomy NDSS The full citation details ... 2016 DBLP  BibTeX  RDF
1Vaibhav Rastogi, Rui Shao, Yan Chen 0004, Xiang Pan, Shihong Zou, Ryan D. Riley Are these Ads Safe: Detecting Hidden Attacks through the Mobile App-Web Interfaces. Search on Bibsonomy NDSS The full citation details ... 2016 DBLP  BibTeX  RDF
1Altaf Shaik, Jean-Pierre Seifert, Ravishankar Borgaonkar, N. Asokan, Valtteri Niemi Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems. Search on Bibsonomy NDSS The full citation details ... 2016 DBLP  BibTeX  RDF
1Jakub Czyz, Matthew J. Luckie, Mark Allman, Michael D. Bailey Don't Forget to Lock the Back Door! A Characterization of IPv6 Network Security Policy. Search on Bibsonomy NDSS The full citation details ... 2016 DBLP  BibTeX  RDF
1Sebastian Eschweiler, Khaled Yakdan, Elmar Gerhards-Padilla discovRE: Efficient Cross-Architecture Identification of Bugs in Binary Code. Search on Bibsonomy NDSS The full citation details ... 2016 DBLP  BibTeX  RDF
1David Formby, Preethi Srinivasan, Andrew M. Leonard, Jonathan D. Rogers, Raheem A. Beyah Who's in Control of Your Control System? Device Fingerprinting for Cyber-Physical Systems. Search on Bibsonomy NDSS The full citation details ... 2016 DBLP  BibTeX  RDF
1Robert Gawlik, Benjamin Kollenda, Philipp Koppe, Behrad Garmany, Thorsten Holz Enabling Client-Side Crash-Resistance to Overcome Diversification and Information Hiding. Search on Bibsonomy NDSS The full citation details ... 2016 DBLP  BibTeX  RDF
1Jaebaek Seo, Daehyeok Kim, Donghyun Cho, Insik Shin, Taesoo Kim FLEXDROID: Enforcing In-App Privilege Separation in Android. Search on Bibsonomy NDSS The full citation details ... 2016 DBLP  BibTeX  RDF
1Ahmet Salih Buyukkayhan, Kaan Onarlioglu, William K. Robertson, Engin Kirda CrossFire: An Analysis of Firefox Extension-Reuse Vulnerabilities. Search on Bibsonomy NDSS The full citation details ... 2016 DBLP  BibTeX  RDF
1Matthew D. Green Keynote: On Subverting Trust. Search on Bibsonomy NDSS The full citation details ... 2016 DBLP  BibTeX  RDF
1Ralph Holz, Johanna Amann, Olivier Mehani, Mohamed Ali Kâafar, Matthias Wachs TLS in the Wild: An Internet-wide Analysis of TLS-based Protocols for Electronic Communication. Search on Bibsonomy NDSS The full citation details ... 2016 DBLP  BibTeX  RDF
1Charles Smutz, Angelos Stavrou When a Tree Falls: Using Diversity in Ensemble Classifiers to Identify Evasion in Malware Detectors. Search on Bibsonomy NDSS The full citation details ... 2016 DBLP  BibTeX  RDF
1Andriy Panchenko 0001, Fabian Lanze, Jan Pennekamp, Thomas Engel 0001, Andreas Zinnen, Martin Henze, Klaus Wehrle Website Fingerprinting at Internet Scale. Search on Bibsonomy NDSS The full citation details ... 2016 DBLP  BibTeX  RDF
1Vitor Monte Afonso, Paulo L. de Geus, Antonio Bianchi, Yanick Fratantonio, Christopher Kruegel, Giovanni Vigna, Adam Doupé, Mario Polino Going Native: Using a Large-Scale Analysis of Android Apps to Create a Practical Native-Code Sandboxing Policy. Search on Bibsonomy NDSS The full citation details ... 2016 DBLP  BibTeX  RDF
