SHORTMAC: EFFICIENT DATA-PLANE FAULT LOCALIZATION (Englisch)
- Neue Suche nach: Zhang, Xin
- Neue Suche nach: Zhou, Zongwei
- Neue Suche nach: Hsiao, Hsu-Chun
- Neue Suche nach: Kim, Tiffany Hyun-Jin
- Neue Suche nach: Perrig, Adrian
- Neue Suche nach: Tague, Patrick
- Neue Suche nach: Zhang, Xin
- Neue Suche nach: Zhou, Zongwei
- Neue Suche nach: Hsiao, Hsu-Chun
- Neue Suche nach: Kim, Tiffany Hyun-Jin
- Neue Suche nach: Perrig, Adrian
- Neue Suche nach: Tague, Patrick
In:
Network and Distributed System Security Symposium 2012 (NDSS '12)
; 556-563
;
2020
-
ISBN:
- Aufsatz (Konferenz) / Print
-
Titel:SHORTMAC: EFFICIENT DATA-PLANE FAULT LOCALIZATION
-
Beteiligte:Zhang, Xin ( Autor:in ) / Zhou, Zongwei ( Autor:in ) / Hsiao, Hsu-Chun ( Autor:in ) / Kim, Tiffany Hyun-Jin ( Autor:in ) / Perrig, Adrian ( Autor:in ) / Tague, Patrick ( Autor:in )
-
Kongress:Network and Distributed System Security Symposium ; 19. ; 2012 ; San Diego, Calif.
-
Erschienen in:
-
Verlag:
- Neue Suche nach: Curran Associates, Inc.
-
Erscheinungsort:Red Hook, NY
-
Erscheinungsdatum:2020
-
ISBN:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
- Neue Suche nach: 54.38 / 54.32
- Weitere Informationen zu Basisklassifikation
-
Klassifikation:
-
Datenquelle:
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
PLAIN-TEXT RECOVERY ATTACKS AGAINST DATAGRAM TLSPaterson, Kenneth / Alfardan, Nadhem et al. | 2020
- 19
-
ANDANA: ANONYMOUS NAMED DATA NETWORKING APPLICATIONDibenedetto, Steven / Gasti, Paolo / Tsudik, Gene / Uzun, Ersin et al. | 2020
- 37
-
PERSISTENT OSPF ATTACKSNakibly, Gabi / Kirshon, Alex / Gonikman, Dima / Boneh, Dan et al. | 2020
- 48
-
YOU ARE WHAT YOU LIKE! INFORMATION LEAKAGE THROUGH USERS' INTERESTSChaabane, Abdelberi / Acs, Gergely / Kaafar, Mohamed Ali et al. | 2020
- 70
-
X-VINE: SECURE AND PSEUDONYMOUS ROUTING IN DHTS USING SOCIAL NETWORKSMittal, Prateek / Caesar, Matthew / Borisov, Nikita et al. | 2020
- 87
-
TOWARDS ONLINE SPAM FILTERING IN SOCIAL NETWORKSGao, Hongyu / Chen, Yan / Lee, Kathy / Palsetia, Diana / Choudhary, Alok et al. | 2020
- 103
-
LOCATION LEAKS OVER THE GSM AIR INTERFACEKune, Denis Foo / Koelndorfer, John / Hopper, Nicholas / Kim, Yongdae et al. | 2020
- 113
-
TRACK ME IF YOU CAN: ON THE EFFECTIVENESS OF CONTEXT-BASED IDENTIFIER CHANGES IN DEPLOYED MOBILE NETWORKSBindschaedler, Laurent / Jadliwala, Murtuza / Bilogrevic, Igor / Aad, Imad / Ginzboorg, Philip / Niemi, Valtteri / Hubaux, Jean-Pierre et al. | 2020
