STDNeut: Neutralizing Sensor, Telephony System and Device State Information on Emulated Android Environments (English)
- New search for: Kumar, Saurabh
- New search for: Mishra, Debadatta
- New search for: Panda, Biswabandan
- New search for: Shukla, Sandeep K.
- New search for: Krenn, Stephan
- New search for: Shulman, Haya
- New search for: Vaudenay, Serge
- New search for: Kumar, Saurabh
- New search for: Mishra, Debadatta
- New search for: Panda, Biswabandan
- New search for: Shukla, Sandeep K.
In:
Cryptology and Network Security
: 19th International Conference, CANS 2020, Vienna, Austria, December 14–16, 2020, Proceedings
;
Chapter: 5
;
85-106
;
2020
- Article/Chapter (Book) / Electronic Resource
-
Title:STDNeut: Neutralizing Sensor, Telephony System and Device State Information on Emulated Android Environments
-
Additional title:Lect.Notes Computer
-
Contributors:Krenn, Stephan ( editor ) / Shulman, Haya ( editor ) / Vaudenay, Serge ( editor ) / Kumar, Saurabh ( author ) / Mishra, Debadatta ( author ) / Panda, Biswabandan ( author ) / Shukla, Sandeep K. ( author )
-
Conference:International Conference on Cryptology and Network Security ; 2020 ; Vienna, Austria
-
Published in:Cryptology and Network Security : 19th International Conference, CANS 2020, Vienna, Austria, December 14–16, 2020, Proceedings ; Chapter: 5 ; 85-106Lecture Notes in Computer Science ; 12579 ; 85-106Security and Cryptology ; 85-106
-
Publisher:
- New search for: Springer International Publishing
-
Place of publication:Cham
-
Publication date:2020-12-09
-
Size:22 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
An Attack on Some Signature Schemes Constructed from Five-Pass Identification SchemesKales, Daniel / Zaverucha, Greg et al. | 2020
- 2
-
Energy Analysis of Lightweight AEAD CircuitsCaforio, Andrea / Balli, Fatih / Banik, Subhadeep et al. | 2020
- 3
-
Cross-Site Search Attacks: Unauthorized Queries over Private DataMeyuhas, Bar / Gelernter, Nethanel / Herzberg, Amir et al. | 2020
- 4
-
Stronger Targeted Poisoning Attacks Against Malware DetectionNarisada, Shintaro / Sasaki, Shoichiro / Hidano, Seira / Uchibayashi, Toshihiro / Suganuma, Takuo / Hiji, Masahiro / Kiyomoto, Shinsaku et al. | 2020
- 5
-
STDNeut: Neutralizing Sensor, Telephony System and Device State Information on Emulated Android EnvironmentsKumar, Saurabh / Mishra, Debadatta / Panda, Biswabandan / Shukla, Sandeep K. et al. | 2020
- 6
-
HMAC and “Secure Preferences”: Revisiting Chromium-Based Browsers SecurityPicazo-Sanchez, Pablo / Schneider, Gerardo / Sabelfeld, Andrei et al. | 2020
- 7
-
Detecting Word Based DGA Domains Using Ensemble ModelsCharan, P. V. Sai / Shukla, Sandeep K. / Anand, P. Mohan et al. | 2020
- 8
-
Distance-Bounding, Privacy-Preserving Attribute-Based CredentialsBosk, Daniel / Bouget, Simon / Buchegger, Sonja et al. | 2020
- 9
-
Trenchcoat: Human-Computable Hashing Algorithms for Password GenerationRooparaghunath, Ruthu Hulikal / Harikrishnan, T. S. / Gupta, Debayan et al. | 2020
- 10
-
