Securing Binary Code (English)
- New search for: Hawkins, William
- New search for: Hawkins, William
- New search for: Hiser, Jason D
- New search for: Nguyen-Tuong, Anh
- New search for: Co, Michele
- New search for: Davidson, Jack W
In:
IEEE security & privacy
;
15
, 6
; 77-81
;
2017
-
ISSN:
- Article (Journal) / Print
-
Title:Securing Binary Code
-
Contributors:
-
Published in:IEEE security & privacy ; 15, 6 ; 77-81
-
Publisher:
- New search for: IEEE
-
Place of publication:New York, NY
-
Publication date:2017
-
ISSN:
-
ZDBID:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:English
- New search for: 54.38 / 54.38
- Further information on Basic classification
-
Keywords:
-
Classification:
-
Source:
Table of contents – Volume 15, Issue 6
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Table of Contents| 2017
- 3
-
Security Advice That Can Be Followed| 2017
- 6
-
Masthead| 2017
- 7
-
Silver Bullet Talks with Nicole PerlrothMcGraw, Gary et al. | 2017
- 10
-
Recent Advancements in Digital ForensicsMazurczyk, Wojciech / Caviglione, Luca / Wendzel, Steffen et al. | 2017
- 12
-
The Future of Digital Forensics: Challenges and the Road AheadCaviglione, Luca / Wendzel, Steffen / Mazurczyk, Wojciech et al. | 2017
- 18
-
Programmable Logic Controller ForensicsAhmed, Irfan / Obermeier, Sebastian / Sudhakaran, Sneha / Roussev, Vassil et al. | 2017
- 25
-
Botnet Fingerprinting: Anomaly Detection in SMTP ConversationsBazydlo, Piotr / Lasota, Krzysztof / Kozakiewicz, Adam et al. | 2017
- 33
-
PROFORMA: Proactive Forensics with Message AnalyticsGupta, Amarnath / Dasgupta, Subhasis / Bagchi, Aditya et al. | 2017
- 42
-
Mobile Forensics: Advances, Challenges, and Research OpportunitiesChernyshev, Maxim / Zeadally, Sherali / Baig, Zubair / Woodward, Andrew et al. | 2017
- 52
-
An Exploration of the Effects of Sensory Stimuli on the Completion of Security TasksBerg, Bruce G. / Kaczmarek, Tyler / Kobsa, Alfred / Tsudik, Gene et al. | 2017
- 61
-
Faster Secure Cloud Computations with a Trusted ProxyDrucker, Nir / Gueron, Shay / Pinkas, Benny et al. | 2017
- 68
-
Decision and Experienced Utility: Computational Applications in Privacy Decision MakingFarahmand, Fariborz et al. | 2017
- 73
-
The Last Mile for IoT PrivacyChow, Richard et al. | 2017
- 77
-
Securing Binary CodeHawkins, William / Hiser, Jason D. / Anh Nguyen-Tuong, / Co, Michele / Davidson, Jack W. et al. | 2017
- 82
-
NAND Flash Memory Forensic Analysis and the Growing Challenge of Bit Errorsvan Zandwijk, Jan Peter / Fukami, Aya et al. | 2017
- 88
-
Who Are You?Bellovin, Steven M. et al. | 2017
- c1
-
Front Cover| 2017
- c2
-
Call for Papers Special Issue on Security and Privacy Research in Brazil| 2017
- c3
-
#SP18 is back in San Francisco!| 2017
- c4
-
got flaws?| 2017