1Teryl Taylor, Kevin Z. Snow, Nathan Otterness, Fabian Monrose Cache, Trigger, Impersonate: Enabling Context-Sensitive Honeyclient Analysis On-the-Wire. Search on Bibsonomy NDSS The full citation details ... 2016 DBLP  BibTeX  RDF
1Dimitar Bounov, Rami Gökhan Kici, Sorin Lerner Protecting C++ Dynamic Dispatch Through VTable Interleaving. Search on Bibsonomy NDSS The full citation details ... 2016 DBLP  BibTeX  RDF
1Daming D. Chen, Maverick Woo, David Brumley, Manuel Egele Towards Automated Dynamic Analysis for Linux-based Embedded Firmware. Search on Bibsonomy NDSS The full citation details ... 2016 DBLP  BibTeX  RDF
1John Sonchack, Jonathan M. Smith, Adam J. Aviv, Eric Keller Enabling Practical Software-defined Networking Security Applications with OFX. Search on Bibsonomy NDSS The full citation details ... 2016 DBLP  BibTeX  RDF
1Sheharbano Khattak, David Fifield, Sadia Afroz 0001, Mobin Javed, Srikanth Sundaresan, Damon McCoy, Vern Paxson, Steven J. Murdoch Do You See What I See? Differential Treatment of Anonymous Users. Search on Bibsonomy NDSS The full citation details ... 2016 DBLP  BibTeX  RDF
1Sungmin Hong, Robert Baykov, Lei Xu 0024, Srinath Nadimpalli, Guofei Gu Towards SDN-Defined Programmable BYOD (Bring Your Own Device) Security. Search on Bibsonomy NDSS The full citation details ... 2016 DBLP  BibTeX  RDF
1Jingchao Sun, Xiaocong Jin, Yimin Chen 0004, Jinxue Zhang, Yanchao Zhang, Rui Zhang 0007 VISIBLE: Video-Assisted Keystroke Inference from Tablet Backside Motion. Search on Bibsonomy NDSS The full citation details ... 2016 DBLP  BibTeX  RDF
1Jianjun Chen 0005, Xiaofeng Zheng, Hai-Xin Duan, Jinjin Liang, Jian Jiang, Kang Li 0001, Tao Wan 0004, Vern Paxson Forwarding-Loop Attacks in Content Delivery Networks. Search on Bibsonomy NDSS The full citation details ... 2016 DBLP  BibTeX  RDF
1David J. Wu 0001, Joe Zimmerman, Jérémy Planul, John C. Mitchell Privacy-Preserving Shortest Path Computation. Search on Bibsonomy NDSS The full citation details ... 2016 DBLP  BibTeX  RDF
1Yossi Gilad, Amir Herzberg, Michael Sudkovitch, Michael Goberman CDN-on-Demand: An affordable DDoS Defense via Untrusted Clouds. Search on Bibsonomy NDSS The full citation details ... 2016 DBLP  BibTeX  RDF
1Karthikeyan Bhargavan, Gaëtan Leurent Transcript Collision Attacks: Breaking Authentication in TLS, IKE and SSH. Search on Bibsonomy NDSS The full citation details ... 2016 DBLP  BibTeX  RDF
1Prerit Jain, Soham Jayesh Desai, Ming-Wei Shih, Taesoo Kim, Seong Min Kim, Jae-Hyuk Lee, Changho Choi, Youjung Shin, Brent ByungHoon Kang, Dongsu Han OpenSGX: An Open Platform for SGX Research. Search on Bibsonomy NDSS The full citation details ... 2016 DBLP  BibTeX  RDF
1Jeremiah Blocki, Anupam Datta, Joseph Bonneau Differentially Private Password Frequency Lists. Search on Bibsonomy NDSS The full citation details ... 2016 DBLP  BibTeX  RDF
1Avinash Sudhodanan, Alessandro Armando, Roberto Carbone, Luca Compagna Attack Patterns for Black-Box Security Testing of Multi-Party Web Applications. Search on Bibsonomy NDSS The full citation details ... 2016 DBLP  BibTeX  RDF
1Cristina Basescu, Raphael M. Reischuk, Pawel Szalachowski, Adrian Perrig, Yao Zhang, Hsu-Chun Hsiao, Ayumu Kubota, Jumpei Urakawa SIBRA: Scalable Internet Bandwidth Reservation Architecture. Search on Bibsonomy NDSS The full citation details ... 2016 DBLP  BibTeX  RDF
