BinDNN: Resilient Function Matching Using Deep Learning (Englisch)
- Neue Suche nach: Lageman, Nathaniel
- Neue Suche nach: Kilmer, Eric D.
- Neue Suche nach: Walls, Robert J.
- Neue Suche nach: McDaniel, Patrick D.
- Neue Suche nach: Lageman, Nathaniel
- Neue Suche nach: Kilmer, Eric D.
- Neue Suche nach: Walls, Robert J.
- Neue Suche nach: McDaniel, Patrick D.
In:
Security and Privacy in Communication Networks
8
;
517-537
;
2017
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:BinDNN: Resilient Function Matching Using Deep Learning
-
Beteiligte:Lageman, Nathaniel ( Autor:in ) / Kilmer, Eric D. ( Autor:in ) / Walls, Robert J. ( Autor:in ) / McDaniel, Patrick D. ( Autor:in )
-
Erschienen in:Security and Privacy in Communication Networks , 8 ; 517-537
-
Verlag:
- Neue Suche nach: Springer International Publishing
-
Erscheinungsort:Cham
-
Erscheinungsdatum:01.01.2017
-
Format / Umfang:21 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 3
-
AppShield: Enabling Multi-entity Access Control Cross Platforms for Mobile App ManagementQu, Zhengyang / Guo, Guanyu / Shao, Zhengyue / Rastogi, Vaibhav / Chen, Yan / Chen, Hao / Hong, Wangjun et al. | 2017
- 24
-
H-Binder: A Hardened Binder Framework on Android SystemsShen, Dong / Zhang, Zhangkai / Ding, Xuhua / Li, Zhoujun / Deng, Robert et al. | 2017
- 44
-
Exploiting Android System Services Through Bypassing Service HelpersGu, Yacong / Cheng, Yao / Ying, Lingyun / Lu, Yemian / Li, Qi / Su, Purui et al. | 2017
- 63
-
Secure Keyboards Against Motion Based Keystroke Inference AttackDu, Shaoyong / Gao, Yue / Hua, Jingyu / Zhong, Sheng et al. | 2017
- 85
-
Cloud-Based Privacy-Preserving Parking Navigation Through Vehicular CommunicationsNi, Jianbing / Zhang, Kuan / Lin, Xiaodong / Yu, Yong / Shen, Xuemin (Sherman) et al. | 2017
- 104
-
TruSDN: Bootstrapping Trust in Cloud Network InfrastructurePaladi, Nicolae / Gehrmann, Christian et al. | 2017
- 125
-
Key Update at Train Stations: Two-Layer Dynamic Key Update Scheme for Secure Train CommunicationsChang, Sang-Yoon / Cai, Shaoying / Seo, Hwajeong / Hu, Yih-Chun et al. | 2017
- 144
-
Faulty Node Repair and Dynamically Spawned Black Hole SearchShi, Wei / Peng, Mengfei / Corriveau, Jean-Pierre / Croft, William Lee et al. | 2017
- 165
-
Attribute-Based Encryption with Granular RevocationCui, Hui / Deng, Robert H. / Ding, Xuhua / Li, Yingjiu et al. | 2017
- 182
-
Tokenisation Blacklisting Using Linkable Group SignaturesUmar, Assad / Gurulian, Iakovos / Mayes, Keith / Markantonakis, Konstantinos et al. | 2017
- 199
-
Privacy-Preserving Multi-pattern MatchingZhang, Tao / Wang, Xiuhua / Chow, Sherman S. M. et al. | 2017
- 219
-
Parallel and Dynamic Structured EncryptionLai, Russell W. F. / Chow, Sherman S. M. et al. | 2017
- 241
-
Secure IoT Using Weighted Signed GraphsSarkar, Pinaki / Chowdhury, Morshed Uddin et al. | 2017
- 257
-
A Multi-protocol Security Framework to Support Internet of ThingsRay, Biplob R. / Chowdhury, Morshed U. / Abawajy, Jemal H. et al. | 2017
- 271
-
Tinder Me Softly – How Safe Are You Really on Tinder?Carman, Mark / Choo, Kim-Kwang Raymond et al. | 2017
- 287
-
Biometric Authentication Using Facial RecognitionChowdhury, Mozammel / Gao, Junbin / Islam, Rafiqul et al. | 2017
- 296
-
Platform as a Service (PaaS) in Public Cloud: Challenges and Mitigating StrategyIkundi, Fidel / Islam, Rafiqul / White, Peter et al. | 2017
- 307
-
Architecture Support for Controllable VMI on Untrusted CloudShi, Jiangyong / Yang, Yuexiang et al. | 2017
- 317
-
IacCE: Extended Taint Path Guided Dynamic Analysis of Android Inter-App Data LeakageWu, Tianjun / Yang, Yuexiang et al. | 2017
- 334
-
A Multi-layer Model to Detect Spam Email at Client SideBajaj, Kamini (Simi) et al. | 2017
- 353
-
Access Control Management for Secure Cloud StorageBacis, Enrico / De Capitani di Vimercati, Sabrina / Foresti, Sara / Paraboschi, Stefano / Rosa, Marco / Samarati, Pierangela et al. | 2017
- 373
-
Attribution of Economic Denial of Sustainability Attacks in Public CloudsKarami, Mohammad / Chen, Songqing et al. | 2017
- 392
-
