You are here

Publications

Document Library

Are We There Yet? On RPKI's Deployment and Security

Date: 27 February 2017
Author(s):
Document Type: Reports
Tags: NDSS17 Associated event: NDSS Symposium 2017

HisTorε: Differentially Private and Robust Statistics Collection for Tor

Date: 27 February 2017
Author(s):
Document Type: Reports
Tags: NDSS17 Associated event: NDSS Symposium 2017

A Large-scale Analysis of the Mnemonic Password Advice

Date: 27 February 2017
Author(s):
Document Type: Reports
Tags: NDSS17 Associated event: NDSS Symposium 2017

Panoply: Low-TCB Linux Applications With SGX Enclaves

Date: 27 February 2017
Author(s):
Document Type: Reports
Tags: NDSS17 Associated event: NDSS Symposium 2017

A Broad View of the Ecosystem of Socially Engineered Exploit Documents

Date: 27 February 2017
Author(s):
Document Type: Reports
Tags: NDSS17 Associated event: NDSS Symposium 2017

Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones

Date: 27 February 2017
Author(s):
Document Type: Reports
Tags: NDSS17 Associated event: NDSS Symposium 2017

IO-DSSE: Scaling Dynamic Searchable Encryption to Millions of Indexes By Improving Locality

Date: 27 February 2017
Author(s):
Document Type: Reports
Tags: NDSS17 Associated event: NDSS Symposium 2017

The Security Impact of HTTPS Interception

Date: 27 February 2017
Author(s):
Document Type: Reports
Tags: NDSS17 Associated event: NDSS Symposium 2017

Dark Hazard: Learning-based, Large-Scale Discovery of Hidden Sensitive Operations in Android Apps

Date: 27 February 2017
Author(s):
Document Type: Reports
Tags: NDSS17 Associated event: NDSS Symposium 2017

Stack Object Protection with Low Fat Pointers

Date: 27 February 2017
Author(s):
Document Type: Reports
Tags: NDSS17 Associated event: NDSS Symposium 2017

Pages