You are here

Publications

Document Library

Automated Synthesis of Semantic Malware Signatures using Maximum Satisfiability

Date: 27 February 2017
Author(s):
Document Type: Reports
Tags: NDSS17 Associated event: NDSS Symposium 2017

BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments

Date: 27 February 2017
Author(s):
Document Type: Reports
Tags: NDSS17 Associated event: NDSS Symposium 2017

IO-DSSE: Scaling Dynamic Searchable Encryption to Millions of Indexes By Improving Locality

Date: 27 February 2017
Author(s):
Document Type: Reports
Tags: NDSS17 Associated event: NDSS Symposium 2017

Indiscreet Logs: Diffie-Hellman Backdoors in TLS

Date: 27 February 2017
Author(s):
Document Type: Reports
Tags: NDSS17 Associated event: NDSS Symposium 2017

FBS-Radar: Uncovering Fake Base Stations at Scale in the Wild

Date: 27 February 2017
Author(s):
Document Type: Reports
Tags: NDSS17 Associated event: NDSS Symposium 2017

DELTA: A Security Assessment Framework for Software-Defined Networks

Date: 27 February 2017
Author(s):
Document Type: Reports
Tags: NDSS17 Associated event: NDSS Symposium 2017

Pushing the Communication Barrier in Secure Computation using Lookup Tables

Date: 27 February 2017
Author(s):
Document Type: Reports
Tags: NDSS17 Associated event: NDSS Symposium 2017

Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity

Date: 27 February 2017
Author(s):
Document Type: Reports
Tags: NDSS17 Associated event: NDSS Symposium 2017

Enabling Reconstruction of Attacks on Users via Efficient Browsing Snapshots

Date: 27 February 2017
Author(s):
Document Type: Reports
Tags: NDSS17 Associated event: NDSS Symposium 2017

Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis

Date: 27 February 2017
Author(s):
Document Type: Reports
Tags: NDSS17 Associated event: NDSS Symposium 2017

Pages