1Nick Stephens, John Grosen, Christopher Salls, Andrew Dutcher, Ruoyu Wang 0001, Jacopo Corbetta, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna Driller: Augmenting Fuzzing Through Selective Symbolic Execution. Search on Bibsonomy NDSS The full citation details ... 2016 DBLP  BibTeX  RDF
1David Freeman 0001, Sakshi Jain, Markus Dürmuth, Battista Biggio, Giorgio Giacinto Who Are You? A Statistical Approach to Measuring User Authenticity. Search on Bibsonomy NDSS The full citation details ... 2016 DBLP  BibTeX  RDF
1Chad Spensky, Hongyi Hu, Kevin Leach LO-PHI: Low-Observable Physical Host Instrumentation for Malware Analysis. Search on Bibsonomy NDSS The full citation details ... 2016 DBLP  BibTeX  RDF
1Haichang Gao, Jeff Yan, Fang Cao, Zhengya Zhang, Lei Lei, Mengyun Tang, Ping Zhang, Xin Zhou, Xuqin Wang, Jiawei Li A Simple Generic Attack on Text Captchas. Search on Bibsonomy NDSS The full citation details ... 2016 DBLP  BibTeX  RDF
1Min Suk Kang, Virgil D. Gligor, Vyas Sekar SPIFFY: Inducing Cost-Detectability Tradeoffs for Persistent Link-Flooding Attacks. Search on Bibsonomy NDSS The full citation details ... 2016 DBLP  BibTeX  RDF
1Alex Biryukov, Dmitry Khovratovich Equihash: Asymmetric Proof-of-Work Based on the Generalized Birthday Problem. Search on Bibsonomy NDSS The full citation details ... 2016 DBLP  BibTeX  RDF
1 23rd Annual Network and Distributed System Security Symposium, NDSS 2016, San Diego, California, USA, February 21-24, 2016 Search on Bibsonomy NDSS The full citation details ... 2016 DBLP  BibTeX  RDF
1Igor Bilogrevic, Kévin Huguenin, Stefan Mihaila, Reza Shokri, Jean-Pierre Hubaux Predicting Users' Motivations behind Location Check-Ins and Utility Implications of Privacy Protection Mechanisms. Search on Bibsonomy NDSS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Chengyu Song, Chao Zhang 0008, Tielei Wang, Wenke Lee, David Melski Exploiting and Protecting Dynamic Code Generation. Search on Bibsonomy NDSS The full citation details ... 2015 DBLP  BibTeX  RDF
1Raphael Bost, Raluca Ada Popa, Stephen Tu, Shafi Goldwasser Machine Learning Classification over Encrypted Data. Search on Bibsonomy NDSS The full citation details ... 2015 DBLP  BibTeX  RDF
1Byoungyoung Lee, Chengyu Song, Yeongjin Jang, Tielei Wang, Taesoo Kim, Long Lu, Wenke Lee Preventing Use-after-free with Dangling Pointers Nullification. Search on Bibsonomy NDSS The full citation details ... 2015 DBLP  BibTeX  RDF
1Shouling Ji, Weiqing Li, Neil Zhenqiang Gong, Prateek Mittal, Raheem A. Beyah On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge. Search on Bibsonomy NDSS The full citation details ... 2015 DBLP  BibTeX  RDF
1Yonghwi Kwon 0001, Fei Peng, Dohyeong Kim, Kyungtae Kim, Xiangyu Zhang 0001, Dongyan Xu, Vinod Yegneswaran, John Qian P2C: Understanding Output Data Files via On-the-Fly Transformation from Producer to Consumer Executions. Search on Bibsonomy NDSS The full citation details ... 2015 DBLP  BibTeX  RDF