A Secure and Fast Dispersal Storage Scheme Based on the Learning with Errors ProblemYang, Ling / Fang, Fuyang / Lu, Xianhui / Zhu, Wen-Tao / Wang, Qiongxiao / Yan, Shen / Pan, Shiran et al. | 2017
- 412
-
ase-PoW: A Proof of Ownership Mechanism for Cloud Deduplication in Hierarchical EnvironmentsGonzález-Manzano, Lorena / Fuentes, Jose Maria / Choo, Kim-Kwang Raymond et al. | 2017
- 431
-
Website Forensic Investigation to Identify Evidence and Impact of CompromiseTakata, Yuta / Akiyama, Mitsuaki / Yagi, Takeshi / Yada, Takeshi / Goto, Shigeki et al. | 2017
- 454
-
SecWeb: Privacy-Preserving Web Browsing Monitoring with w-Event Differential PrivacyWang, Qian / Lu, Xiao / Zhang, Yan / Wang, Zhibo / Qin, Zhan / Ren, Kui et al. | 2017
- 475
-
A Behavioral Biometrics Based Approach to Online Gender ClassificationBalen, Nicolas / Ball, Christopher T. / Wang, Haining et al. | 2017
- 496
-
Unique on the Road: Re-identification of Vehicular Location-Based MetadataXiao, Zheng / Wang, Cheng / Han, Weili / Jiang, Changjun et al. | 2017
- 517
-
BinDNN: Resilient Function Matching Using Deep LearningLageman, Nathaniel / Kilmer, Eric D. / Walls, Robert J. / McDaniel, Patrick D. et al. | 2017
- 538
-
TZ-SSAP: Security-Sensitive Application Protection on Hardware-Assisted Isolated EnvironmentHe, Yanhong / Zheng, Xianyi / Zhu, Ziyuan / Shi, Gang et al. | 2017
- 557
-
SQLite Forensic Analysis Based on WALLiu, Yao / Xu, Ming / Xu, Jian / Zheng, Ning / Lin, Xiaodong et al. | 2017
- 575
-
Impact of Environment on Branch Transfer of SoftwareFu, Jianming / Lin, Yan / Zhang, Xu et al. | 2017
- 597
-
DroidClassifier: Efficient Adaptive Mining of Application-Layer Header for Classifying Android MalwareLi, Zhiqiang / Sun, Lichao / Yan, Qiben / Srisa-an, Witawas / Chen, Zhenxiang et al. | 2017
- 617
-
GreatEatlon: Fast, Static Detection of Mobile RansomwareZheng, Chengyu / Dellarocca, Nicola / Andronio, Niccolò / Zanero, Stefano / Maggi, Federico et al. | 2017
- 637
-
Data Flow Analysis on Android Platform with Fragment Lifecycle ModelingLi, Yongfeng / Ouyang, Jinbin / Guo, Shanqing / Mao, Bing et al. | 2017
- 655
-
Alde: Privacy Risk Analysis of Analytics Libraries in the Android EcosystemLiu, Xing / Zhu, Sencun / Wang, Wei / Liu, Jiqiang et al. | 2017
- 675
-
FROPUF: How to Extract More Entropy from Two Ring Oscillators in FPGA-Based PUFsZhang, Qinglong / Liu, Zongbin / Ma, Cunqing / Li, Changting / Zhang, Lingchen et al. | 2017
- 694
-
Extracting More Entropy for TRNGs Based on Coherent SamplingYang, Jing / Ma, Yuan / Chen, Tianyu / Lin, Jingqiang / Jing, Jiwu et al. | 2017
- 710
-
A Very Compact Masked S-Box for High-Performance Implementation of SM4 Based on Composite FieldFu, Hailiang / Bai, Guoqiang / Wu, Xingjun et al. | 2017
- 722
-
Security Analysis of Vendor Customized Code in Firmware of Embedded DeviceLiu, Muqing / Zhang, Yuanyuan / Li, Juanru / Shu, Junliang / Gu, Dawu et al. | 2017
- 743
-
POSTER: Security Analysis of Personal Unmanned Aerial VehiclesChen, Peng / Chen, Hao et al. | 2017
- 747
-
Modeling User Browsing Activity for Application Layer DDoS Attack DetectionMiu, TungNgai / Wang, Chenxu / Luo, Daniel Xiapu / Wang, Jinhe et al. | 2017
- 751
-
POSTER: A Framework for IoT ReprogrammingXue, Nian / Liang, Lulu / Zhang, Jie / Huang, Xin et al. | 2017
- 755
-
Privacy Preserving Data Classification Using Inner Product EncryptionLigier, Damien / Carpov, Sergiu / Fontaine, Caroline / Sirdey, Renaud et al. | 2017
- 758
-
POSTER: Location Privacy Using Homomorphic EncryptionHu, Peizhao / Zhu, Siyu et al. | 2017
- 762
-
SDNGuardian: Secure Your REST NBIs with API-Grained Permission Checking SystemRen, Kailei / Wei, Qiang / Wu, Zehui / Wang, Qingxian et al. | 2017
- 766
-
POSTER: A Novel Wavelet Denoising Method Based on Robust Principal Component Analysis in Side Channel AttacksAi, Juan / Wang, Zhu / Zhou, Xinping / Ou, Changhai et al. | 2017
- 770
-
Exploitation of NetEm Utility for Non-payload-based Obfuscation Techniques Improving Network Anomaly DetectionHomoliak, Ivan / Teknos, Martin / Barabas, Maros / Hanacek, Petr et al. | 2017
- 774
-
POSTER: Non-intrusive Face Spoofing Detection Based on Guided Filtering and Image Quality AnalysisPeng, Fei / Qin, Le / Long, Min et al. | 2017