You are here

Publications

Document Library

Constant Round Maliciously Secure 2PC with Function-independent Preprocessing using LEGO

Date: 27 February 2017
Author(s):
Document Type: Reports
Tags: NDSS17 Associated event: NDSS Symposium 2017

Unleashing Use-Before-Initialization Vulnerabilities in the Linux Kernel Using Targeted Stack Spraying

Date: 27 February 2017
Author(s):
Document Type: Reports
Tags: NDSS17 Associated event: NDSS Symposium 2017

KEH-Gait: Towards a Mobile Healthcare User Authentication System by Kinetic Energy Harvesting

Date: 27 February 2017
Author(s):
Document Type: Reports
Tags: NDSS17 Associated event: NDSS Symposium 2017

WindowGuard: Systematic Protection of GUI Security in Android

Date: 27 February 2017
Author(s):
Document Type: Reports
Tags: NDSS17 Associated event: NDSS Symposium 2017

Self Destructing Exploit Executions via Input Perturbation

Date: 27 February 2017
Author(s):
Document Type: Reports
Tags: NDSS17 Associated event: NDSS Symposium 2017

MARX: Uncovering Class Hierarchies in C++ Programs

Date: 27 February 2017
Author(s):
Document Type: Reports
Tags: NDSS17 Associated event: NDSS Symposium 2017

Are We There Yet? On RPKI's Deployment and Security

Date: 27 February 2017
Author(s):
Document Type: Reports
Tags: NDSS17 Associated event: NDSS Symposium 2017

A Large-scale Analysis of the Mnemonic Password Advice

Date: 27 February 2017
Author(s):
Document Type: Reports
Tags: NDSS17 Associated event: NDSS Symposium 2017

HisTorε: Differentially Private and Robust Statistics Collection for Tor

Date: 27 February 2017
Author(s):
Document Type: Reports
Tags: NDSS17 Associated event: NDSS Symposium 2017

P2P Mixing and Unlinkable Bitcoin Transactions

Date: 27 February 2017
Author(s):
Document Type: Reports
Tags: NDSS17 Associated event: NDSS Symposium 2017

Pages