DECENTRALIZED CONTROL: A CASE STUDY OF RUSSIA (Englisch)
- Neue Suche nach: Ramesh, Reethika
- Neue Suche nach: Raman, Ram Sundara
- Neue Suche nach: Bernhard, Matthew
- Neue Suche nach: Ongkowijaya, Victor
- Neue Suche nach: Evdokimov, Leonid
- Neue Suche nach: Edmundson, Anne
- Neue Suche nach: Sprecher, Steven
- Neue Suche nach: Ikram, Muhammad
- Neue Suche nach: Ensafi, Roya
- Neue Suche nach: Ramesh, Reethika
- Neue Suche nach: Raman, Ram Sundara
- Neue Suche nach: Bernhard, Matthew
- Neue Suche nach: Ongkowijaya, Victor
- Neue Suche nach: Evdokimov, Leonid
- Neue Suche nach: Edmundson, Anne
- Neue Suche nach: Sprecher, Steven
- Neue Suche nach: Ikram, Muhammad
- Neue Suche nach: Ensafi, Roya
In:
Network and Distributed System Security Symposium 2020 ; Volume 1 of 2
; 165-182
;
2020
- Aufsatz (Konferenz) / Print
-
Titel:DECENTRALIZED CONTROL: A CASE STUDY OF RUSSIA
-
Beteiligte:Ramesh, Reethika ( Autor:in ) / Raman, Ram Sundara ( Autor:in ) / Bernhard, Matthew ( Autor:in ) / Ongkowijaya, Victor ( Autor:in ) / Evdokimov, Leonid ( Autor:in ) / Edmundson, Anne ( Autor:in ) / Sprecher, Steven ( Autor:in ) / Ikram, Muhammad ( Autor:in ) / Ensafi, Roya ( Autor:in )
-
Kongress:Network and Distributed System Security Symposium ; 27. ; 2020 ; San Diego, Calif.
-
Erschienen in:
-
Verlag:
- Neue Suche nach: Curran Associates, Inc.
-
Erscheinungsort:Red Hook, NY
-
Erscheinungsdatum:2020
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Datenquelle:
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
FUSE: FINDING FILE UPLOAD BUGS VIA PENETRATION TESTINGLee, Taekjin / Wi, Seongil / Lee, Suyoung / Son, Sooel et al. | 2020
- 18
-
MELTING POT OF ORIGINS: COMPROMISING THE INTERMEDIARY WEB SERVICES THAT REHOST WEBSITESWatanabe, Takuya / Shioji, Eitaro / Akiyama, Mitsuaki / Mori, Tatsuya et al. | 2020
- 33
-
DECEPTIVE PREVIEWS: A STUDY OF THE LINK PREVIEW TRUSTWORTHINESS IN SOCIAL PLATFORMSStivala, Giada / Pellegrino, Giancarlo et al. | 2020
- 48
-
CROSS-ORIGIN STATE INFERENCE (COSI) ATTACKS: LEAKING WEB SITE STATES TGHROUGH XS-LEAKSSudhodanan, Avinash / Khodayari, Soheil / Caballero, Juan et al. | 2020
- 64
-
CARNUS: EXPLORING THE PRIVACY THREATS OF BROWSER EXTENSION FINGERPRINTINGKarami, Soroush / Ilia, Panagiotis / Solomos, Konstantinos / Polakis, Jason et al. | 2020
- 80
-
HYPER-CUBE: HIGH-DIMENSIONAL HYPERVISOR FUZZINGSchumilo, Sergej / Aschermann, Cornelius / Abbasi, Ali / Warner, Simon / Holz, Thorsten et al. | 2020
- 96
-
HFL: HYBRID FUZZING ON THE LINUX KERNELKim, Kyungtae / Jeong, Dae R. / Kim, Chung Hwan / Jang, Yeongjin / Shin, Insik / Lee, Byoungyoung et al. | 2020
- 113
-
HOTFUZZ: DISCOVERING ALGORITHMIC DENIAL-OF-SERVICE VULNERABILITIES THROUGH GUIDED MICRO-FUZZINGBlair, William / Mambretti, Andrea / Arshad, Sajjad / Weissbacher, Michael / Robertson, William / Kirda, Engin / Egele, Manuel et al. | 2020
- 131
-
NOT ALL COVERAGE MEASUREMENTS ARE EQUAL: FUZZING BY COVERAGE ACCOUNTING FOR INPUT PRIORITIZATIONWang, Yanhao / Jia, Xiangkun / Liu, Yuwei / Zeng, Kyle / Bao, Tiffany / Wu, Dinghao / Su, Purui et al. | 2020
