Details

Displaying results 1 to 20 out of 9951

 Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7 Page 8 Page 9 Page 10 Next >
DroidSearch: A Powerful Search Engine for Android Applications
Siegfried Rasthofer, Steven Arzt, Max Kolhagen, Brian Pfretzschner, Stephan Huber, Eric Bodden, Philipp Richter
In: 2015 Science and Information Conference (SAI), Juli 2015.

TyTAN: Tiny Trust Anchor for Tiny Devices
Ferdinand Brasser, Patrick Koeberl, Brahim El Mahjoub, Ahmad-Reza Sadeghi, Christian Wachsmann
In: 52nd Design Automation Conference (DAC) 2015, Juni 2015.

HAFIX: Hardware-Assisted Flow Integrity Extension
Orlando Arias, Lucas Davi, Matthias Hanreich, Yier Jin, Patrick Koeberl, Debayan Paul, Ahmad-Reza Sadeghi, Dean Sullivan
In: 52nd Design Automation Conference (DAC), Juni 2015.

Secure Stack Machine: Salable Secure Evaluation of Semi-Private Functions
Ebrahim Songhori, Ahmad-Reza Sadeghi, Farinaz Koushanfar
In: 52nd Design Automation Conference (DAC), Juni 2015.

How to Exchange Security Events? Overview and Evaluation of Formats and Protocols
Jessica Steinberger, Anna Sperotto, Mario Golling, Harald Baier and Aiko Pras
p. 9, Mai 2015.

No PAIN, No Gain? The utility of PArallel fault INjections
Stefan Winter, Oliver Schwahn, Roberto Natella, Neeraj Suri, Domenico Cotroneo
In: International Conference on Software Engineering (ICSE), 2015, Mai 2015.
http://2015.icse-conferences.org/.

TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits
Ebrahim M. Songhori, Siam U. Hussain, Ahmad-Reza Sadeghi, Thomas Schneider, Farinaz Koushanfar
In: 36th IEEE Symposium on Security and Privacy (Oakland), Mai 2015.

Readactor: Practical Code Randomization Resilient to Memory Disclosure
Stephen Crane, Christopher Liebchen, Andrei Homescu, Lucas Davi, Per Larsen, Ahmad-Reza Sadeghi, Stefan Brunthaler, Michael Franz
In: 36th IEEE Symposium on Security and Privacy (Oakland), Mai 2015.

Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications
Felix Schuster, Thomas Tendyck, Christopher Liebchen, Lucas Davi, Ahmad-Reza Sadeghi, Thorsten Holz
In: 36th IEEE Symposium on Security and Privacy (Oakland), Mai 2015.

A Guide to End-to-End Privacy Accountability
Denis Butin, Daniel Le Métayer
In: IEEE: 1st International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity (TELERISE 2015) , Mai 2015.
www.iit.cnr.it/telerise2015/.

Tor Experimentation Tools
Fatemeh Shirazi, Matthias Goehring, Claudia Diaz
In: IEEE: International Workshop on Privacy Engineering – IWPE'15, co-located with 36th IEEE symposium on Security and Privacy, Mai 2015.
ieee-security.org/TC/SPW2015/IWPE/.

Extracting Configuration Knowledge from Build Files with Symbolic Analysis
Shurui Zhou, Jafar Al-Kofahi, Tien N. Nguyen, Christian Kaestner, Sarah Nadi
In: IEEE: 3rd International Workshop on Release Engineering, p. 4, Mai 2015.
releng.polymtl.ca/RELENG2015/html/index.html.

rr

Mai 2015.

Mining Apps for Abnormal Usage of Sensitive Data
Vitalii Avdiienko, Konstantin Kuznetsov, Alessandra Gorla, Andreas Zeller, Steven Arzt, Siegfried Rasthofer, Eric Bodden
In: 2015 International Conference on Software Engineering (ICSE), Mai 2015.

IccTA: Detecting Inter-Component Privacy Leaks in Android Apps
Li Li, Alexandre Bartel, Tegawende F. Bissyande, Jacques Klein, Yves Le Traon, Steven Arzt, Siegfried Rasthofer, Eric Bodden, Damien Octeau, Patrick McDaniel
In: 2015 International Conference on Software Engineering (ICSE), Mai 2015.

Flash Mobs als Innovation. Über eine neue Sozialform technisch vermittelter Versammlung
Paul Gebelein, Martina Löw, Thomas Paul
In: Rammert, Werner (Hrsg.): Innovationsgesellschaft heute, Mai 2015.

Inter­disziplinäre Forschung zwischen Informatik und Soziologie
Paul Gebelein, Thomas Paul, Thorsten Strufe, Wolfgang Effelsberg
In: PIK - Praxis der Informationsverarbeitung und Kommunikation, Mai 2015.

I know where you are: Proofs of Presence resilient to malicious provers
Markus Miettinen, N. Asokan, Farinaz Koushanfar, Thien Duc Nguyen, Jon Rios, Ahmad-Reza Sadeghi, Majid Sobhani, Sudha Yellapantula
In: 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015), April 2015.

XiOS: Extended Application Sandboxing on iOS
Mihai Bucicoiu, Lucas Davi, Razvan Deaconescu, Ahmad-Reza Sadeghi
In: 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015), April 2015.

Authenticated Key Exchange from Ideal Lattices
Jiang Zhang, Zhenfeng Zhang, Jintai Ding, Michael Snook, Özgür Dagdelen
In: EUROCRYPT 2015, April 2015.

 Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7 Page 8 Page 9 Page 10 Next >

[Export this query result to XML]

A A A | Drucken Drucken | Impressum Impressum | Sitemap Sitemap | Suche Suche | Kontakt Kontakt
zum Seitenanfangzum Seitenanfang