- 130
-
YOU CAN RUN, BUT YOU CAN'T HIDE: EXPOSING NETWORK LOCATION FOR TARGETED DOS ATTACKS IN CELLULAR NETWORKSQian, Zhiyun / Wang, Zhaoguang / Xu, Qiang / Mao, Z. Morley / Zhang, Ming / Wang, Yi-Min et al. | 2020
- 146
-
WEAPONIZING FEMTOCELLS: THE EFFECT OF ROGUE DEVICES ON MOBILE TELECOMMUNICATIONSGolde, Nico / Redon, Kévin / Borgaonkar, Ravishankar et al. | 2020
- 154
-
PRIVACY-PRESERVING LOGARITHMIC-TIME SEARCH ON ENCRYPTED DATA IN CLOUDLu, Yanbin et al. | 2020
- 162
-
LARGE-SCALE PRIVACY-PRESERVING MAPPING OF HUMAN GENOMIC SEQUENCES ON HYBRID CLOUDSChen, Yangyi / Peng, Bo / Wang, Xiaofeng / Tang, Haixu et al. | 2020
- 180
-
MAKING ARGUMENT SYSTEMS FOR OUTSOURCED COMPUTATION PRACTICAL (SOMETIMES)Setty, Srinath / Mcpherson, Richard / Blumberg, Andrew / Walfish, Michael et al. | 2020
- 200
-
TOWARDS PRACTICAL OBLIVIOUS RAMStefanov, Emil / Shi, Elaine / Song, Dawn et al. | 2020
- 219
-
HUBBLE: TRANSPARENT AND EXTENSIBLE MALWARE ANALYSIS BY COMBINING HARDWARE VIRTUALIZATION AND SOFTWARE EMULATIONYan, Lok / Jayachandra, Manjukumar / Zhang, Mu / Yin, Heng et al. | 2020
- 220
-
FREEMARKET: SHOPPING FOR FREE IN ANDROID APPLICATIONSReynaud, Daniel / Song, Dawn / Magrino, Tom / Wu, Edward / Shin, Richard et al. | 2020
- 221
-
DISTANCE HIJACKING ATTACKS ON DISTANCE BOUNDING PROTOCOLSCremers, Cas / Rasmussen, Kasper Bonne / Capkun, Srdjan et al. | 2020
- 222
-
THROTTLING TOR BANDWIDTH PARASITESJansen, Rob / Hopper, Nicholas / Syverson, Paul et al. | 2020
- 223
-
TAKING ROUTERS OFF THEIR MEDS: WHY ASSUMPTIONS OF ROUTER STABILITY ARE DANGEROUSSchuchard, Maxfield / Thompson, Christopher / Hopper, Nicholas / Kim, Yongdae et al. | 2020
- 224
-
NEWTON MEETS VIVALDI: USING PHYSICAL LAWS TO SECURE VIRTUAL COORDINATE SYSTEMSSeibert, Jeff / Becker, Sheila / Nita-Rotaru, Cristina / State, Radu et al. | 2020
- 225
-
CHARM: A FRAMEWORK FOR RAPIDLY PROTOTYPING CRYPTOSYSTEMSAkinyele, Joseph A. / Green, Matthew D. / Rubin, Aviel D. et al. | 2020
- 226
-
ABUSE DETECTION AND PREVENTION SYSTEMS AT A LARGE SCALE VIDEO SHARING WEBSITEChen, Yu-To / Grinspan, Pierre / Livingston, Blake / Nandy, Palash / Palmer, Brian et al. | 2020
- 227
-
ACCESS PATTERN DISCLOSURE ON SEARCHABLE ENCRYPTION: RAMIFICATION ATTACK AND MITIGATIONIslam, Mohammad / Kuzu, Mehmet / Kantarcioglu, Murat et al. | 2020
- 242
-
ON LIMITATIONS OF DESIGNING LEAKAGE-RESILIENT PASSWORD SYSTEMS: ATTACKS, PRINCIPALS AND USABILITYYan, Qiang / Han, Jin / Li, Yingjiu / Deng, Robert H. et al. | 2020
