You are here

Publications

Document Library

A Broad View of the Ecosystem of Socially Engineered Exploit Documents

Date: 27 February 2017
Author(s):
Document Type: Reports
Tags: NDSS17 Associated event: NDSS Symposium 2017

Panoply: Low-TCB Linux Applications With SGX Enclaves

Date: 27 February 2017
Author(s):
Document Type: Reports
Tags: NDSS17 Associated event: NDSS Symposium 2017

Deconstructing Xen

Date: 27 February 2017
Author(s):
Document Type: Reports
Tags: NDSS17 Associated event: NDSS Symposium 2017

The Security Impact of HTTPS Interception

Date: 27 February 2017
Author(s):
Document Type: Reports
Tags: NDSS17 Associated event: NDSS Symposium 2017

Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones

Date: 27 February 2017
Author(s):
Document Type: Reports
Tags: NDSS17 Associated event: NDSS Symposium 2017

Broken Hearted: How To Attack ECG Biometrics

Date: 27 February 2017
Author(s):
Document Type: Reports
Tags: NDSS17 Associated event: NDSS Symposium 2017

Dark Hazard: Learning-based, Large-Scale Discovery of Hidden Sensitive Operations in Android Apps

Date: 27 February 2017
Author(s):
Document Type: Reports
Tags: NDSS17 Associated event: NDSS Symposium 2017

Stack Object Protection with Low Fat Pointers

Date: 27 February 2017
Author(s):
Document Type: Reports
Tags: NDSS17 Associated event: NDSS Symposium 2017

Dachshund: Digging for and Securing (Non-)Blinded Constants in JIT Code

Date: 27 February 2017
Author(s):
Document Type: Reports
Tags: NDSS17 Associated event: NDSS Symposium 2017

Hello from the Other Side: SSH over Robust Cache Covert Channels in the Cloud

Date: 27 February 2017
Author(s):
Document Type: Reports
Tags: NDSS17 Associated event: NDSS Symposium 2017

Pages