Provably Secure Scalable Distributed Authentication for CloudsHuszti, Andrea / Oláh, Norbert et al. | 2020
- 11
-
Forward-Secure 0-RTT Goes Live: Implementation and Performance Analysis in QUICDallmeier, Fynn / Drees, Jan P. / Gellert, Kai / Handirk, Tobias / Jager, Tibor / Klauke, Jonas / Nachtigall, Simon / Renzelmann, Timo / Wolf, Rudi et al. | 2020
- 12
-
Semi-commutative Masking: A Framework for Isogeny-Based Protocols, with an Application to Fully Secure Two-Round Isogeny-Based OTde Saint Guilhem, Cyprien Delpech / Orsini, Emmanuela / Petit, Christophe / Smart, Nigel P. et al. | 2020
- 13
-
Optimized and Secure Pairing-Friendly Elliptic Curves Suitable for One Layer Proof CompositionEl Housni, Youssef / Guillevic, Aurore et al. | 2020
- 14
-
Curves with Fast Computations in the First Pairing GroupClarisse, Rémi / Duquesne, Sylvain / Sanders, Olivier et al. | 2020
- 15
-
Revisiting ECM on GPUsWloka, Jonas / Richter-Brockmann, Jan / Stahlke, Colin / Kleinjung, Thorsten / Priplata, Christine / Güneysu, Tim et al. | 2020
- 16
-
Arcula: A Secure Hierarchical Deterministic Wallet for Multi-asset BlockchainsDi Luzio, Adriano / Francati, Danilo / Ateniese, Giuseppe et al. | 2020
- 17
-
Detecting Covert Cryptomining Using HPCGangwal, Ankit / Piazzetta, Samuele Giuliano / Lain, Gianluca / Conti, Mauro et al. | 2020
- 18
-
Lightweight Virtual Payment ChannelsJourenko, Maxim / Larangeira, Mario / Tanaka, Keisuke et al. | 2020
- 19
-
Chosen-Ciphertext Secure Multi-identity and Multi-attribute Pure FHEPal, Tapas / Dutta, Ratna et al. | 2020
- 20
-
Linear Complexity Private Set Intersection for Secure Two-Party ProtocolsKarakoç, Ferhat / Küpçü, Alptekin et al. | 2020
- 21
-
Compact Multi-Party Confidential TransactionsAlupotha, Jayamine / Boyen, Xavier / Foo, Ernest et al. | 2020
- 22
-
Simulation Extractable Versions of Groth’s zk-SNARK RevisitedBaghery, Karim / Pindado, Zaira / Ràfols, Carla et al. | 2020
- 23
-
Efficient Composable Oblivious Transfer from CDH in the Global Random Oracle ModelDavid, Bernardo / Dowsley, Rafael et al. | 2020
- 24
-
Integral Cryptanalysis of Reduced-Round Tweakable TWINEElSheikh, Muhammad / Youssef, Amr M. et al. | 2020
- 25
-
RiCaSi: Rigorous Cache Side Channel Mitigation via Selective Circuit CompilationMantel, Heiko / Scheidel, Lukas / Schneider, Thomas / Weber, Alexandra / Weinert, Christian / Weißmantel, Tim et al. | 2020
- 26
-
Assembly or Optimized C for Lightweight Cryptography on RISC-V?Campos, Fabio / Jellema, Lars / Lemmen, Mauk / Müller, Lars / Sprenkels, Amber / Viguier, Benoit et al. | 2020
- 27
-
Attack on LAC Key Exchange in Misuse SituationGreuet, Aurélien / Montoya, Simon / Renault, Guénaël et al. | 2020
- 28
-
Enhancing Code Based Zero-Knowledge Proofs Using Rank MetricBellini, Emanuele / Gaborit, Philippe / Hasikos, Alexandros / Mateu, Victor et al. | 2020
- 29
-
A Secure Algorithm for Rounded Gaussian SamplingBrannigan, Séamus / O’Neill, Maire / Khalid, Ayesha / Rafferty, Ciara et al. | 2020
- 30
-
Accelerating Lattice Based Proxy Re-encryption Schemes on GPUsSahu, Gyana / Rohloff, Kurt et al. | 2020