Title |
Conference |
Tags |
DynaGuard: Armoring Canary-based Protections against Brute-force Attacks |
ACSAC-2015 - los angeles,usa |
|
IntFlow: Improving the Accuracy of Arithmetic Error Detection Using Information Flow Tracking |
ACSAC-2014 - new orleans,usa |
|
Face in the Distorting Mirror: Revisiting Photo-based Social Authentication |
CCS-2014 - Scottsdale,USA |
|
Dynamic Reconstruction of Relocation Information for Stripped Binaries |
Raid-2014 - gottenburg,sweden |
|
From the Aether to the Ethernet—Attacking the Internet using Broadcast Digital Television |
usenix-2014 - san diego,usa |
|
ret2dir: Rethinking Kernel Isolation |
usenix-2014 - san diego,usa |
|
Transparent ROP Exploit Mitigation Using Indirect Branch Tracing |
USENIX-2013 - Washington, D.C. |
|
Exploiting Split Browsers for Efficiently Protecting User Data |
CCSW-2012 - Raleigh,USA |
|
kGuard: Lightweight Kernel Protection against Return-to-User Attacks |
USENIX-2012 - Washington, D.C. |
|
Privacy-Preserving Social Plugins |
USENIX-2012 - Washington, D.C. |
|
Ileak: A Lightweight System For Detecting Inadvertent Information Leaks
|
EC2ND-2010 - Germany |
Security
|
Privacy As An Operating System Service |
1st USENIX Workshop on Hot Topics in Security-2006 - Vancouver, Canada |
Security
|
Diagnosing The Net |
14th USENIX Security Symposium-2005 - Baltimore, USA |
Security
|
Attack Containment |
13th USENIX Security Symposium-2004 - San Diego, USA |
Security
|