- 258
-
ADAPTIVE PASSWORD-STRENGTH METERS FROM MARKOV MODELSCastelluccia, Claude / Duermuth, Markus / Perito, Daniele et al. | 2020
- 272
-
PRIVATE SET INTERSECTION: ARE GARBLED CIRCUITS BETTER THAN CUSTOM PROTOCOLS?Huang, Yan / Evans, David / Katz, Jonathan et al. | 2020
- 284
-
GUESS WHO’S TEXTING YOU? EVALUATING THE SECURITY OF SMARTPHONE MESSAGING APPLICATIONSSchrittwieser, Sebastian / Frühwirt, Peter / Kieseberg, Peter / Leithner, Manuel / Mulazzani, Martin / Huber, Markus / Weippl, Edgar et al. | 2020
- 293
-
MOCFI: A FRAMEWORK TO MITIGATE CONTROL-FLOW ATTACKS ON SMARTPHONESDavi, Lucas / Dmitrienko, Alexandra / Egele, Manuel / Fischer, Thomas / Holz, Thorsten / Hund, Ralf / Nürnberger, Stefan / Sadeghi, Ahmad-Reza et al. | 2020
- 310
-
TOWARDS TAMING PRIVILEGE-ESCALATION ATTACKS ON ANDROIDBugiel, Sven / Davi, Lucas / Dmitrienko, Alexandra / Fischer, Thomas / Sadeghi, Ahmad-Reza / Shastry, Bhargava et al. | 2020
- 330
-
SYSTEMATIC DETECTION OF CAPABILITY LEAKS IN STOCK ANDROID SMARTPHONESGrace, Michael / Zhou, Yajin / Wang, Zhi / Jiang, Xuxian et al. | 2020
- 343
-
HEY, YOU, GET OFF OF MY MARKET: DETECTING MALICIOUS APPS IN OFFICIAL AND ALTERNATIVE ANDROID MARKETSZhou, Yajin / Wang, Zhi / Zhou, Wu / Jiang, Xuxian et al. | 2020
- 355
-
INSIGHTS INTO USER BEHAVIOR IN DEALING WITH INTERNET ATTACKSOnarlioglu, Kaan / Yilmaz, Utku Ozan / Kirda, Engin / Balzarotti, Davide et al. | 2020
- 368
-
PATHCUTTER: SEVERING THE SELF-PROPAGATION PATH OF XSS JAVASCRIPT WORMS IN SOCIAL WEB NETWORKSCao, Yinzhi / Yegneswaran, Vinod / Porras, Phillip / Chen, Yan et al. | 2020
- 383
-
THE LATENT COMMUNITY MODEL FOR DETECTING SYBILS IN SOCIAL NETWORKSCai, Zhuhua / Jermaine, Christopher et al. | 2020
- 399
-
BLACR: TTP-FREE BLACKLISTABLE ANONYMOUS CREDENTIALS WITH REPUTATIONAu, Man Ho / Kapadia, Apu / Susilo, Willy et al. | 2020
- 408
-
ACCOUNTABLE WIRETAPPING -OR- I KNOW THEY CAN HEAR YOU NOWBates, Adam / Butler, Kevin / Sherr, Micah / Shields, Clay / Traynor, Patrick / Wallach, Dan et al. | 2020
- 418
-
SHADOW: RUNNING TOR IN A BOX FOR ACCURATE AND EFFICIENT EXPERIMENTATIONJansen, Rob / Hopper, Nicholas et al. | 2020
- 436
-
DISCOVERING SEMANTIC DATA OF INTEREST FROM UN-MAPPABLE MEMORY WITH CONFIDENCELin, Zhiqiang / Rhee, Junghwan / Wu, Chao / Zhang, Xiangyu / Xu, Dongyan et al. | 2020
- 447
-
SECURESWITCH: BIOS-ASSISTED ISOLATION AND SWITCH BETWEEN TRUSTED AND UNTRUSTED COMMODITY OSESSun, Kun / Wang, Jiang / Zhang, Fengwei / Stavrou, Angelos et al. | 2020
