IEEE

Results: 22018



#Item
21Cryptographic Function Detection in Obfuscated Binaries via Bit-precise Symbolic Loop Mapping Dongpeng Xu The Pennsylvania State University University Park, USA Email:

Cryptographic Function Detection in Obfuscated Binaries via Bit-precise Symbolic Loop Mapping Dongpeng Xu The Pennsylvania State University University Park, USA Email:

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:56:44
22Obstacles to the Adoption of Secure Communication Tools Ruba Abu-Salma M. Angela Sasse

Obstacles to the Adoption of Secure Communication Tools Ruba Abu-Salma M. Angela Sasse

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 16:01:17
23Implementing and Proving the TLS 1.3 Record Layer Antoine Delignat-Lavaud, Cédric Fournet, Markulf Kohlweiss, Jonathan Protzenko, Aseem Rastogi, Nikhil Swamy, Santiago Zanella-Béguelin Microsoft Research {antdl,fournet

Implementing and Proving the TLS 1.3 Record Layer Antoine Delignat-Lavaud, Cédric Fournet, Markulf Kohlweiss, Jonathan Protzenko, Aseem Rastogi, Nikhil Swamy, Santiago Zanella-Béguelin Microsoft Research {antdl,fournet

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:58:36
24This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. IEEE/ACM TRANSACTIONS ON NETWORKING 1  Milking the Cache Cow With Fairness

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. IEEE/ACM TRANSACTIONS ON NETWORKING 1 Milking the Cache Cow With Fairness

Add to Reading List

Source URL: www.eecs.qmul.ac.uk

Language: English - Date: 2017-08-17 05:19:01
    25A Lustrum of Malware Network Communication: Evolution and Insights Chaz Lever† , Platon Kotzias∗ , Davide Balzarotti∓ , Juan Caballero∗ , Manos Antonakakis‡ {chazlever,manos}@gatech.edu, davide.balzarotti@eurec

    A Lustrum of Malware Network Communication: Evolution and Insights Chaz Lever† , Platon Kotzias∗ , Davide Balzarotti∓ , Juan Caballero∗ , Manos Antonakakis‡ {chazlever,manos}@gatech.edu, davide.balzarotti@eurec

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-04-03 15:56:17
    26Poster: Phishing on Facebook Sovantharith Seng Mahdi Nasrullah Al-Ameen  Matthew Wright

    Poster: Phishing on Facebook Sovantharith Seng Mahdi Nasrullah Al-Ameen Matthew Wright

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-14 07:46:24
    27Poster: Dynamic Taint Analysis of Concurrent Program Based on Symbolic Execution Yu Hao∗ , Xiaodong Zhang∗ , Zijiang Yang† and Ting Liu∗ ,IEEEauthorrefmark2 ∗ Ministry  of Education Key Lab for Intelligent Netw

    Poster: Dynamic Taint Analysis of Concurrent Program Based on Symbolic Execution Yu Hao∗ , Xiaodong Zhang∗ , Zijiang Yang† and Ting Liu∗ ,IEEEauthorrefmark2 ∗ Ministry of Education Key Lab for Intelligent Netw

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-04-30 18:44:12
    28The Password Reset MitM Attack Nethanel Gelernter Senia Kalma, Bar Magnezi, Hen Porcilan  Cyberpion, Israel

    The Password Reset MitM Attack Nethanel Gelernter Senia Kalma, Bar Magnezi, Hen Porcilan Cyberpion, Israel

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-04-03 16:02:25
      29Poster: Detecting WebInjects through Live Memory Inspection Nicola Mariani∗ , Andrea Continella∗ , Marcello Pogliani∗ , Michele Carminati∗ , Federico Maggi∗† , and Stefano Zanero∗ ∗ Dipartimento

      Poster: Detecting WebInjects through Live Memory Inspection Nicola Mariani∗ , Andrea Continella∗ , Marcello Pogliani∗ , Michele Carminati∗ , Federico Maggi∗† , and Stefano Zanero∗ ∗ Dipartimento

      Add to Reading List

      Source URL: www.ieee-security.org

      Language: English - Date: 2017-05-02 20:58:16
      30Poster: Design of Backdoor on Android Devices Junsung Cho, Geumhwan Cho, Sangwon Hyun and Hyoungshick Kim Department of Computer Science and Engineering, Sungkyunkwan University, Republic of Korea Email: {js.cho, geumhwa

      Poster: Design of Backdoor on Android Devices Junsung Cho, Geumhwan Cho, Sangwon Hyun and Hyoungshick Kim Department of Computer Science and Engineering, Sungkyunkwan University, Republic of Korea Email: {js.cho, geumhwa

      Add to Reading List

      Source URL: www.ieee-security.org

      Language: English - Date: 2017-05-13 08:11:56