- 148
-
DETECTING PROBE-RESISTANT PROXIESFrolov, Sergey / Wampler, Jack / Wustrow, Eric et al. | 2020
- 165
-
DECENTRALIZED CONTROL: A CASE STUDY OF RUSSIARamesh, Reethika / Raman, Ram Sundara / Bernhard, Matthew / Ongkowijaya, Victor / Evdokimov, Leonid / Edmundson, Anne / Sprecher, Steven / Ikram, Muhammad / Ensafi, Roya et al. | 2020
- 183
-
MEASURING THE DEPLOYMENT OF NETWORK CENSORSHIP FILTERS AT GLOBAL SCALERaman, Ram Sundara / Stoll, Adrian / Dalek, Jakub / Ramesh, Reethika / Scott, Will / Ensafı, Roya et al. | 2020
- 199
-
SYMTCP: ELUDING STATEFUL DEEP PACKET INSPECTION WITH AUTOMATED DISCREPANCY DISCOVERYWang, Zhongjie / Zhu, Shitong / Cao, Yue / Qian, Zhiyun / Song, Chengyu / Krishnamurthy, Srikanth V. / Chan, Kevin S. / Braun, Tracy D. et al. | 2020
- 216
-
MASSBROWSER: UNBLOCKING THE CENSORED WEB FOR THE MASSES, BY THE MASSESNasr, Milad / Zolfaghari, Hadi / Houmansadr, Amir / Ghafari, Amirhossein et al. | 2020
- 234
-
ET TU ALEXA? WHEN COMMODITY WIFI DEVICES TURN INTO ADVERSARIAL MOTION SENSORSZhu, Yanzi / Xiao, Zhujun / Chen, Yuxin / Li, Zhijing / Liu, Max / Zhao, Ben Y. / Zheng, Heather et al. | 2020
- 249
-
METAMORPH: INJECTING INAUDIBLE COMMANDS INTO OVER-THE-AIR VOICE CONTROLLED SYSTEMSChen, Tao / Shangguan, Longfei / Li, Zhenjiang / Jamieson, Kyle et al. | 2020
- 266
-
SURFINGATTACK: INTERACTIVE HIDDEN ATTACK ON VOICE ASSISTANTS USING ULTRASONIC GUIDED WAVESYan, Qiben / Liu, Kehai / Zhou, Qin / Guo, Hanging / Zhang, Ning et al. | 2020
- 284
-
PACKET-LEVEL SIGNATURES FOR SMART HOME DEVICESTrimananda, Rahmadi / Varmarken, Janus / Markopoulou, Athina / Demsky, Brian et al. | 2020
- 302
-
LEARNING-BASED PRACTICAL SMARTPHONE EAVESDROPPING WITH BUILT-IN ACCELEROMETERBa, Zhongjie / Zheng, Tianhang / Zhang, Xinyu / Qin, Zhan / Li, Baochun / Liu, Xue / Ren, Kui et al. | 2020
- 320
-
AUTOMATED CROSS-PLATFORM REVERSE ENGINEERING OF CAN BUS COMMANDS FROM MOBILE APPSWen, Haohuang / Zhao, Qingchuan / Chen, Qi Alfred / Lin, Zhigiang et al. | 2020
- 337
-
ARE YOU GOING TO ANSWER THAT? MEASURING USER RESPONSES TO ANTI-ROBOCALL APPLICATION INDICATORSSherman, Imani N. / Bowers, Jasmine D. / McNamara, Keith Jr. / Gilbert, Juan E. / Ruiz, Jaime / Traynor, Patrick et al. | 2020
- 354
-
TKPERM: CROSS-PLATFORM PERMISSION KNOWLEDGE TRANSFER TO DETECT OVERPRIVILEGED THIRD-PARTY APPLICATIONSShezan, Faysal Hossain / Cheng, Kaiming / Zhang, Zhen / Cao, Yinzhi / Tian, Yuan et al. | 2020
- 369
-
FLOWPRINT: SEMI-SUPERVISED MOBILE-APP FINGERPRINTING ON ENCRYPTED NETWORK TRAFFICEde, Thijs Van / Bortolameotti, Riccardo / Continella, Andrea / Ren, Jingjing / Dubois, Daniel J. / Lindorfer, Martina / Choffnes, David / Steen, Maarten Van / Peter, Andreas et al. | 2020
- 387
-
BOBTAIL: IMPROVED BLOCKCHAIN SECURITY WITH LOW-VARIANCE MININGBissias, George / Levine, Brian N. et al. | 2020
- 403
-
SNAPPY: FAST ON-CHAIN PAYMENTS WITH PRACTICAL COLLATERALSMavroudis, Vasilios / Wüst, Karl / Dhar, Aritra / Kostiainen, Kari / Capkun, Srdjan et al. | 2020
- 420
-
THE ATTACK OF THE CLONES AGAINST PROOF-OF-AUTHORITYEkparinya, Parinya / Gramoli, Vincent / Jourjon, Guillaume et al. | 2020