- 462
-
SMART: SECURE AND MINIMAL ARCHITECTURE FOR (ESTABLISHING DYNAMIC) ROOF OF TRUSTEldefrawy, Karim / Tsudik, Gene / Francillon, Aurélien / Perito, Daniele et al. | 2020
- 473
-
KRUISER: SEMI-SYNCHRONIZED NON-BLOCKING CONCURRENT KERNEL HEAP BUFFER OVERFLOW MONITORINGTian, Donghai / Zeng, Qiang / Wu, Dinghao / Liu, Peng / Hu, Changzhen et al. | 2020
- 486
-
WARNINGBIRD: DETECTING SUSPICIOUS URLS IN TWITTER STREAMLee, Sangho / Kim, Jong et al. | 2020
- 499
-
USING REPLICATED EXECUTION FOR A MORE SECURE AND RELIABLE WEB BROWSERXue, Hui / Dautenhahn, Nathan / King, Samuel et al. | 2020
- 513
-
HOST FINGERPRINTING AND TRACKING ON THE WEB: PRIVACY AND SECURITY IMPLICATIONYen, Ting-Fang / Xie, Yinglian / Yu, Fang / Yu, Roger Peng / Abadi, Martin et al. | 2020
- 529
-
CHROME EXTENSIONS: THREAT ANALYSIS AND COUNTERMEASURESLiu, Lei / Zhang, Xinwen / Yan, Guanhua / Chen, Songqing et al. | 2020
- 543
-
GHOST DOMAIN NAMES: REVOKED YET STILL RESOLVABLEJiang, Jian / Liang, Jinjin / Li, Kang / Li, Jun / Duan, Haixin / Wu, Jianping et al. | 2020
- 556
-
SHORTMAC: EFFICIENT DATA-PLANE FAULT LOCALIZATIONZhang, Xin / Zhou, Zongwei / Hsiao, Hsu-Chun / Kim, Tiffany Hyun-Jin / Perrig, Adrian / Tague, Patrick et al. | 2020
- 564
-
BYPASSING SPACE EXPLOSION IN REGULAR EXPRESSION MATCHING FOR NETWORK INTRUSION DETECTION AND PREVENTION SYSTEMSPatel, Jignesh / Liu, Alex / Torng, Eric et al. | 2020
- 572
-
THE CASE FOR PREFETCHING AND PREVALIDATING TLS SERVER CERTIFICATESStark, Emily / Huang, Lin-Shung / Israni, Dinesh / Jackson, Collin / Boneh, Dan et al. | 2020
- 594
-
GATLING: AUTOMATIC ATTACK DISCOVERY IN LARGE-SCALE DISTRIBUTED SYSTEMSLee, Hyojeong / Seibert, Jeff / Killian, Charles / Nita-Rotaru, Cristina et al. | 2020
- 611
-
AUTOMATED SYNTHESIS OF SECURE DISTRIBUTED APPLICATIONSBackes, Michael / Maffei, Matteo / Pecina, Kim et al. | 2020
- 627
-
A GENERAL APPROACH FOR EFFICIENTLY ACCELERATING SOFTWARE-BASED DYNAMIC DATA FLOW TRACKING ON COMMODITY HARDWAREJee, Kangkook / Portokalidis, Georgios / Kemerlis, Vasileios P. / Ghosh, Soumyadeep / August, David I. / Keromytis, Angelos D. et al. | 2020
- 649
-
STATIC DETECTION OF C++ VTABLE ESCAPE VULNERABILITIES IN BINARY CODEDewey, David / Giffin, Jon et al. | 2020
- 660
-
IDENTIFYING AND ANALYZING POINTER MISUSES FOR SOPHISTICATED MEMORY- CORRUPTION EXPLOIT DIAGNOSISZhang, Mingwei / Prakash, Aravind / Li, Xiaolei / Liang, Zhenkai / Yin, Heng et al. | 2020