1Benjamin Güldenring, Volker Roth 0002, Lars Ries Knock Yourself Out: Secure Authentication with Short Re-Usable Passwords. Search on Bibsonomy NDSS The full citation details ... 2015 DBLP  BibTeX  RDF
1Kangjie Lu, Zhichun Li, Vasileios P. Kemerlis, Zhenyu Wu, Long Lu, Cong Zheng, Zhiyun Qian, Wenke Lee, Guofei Jiang Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting. Search on Bibsonomy NDSS The full citation details ... 2015 DBLP  BibTeX  RDF
1Michael J. Kranch, Joseph Bonneau Upgrading HTTPS in mid-air: An empirical study of strict transport security and key pinning. Search on Bibsonomy NDSS The full citation details ... 2015 DBLP  BibTeX  RDF
1Chao Zhang 0008, Chengyu Song, Kevin Zhijie Chen, Zhaofeng Chen, Dawn Song VTint: Protecting Virtual Function Tables' Integrity. Search on Bibsonomy NDSS The full citation details ... 2015 DBLP  BibTeX  RDF
1Payas Gupta, Bharat Srinivasan, Vijay Balasubramaniyan, Mustaque Ahamad Phoneypot: Data-driven Understanding of Telephony Threats. Search on Bibsonomy NDSS The full citation details ... 2015 DBLP  BibTeX  RDF
1Mohamed El Massad, Siddharth Garg, Mahesh V. Tripunitara Integrated Circuit (IC) Decamouflaging: Reverse Engineering Camouflaged ICs within Minutes. Search on Bibsonomy NDSS The full citation details ... 2015 DBLP  BibTeX  RDF
1Jeremiah Blocki, Saranga Komanduri, Lorrie Faith Cranor, Anupam Datta Spaced Repetition and Mnemonics Enable Recall of Multiple Strong Passwords. Search on Bibsonomy NDSS The full citation details ... 2015 DBLP  BibTeX  RDF
1Xiang Pan, Yinzhi Cao, Yan Chen 0004 I Do Not Know What You Visited Last Summer: Protecting users from stateful third-party web tracking with TrackingFree browser. Search on Bibsonomy NDSS The full citation details ... 2015 DBLP  BibTeX  RDF
1Sungmin Hong, Lei Xu 0024, Haopei Wang, Guofei Gu Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures. Search on Bibsonomy NDSS The full citation details ... 2015 DBLP  BibTeX  RDF
1Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Alfredo Pironti 0001 Verified Contributive Channel Bindings for Compound Authentication. Search on Bibsonomy NDSS The full citation details ... 2015 DBLP  BibTeX  RDF
1Timothy Peters, Mark A. Gondree, Zachary N. J. Peterson DEFY: A Deniable, Encrypted File System for Log-Structured Storage. Search on Bibsonomy NDSS The full citation details ... 2015 DBLP  BibTeX  RDF
1Yazan Boshmaf, Dionysios Logothetis, Georgos Siganos, Jorge Lería, José Lorenzo, Matei Ripeanu, Konstantin Beznosov Integro: Leveraging Victim Prediction for Robust Fake Account Detection in OSNs. Search on Bibsonomy NDSS The full citation details ... 2015 DBLP  BibTeX  RDF
1Thomas Vissers, Wouter Joosen, Nick Nikiforakis Parking Sensors: Analyzing and Detecting Parked Domains. Search on Bibsonomy NDSS The full citation details ... 2015 DBLP  BibTeX  RDF
1Yan Shoshitaishvili, Ruoyu Wang 0001, Christophe Hauser, Christopher Kruegel, Giovanni Vigna Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware. Search on Bibsonomy NDSS The full citation details ... 2015 DBLP  BibTeX  RDF
1Vishwath Mohan, Per Larsen, Stefan Brunthaler 0001, Kevin W. Hamlen, Michael Franz Opaque Control-Flow Integrity. Search on Bibsonomy NDSS The full citation details ... 2015 DBLP  BibTeX  RDF