- 434
-
BROKEN METRE: ATTACKING RESOURCE METERING IN EVMPerez, Daniel / Livshits, Benjamin et al. | 2020
- 449
-
FINDING SAFETY IN NUMBERS WITH SECURE ALLEGATION ESCROWSArun, Venkat / Kate, Aniket / Garg, Deepak / Druschel, Peter / Bhattacharjee, Bobby et al. | 2020
- 465
-
WHEN MATCH FIELDS DO NOT NEED TO MATCH: BUFFERED PACKETS HIJACKING IN SDNCao, Jiahao / Xie, Renjie / Sun, Kun / Li, Qi / Gu, Guofei / Xu, Mingwei et al. | 2020
- 480
-
AUTOMATED DISCOVERY OF CROSS-PLANE EVENT-BASED VULNERABILITIES IN SOFTWARE-DEFINED NETWORKINGUjcich, Benjamin E. / Jero, Samuel / Skowyra, Richard / Gomez, Steven R. / Bates, Adam / Sanders, William H. / Okhravi, Hamed et al. | 2020
- 498
-
SVLAN: SECURE & SCALABLE NETWORK VIRTUALIZATIONKwon, Jonghoon / Lee, Taeho / Háhni, Claude / Perrig, Adrian et al. | 2020
- 513
-
μRAI: SECURING EMBEDDED SYSTEMS WITH RETURN ADDRESS INTEGRITYAlmakhdhub, Naif Saleh / Clements, Abraham A. / Bagchi, Saurabh / Payer, Mathias et al. | 2020
- 531
-
NOJITSU: LOCKING DOWN JAVASCRIPT ENGINESPark, Taemin / Dhondt, Karel / Gens, David / Na, Yeoul / Volckaert, Stijn / Franz, Michael et al. | 2020
- 548
-
SODA: A GENERIC ONLINE DETECTION FRAMEWORK FOR SMART CONTRACTSChen, Ting / Cao, Rong / Li, Ting / Luo, Xiapu / Gu, Guofei / Zhang, Yufei / Liao, Zhou / Zhu, Hang / Chen, Gang / He, Zheyuan et al. | 2020
- 565
-
A PRACTICAL APPROACH FOR TAKING DOWN AVALANCHE BOTNETS UNDER REAL-WORLD CONSTRAINTSPochat, Victor Le / Hamme, Tim Van / Maroofi, Sourena / Goethem, Tom Van / Preuveneers, Davy / Duda, Andrzej / Joosen, Wouter / Korczynski, Maciej et al. | 2020
- 582
-
DESIGNING A BETTER BROWSER FOR TOR WITH BLASTWang, Tao et al. | 2020
- 597
-
ENCRYPTED DNS --> PRIVACY? A TRAFFIC ANALYSIS PERSPECTIVESiby, Sandra / Juarez, Marc / Diaz, Claudia / Vallina-Rodriguez, Narseo / Troncoso, Carmela et al. | 2020
- 615
-
ON USING APPLICATION-LAYER MIDDLEBOX PROTOCOLS FOR PEEKING BEHIND NAT GATEWAYSRytilahti, Teemu / Holz, Thorsten et al. | 2020
- 633
-
ABSYNTHE: AUTOMATIC BLACKBOX SIDE-CHANNEL SYNTHESIS ON COMMODITY MICROARCHITECTURESGras, Ben / Giuffrida, Cristiano / Kurth, Michael / Bos, Herbert / Razavi, Kaveh et al. | 2020
- 651
-
PHANTOMCACHE: OBFUSCATING CACHE CONFLICTS WITH LOCALIZED RANDOMIZATIONTan, Qinhan / Zeng, Zhihua / Bu, Kai / Ren, Kui et al. | 2020
- 668
-
DATA-DRIVEN DEBUGGING FOR FUNCTIONAL SIDE CHANNELSTizpaz-Niari, Saeid / Cerny, Pavol / Trivedi, Ashutosh et al. | 2020
- 685
-
MIND THE PORTABILITY: A WARRIORS GUIDE THROUGH REALISTIC PROFILED SIDE-CHANNEL ANALYSISBhasin, Shivam / Chattopadhyay, Anupam / Heuser, Annelie / Jap, Dirmanto / Picek, Stjepan / Shrivastwa, Ritu Ranjan et al. | 2020
- 700
-
HOLD THE DOOR! FINGERPRINTING YOUR CAR KEY TO PREVENT KEYLESS ENTRY CAR THEFTJoo, Kyungho / Choi, Wonsuk / Lee, Dong Hoon et al. | 2020
- 718
-
POSEIDON: MITIGATING VOLUMETRIC DDOS ATTACKS WITH PROGRAMMABLE SWITCHESZhang, Menghao / Li, Guanyu / Wang, Shicheng / Liu, Chang / Chen, Ang / Hu, Hongxin / Gu, Guofei / Li, Qi / Xu, Mingwei / Wu, Jianping et al. | 2020