default search action
EuroS&P 2016: Saarbrücken, Germany
- IEEE European Symposium on Security and Privacy, EuroS&P 2016, Saarbrücken, Germany, March 21-24, 2016. IEEE 2016, ISBN 978-1-5090-1751-5
- Eyal Ronen, Adi Shamir:
Extended Functionality Attacks on IoT Devices: The Case of Smart Lights. 3-12 - Daniel Schoepe, Musard Balliu, Benjamin C. Pierce, Andrei Sabelfeld:
Explicit Secrecy: A Policy for Taint Tracking. 15-30 - Celina G. Val, Michael A. Enescu, Sam Bayless, William Aiello, Alan J. Hu:
Precisely Measuring Quantitative Information Flow: 10K Lines of Code and Beyond. 31-46 - Stefano Calzavara, Ilya Grishchenko, Matteo Maffei:
HornDroid: Practical and Sound Static Analysis of Android Applications by SMT Solving. 47-62 - Bridger Hahn, Rishab Nithyanand, Phillipa Gill, Rob Johnson:
Games without Frontiers: Investigating Video Games as a Covert Channel. 63-77 - Hugo Krawczyk, Hoeteck Wee:
The OPTLS Protocol and TLS 1.3. 81-96 - Sjouke Mauw, Jorge Toro-Pozo, Rolando Trujillo-Rasua:
A Class of Precomputation-Based Distance-Bounding Protocols. 97-111 - Benjamin Mood, Debayan Gupta, Henry Carter, Kevin R. B. Butler, Patrick Traynor:
Frigate: A Validated, Extensible, and Efficient Compiler and Interpreter for Secure Computation. 112-127 - Pei Wang, Shuai Wang, Jiang Ming, Yufei Jiang, Dinghao Wu:
Translingual Obfuscation. 128-144 - Dominique Devriese, Lars Birkedal, Frank Piessens:
Reasoning about Object Capabilities with Logical Relations and Effect Parametricity. 147-162 - Marco Guarnieri, Srdjan Marinovic, David A. Basin:
Strong and Provably Secure Database Access Control. 163-178 - Xinyang Ge, Nirupama Talele, Mathias Payer, Trent Jaeger:
Fine-Grained Control-Flow Integrity for Kernel Software. 179-194 - Galini Tsoukaneri, George Theodorakopoulos, Hugh Leather, Mahesh K. Marina:
On the Inference of User Paths from Anonymized Mobility Data. 199-213 - Robert Annessi, Martin Schmiedecker:
NavigaTor: Finding Faster Paths to Anonymity. 214-226 - Ralf Küsters, Tomasz Truderung:
Security Analysis of Re-Encryption RPC Mix Nets. 227-242 - Manuel Barbosa, Bernardo Portela, Guillaume Scerri, Bogdan Warinschi:
Foundations of Hardware-Based Attested Computation and Application to SGX. 245-260 - Ashokkumar C., Ravi Prakash Giri, Bernard L. Menezes:
Highly Efficient Algorithms for AES Key Retrieval in Cache Access Attacks. 261-275 - Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk, Jiayu Xu:
Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online). 276-291 - Alex Biryukov, Daniel Dinu, Dmitry Khovratovich:
Argon2: New Generation of Memory-Hard Functions for Password Hashing and Other Applications. 292-302 - Kartik Nayak, Srijan Kumar, Andrew Miller, Elaine Shi:
Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack. 305-320 - Christian Mainka, Vladislav Mladenov, Jörg Schwenk:
Do Not Trust Me: Using Malicious IdPs for Analyzing and Attacking Single Sign-on. 321-336 - Ning Zhang, He Sun, Kun Sun, Wenjing Lou, Yiwei Thomas Hou:
CacheKit: Evading Memory Introspection Using Cache Incoherence. 337-352 - Andreas Gutmann, Karen Renaud, Joseph Maguire, Peter Mayer, Melanie Volkamer, Kanta Matsuura, Jörn Müller-Quade:
ZeTA-Zero-Trust Authentication: Relying on Innate Human Ability, Not Technology. 357-371 - Nicolas Papernot, Patrick D. McDaniel, Somesh Jha, Matt Fredrikson, Z. Berkay Celik, Ananthram Swami:
The Limitations of Deep Learning in Adversarial Settings. 372-387 - Suphannee Sivakorn, Iasonas Polakis, Angelos D. Keromytis:
I am Robot: (Deep) Learning to Break Semantic Image CAPTCHAs. 388-403 - Pawel Szalachowski, Laurent Chuat, Adrian Perrig:
PKI Safety Net (PKISN): Addressing the Too-Big-to-Be-Revoked Problem of the TLS Ecosystem. 407-422 - Sylvain Frey, Yehia Elkhatib, Awais Rashid, Karolina Follis, John Vidler, Nicholas J. P. Race, Christopher Edwards:
It Bends But Would It Break? Topological Analysis of BGP Infrastructures in Europe. 423-438 - Vincent F. Taylor, Riccardo Spolaor, Mauro Conti, Ivan Martinovic:
AppScanner: Automatic Fingerprinting of Smartphone Apps from Encrypted Network Traffic. 439-454 - Tilman Frosch, Christian Mainka, Christoph Bader, Florian Bergsma, Jörg Schwenk, Thorsten Holz:
How Secure is TextSecure? 457-472 - Steve Kremer, Peter B. Rønne:
To Du or Not to Du: A Security Analysis of Du-Vote. 473-486
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.