You are here

Document Library

Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis

Date: 27 February 2017
Author(s):
Document Type: Reports
Tags: NDSS17 Associated event: NDSS Symposium 2017

PSI: Precise Security Instrumentation for Enterprise Networks

Date: 27 February 2017
Author(s):
Document Type: Reports
Tags: NDSS17 Associated event: NDSS Symposium 2017

A Call to ARMs: Understanding the Costs and Benefits of JIT Spraying Mitigations

Date: 27 February 2017
Author(s):
Document Type: Reports
Tags: NDSS17 Associated event: NDSS Symposium 2017

PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables

Date: 27 February 2017
Author(s):
Document Type: Reports
Tags: NDSS17 Associated event: NDSS Symposium 2017

(Cross-)Browser Fingerprinting via OS and Hardware Level Features

Date: 27 February 2017
Author(s):
Document Type: Reports
Tags: NDSS17 Associated event: NDSS Symposium 2017

TenantGuard: Scalable Runtime Verification of Cloud-Wide VM-Level Network Isolation

Date: 27 February 2017
Author(s):
Document Type: Reports
Tags: NDSS17 Associated event: NDSS Symposium 2017

SGX-Shield: Enabling Address Space Layout Randomization for SGX Programs

Date: 27 February 2017
Author(s):
Document Type: Reports
Tags: NDSS17 Associated event: NDSS Symposium 2017

Cracking Android Pattern Lock in Five Attempts

Date: 27 February 2017
Author(s):
Document Type: Reports
Tags: NDSS17 Associated event: NDSS Symposium 2017

Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit

Date: 27 February 2017
Author(s):
Document Type: Reports
Tags: NDSS17 Associated event: NDSS Symposium 2017

Catching Worms, Trojan Horses and PUPs: Unsupervised Detection of Silent Delivery Campaigns

Date: 27 February 2017
Author(s):
Document Type: Reports
Tags: NDSS17 Associated event: NDSS Symposium 2017

Pages