1Khaled Yakdan, Sebastian Eschweiler, Elmar Gerhards-Padilla, Matthew Smith 0001 No More Gotos: Decompilation Using Pattern-Independent Control-Flow Structuring and Semantic-Preserving Transformations. Search on Bibsonomy NDSS The full citation details ... 2015 DBLP  BibTeX  RDF
1Birhanu Eshete, Abeer Alhuzali, Maliheh Monshizadeh, Phillip A. Porras, Venkat N. Venkatakrishnan, Vinod Yegneswaran EKHunter: A Counter-Offensive Toolkit for Exploit Kit Infiltration. Search on Bibsonomy NDSS The full citation details ... 2015 DBLP  BibTeX  RDF
1Kimberly Tam, Salahuddin J. Khan, Aristide Fattori, Lorenzo Cavallaro CopperDroid: Automatic Reconstruction of Android Malware Behaviors. Search on Bibsonomy NDSS The full citation details ... 2015 DBLP  BibTeX  RDF
1Yves Younan FreeSentry: protecting against use-after-free vulnerabilities due to dangling pointers. Search on Bibsonomy NDSS The full citation details ... 2015 DBLP  BibTeX  RDF
1Wilson Lian, Hovav Shacham, Stefan Savage Too LeJIT to Quit: Extending JIT Spraying to ARM. Search on Bibsonomy NDSS The full citation details ... 2015 DBLP  BibTeX  RDF
1Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei, Kim Pecina Privacy Preserving Payments in Credit Networks: Enabling trust with privacy in online marketplaces. Search on Bibsonomy NDSS The full citation details ... 2015 DBLP  BibTeX  RDF
1Stephen Crane, Andrei Homescu, Stefan Brunthaler 0001, Per Larsen, Michael Franz Thwarting Cache Side-Channel Attacks Through Dynamic Software Diversity. Search on Bibsonomy NDSS The full citation details ... 2015 DBLP  BibTeX  RDF
1Xi Chen 0038, Asia Slowinska, Dennis Andriesse, Herbert Bos, Cristiano Giuffrida StackArmor: Comprehensive Protection From Stack-based Memory Error Vulnerabilities for Binaries. Search on Bibsonomy NDSS The full citation details ... 2015 DBLP  BibTeX  RDF
1Phillip A. Porras, Steven Cheung, Martin W. Fong, Keith Skinner, Vinod Yegneswaran Securing the Software Defined Network Control Layer. Search on Bibsonomy NDSS The full citation details ... 2015 DBLP  BibTeX  RDF
1Michael I. Gordon, Deokhwan Kim, Jeff H. Perkins, Limei Gilham, Nguyen Nguyen 0002, Martin C. Rinard Information Flow Analysis of Android Applications in DroidSafe. Search on Bibsonomy NDSS The full citation details ... 2015 DBLP  BibTeX  RDF
1Daniel Demmler, Thomas Schneider 0003, Michael Zohner ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation. Search on Bibsonomy NDSS The full citation details ... 2015 DBLP  BibTeX  RDF
1 22nd Annual Network and Distributed System Security Symposium, NDSS 2015, San Diego, California, USA, February 8-11, 2015 Search on Bibsonomy NDSS The full citation details ... 2015 DBLP  BibTeX  RDF
1Aravind Prakash, Xunchao Hu, Heng Yin 0001 vfGuard: Strict Protection for Virtual Function Calls in COTS C++ Binaries. Search on Bibsonomy NDSS The full citation details ... 2015 DBLP  BibTeX  RDF
1Sangho Lee 0001, Hyungsub Kim, Jong Kim 0001 Identifying Cross-origin Resource Status Using Application Cache. Search on Bibsonomy NDSS The full citation details ... 2015 DBLP  BibTeX  RDF
1Pierre-Antoine Vervier, Olivier Thonnard, Marc Dacier Mind Your Blocks: On the Stealthiness of Malicious BGP Hijacks. Search on Bibsonomy NDSS The full citation details ... 2015 DBLP  BibTeX  RDF
1Yinzhi Cao, Yanick Fratantonio, Antonio Bianchi, Manuel Egele, Christopher Kruegel, Giovanni Vigna, Yan Chen 0004 EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework. Search on Bibsonomy NDSS The full citation details ... 2015 DBLP  BibTeX  RDF
1Sharon Goldberg, Moni Naor, Dimitrios Papadopoulos 0001, Leonid Reyzin, Sachin Vasant, Asaf Ziv NSEC5: Provably Preventing DNSSEC Zone Enumeration. Search on Bibsonomy NDSS The full citation details ... 2015 DBLP  BibTeX  RDF
1Pieter Agten, Wouter Joosen, Frank Piessens, Nick Nikiforakis Seven Months' Worth of Mistakes: A Longitudinal Study of Typosquatting Abuse. Search on Bibsonomy NDSS The full citation details ... 2015 DBLP  BibTeX  RDF
1Lianying Zhao, Mohammad Mannan Gracewipe: Secure and Verifiable Deletion under Coercion. Search on Bibsonomy NDSS The full citation details ... 2015 DBLP  BibTeX  RDF
1Simon Eberz, Kasper Bonne Rasmussen, Vincent Lenders, Ivan Martinovic Preventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement Biometrics. Search on Bibsonomy NDSS The full citation details ... 2015 DBLP  BibTeX  RDF
1Nitesh Mor, Oriana Riva, Suman Nath, John Kubiatowicz Bloom Cookies: Web Search Personalization without User Tracking. Search on Bibsonomy NDSS The full citation details ... 2015 DBLP  BibTeX  RDF
1Lujo Bauer, Shaoying Cai, Limin Jia 0001, Timothy Passaro, Michael Stroucken, Yuan Tian 0001 Run-time Monitoring and Formal Analysis of Information Flows in Chromium. Search on Bibsonomy NDSS The full citation details ... 2015 DBLP  BibTeX  RDF
1Brendan Juba, Christopher Musco, Fan Long, Stelios Sidiroglou-Douskos, Martin C. Rinard Principled Sampling for Anomaly Detection. Search on Bibsonomy NDSS The full citation details ... 2015 DBLP  BibTeX  RDF
1Jin Soo Jang, Sunjune Kong, Minsu Kim, Daegyeong Kim, Brent ByungHoon Kang SeCReT: Secure Channel between Rich Execution Environment and Trusted Execution Environment. Search on Bibsonomy NDSS The full citation details ... 2015 DBLP  BibTeX  RDF
1Xueqiang Wang, Kun Sun 0001, Yuewu Wang, Jiwu Jing DeepDroid: Dynamically Enforcing Enterprise Policy on Android Devices. Search on Bibsonomy NDSS The full citation details ... 2015 DBLP  BibTeX  RDF
1Lucas Davi, Christopher Liebchen, Ahmad-Reza Sadeghi, Kevin Z. Snow, Fabian Monrose Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming. Search on Bibsonomy NDSS The full citation details ... 2015 DBLP  BibTeX  RDF
1Michalis Athanasakis, Elias Athanasopoulos, Michalis Polychronakis, Georgios Portokalidis, Sotiris Ioannidis The Devil is in the Constants: Bypassing Defenses in Browser JIT Engines. Search on Bibsonomy NDSS The full citation details ... 2015 DBLP  BibTeX  RDF
1Mohan Dhawan, Rishabh Poddar, Kshiteej Mahajan, Vijay Mann SPHINX: Detecting Security Attacks in Software-Defined Networks. Search on Bibsonomy NDSS The full citation details ... 2015 DBLP  BibTeX  RDF
Displaying result #601 - #700 of 1211 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license