-
2
-
-
85076889619
-
TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, L. Jung, P. McDaniel et al., "TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones," in 9th OSDI, USENIX, 2010.
-
(2010)
9th OSDI, USENIX
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.P.4
Jung, L.5
McDaniel, P.6
-
3
-
-
77955201139
-
Experimental security analysis of a modern automobile
-
IEEE
-
K. Koscher, A. Czeskis, F. Roesner, S. Patel, T. Kohno, S. Checkoway et al., "Experimental security analysis of a modern automobile," in 31st Security and Privacy, IEEE, 2010.
-
(2010)
In 31st Security and Privacy
-
-
Koscher, K.1
Czeskis, A.2
Roesner, F.3
Patel, S.4
Kohno, T.5
Checkoway, S.6
-
4
-
-
85061034567
-
Comprehensive experimental analyses of automotive attack surfaces
-
S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, S. Savage et al., "Comprehensive experimental analyses of automotive attack surfaces," in 20th USENIX conference on Security, 2011.
-
20th USENIX Conference on Security, 2011
-
-
Checkoway, S.1
McCoy, D.2
Kantor, B.3
Anderson, D.4
Shacham, H.5
Savage, S.6
-
7
-
-
85040565418
-
Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study
-
I. Rouf, R. Miller, H. Mustafa, T. Taylor, S. Oh, W. Xu et al., "Security and privacy vulnerabilities of in-car wireless networks: a tire pressure monitoring system case study," in 19th USENIX Security, 2010.
-
(2010)
19th USENIX Security
-
-
Rouf, I.1
Miller, R.2
Mustafa, H.3
Taylor, T.4
Oh, S.5
Xu, W.6
-
8
-
-
31944440969
-
Pin: Building customized program analysis tools with dynamic instrumentation
-
C. Luk, R. Cohn, R. Muth, H. Patil, and A. Klauser, "Pin: building customized program analysis tools with dynamic instrumentation," ACM SIGPLAN, 2005.
-
(2005)
ACM SIGPLAN
-
-
Luk, C.1
Cohn, R.2
Muth, R.3
Patil, H.4
Klauser, A.5
-
9
-
-
34548212308
-
Dytan: A generic dynamic taint analysis framework
-
J. Clause, W. Li, and A. Orso, "Dytan: a generic dynamic taint analysis framework," in ISSTA, 2007, pp. 196-206.
-
(2007)
ISSTA
, pp. 196-206
-
-
Clause, J.1
Li, W.2
Orso, A.3
-
10
-
-
84878497056
-
Libdft: Practical Dynamic Data Flow Tracking for Commodity Systems
-
V. P. Kermelis, G. Portokalidis, K. Jee, and A. D. Keromytis, "libdft: Practical Dynamic Data Flow Tracking for Commodity Systems," in VEE'12, SIGPLAN/SIGOPS, 2012.
-
(2012)
VEE'12, SIGPLAN/SIGOPS
-
-
Kermelis, V.P.1
Portokalidis, G.2
Jee, K.3
Keromytis, A.D.4
-
11
-
-
79959881045
-
TaintEraser: Protecting sensitive data leaks using application-level taint tracking
-
D. Zhu, J. Jung, D. Song, and T. Kohno, "TaintEraser: protecting sensitive data leaks using application-level taint tracking," ACM SIGOPS Operating Systems Review, 2011.
-
(2011)
ACM SIGOPS Operating Systems Review
-
-
Zhu, D.1
Jung, J.2
Song, D.3
Kohno, T.4
-
12
-
-
0006100649
-
Smashing the stack for fun and profit
-
Aleph One
-
E. Levy (Aleph One), "Smashing the stack for fun and profit," The Phrack Magazine, vol. 49, no. 14, 1996.
-
(1996)
The Phrack Magazine
, vol.49
, Issue.14
-
-
Levy, E.1
-
14
-
-
14844328033
-
On the effectiveness of address-space randomization
-
H. Shacham, M. Page, B. Pfaff, and E. Goh, "On the effectiveness of address-space randomization," in 11th CCS, 2004.
-
11th CCS, 2004
-
-
Shacham, H.1
Page, M.2
Pfaff, B.3
Goh, E.4
-
15
-
-
84867327217
-
Car2X communication: Securing the last meter - A cost-effective approach for ensuring trust in Car2X applications using in-vehicle symmetric cryptography
-
September
-
H. Schweppe, Y. Roudier, B. Weyl, L. Apvrille, and D. Scheuermann, "Car2X communication: securing the last meter - A cost-effective approach for ensuring trust in Car2X applications using in-vehicle symmetric cryptography" in WIVEC 2011, September 2011.
-
(2011)
WIVEC 2011
-
-
Schweppe, H.1
Roudier, Y.2
Weyl, B.3
Apvrille, L.4
Scheuermann, D.5
-
16
-
-
79953236789
-
-
EVITA Project, Tech. Rep. D3.2
-
B. Weyl, M. Wolf, F. Zweers, T. Gendrullis, M. S. Idrees, Y. Roudier et al. "Secure on-board architecture specification," EVITA Project, Tech. Rep. D3.2, 2010.
-
(2010)
Secure On-board Architecture Specification
-
-
Weyl, B.1
Wolf, M.2
Zweers, F.3
Gendrullis, T.4
Idrees, M.S.5
Roudier, Y.6
-
17
-
-
79953252420
-
-
EVITA Project, Tech. Rep. D3.3
-
H. Schweppe, S. Idrees, Y. Roudier, B. Weyl, R. El Khayari, O. Henniger et al., "Secure on-board protocols specification," EVITA Project, Tech. Rep. D3.3, 2010.
-
(2010)
Secure On-board Protocols Specification
-
-
Schweppe, H.1
Idrees, S.2
Roudier, Y.3
Weyl, B.4
El Khayari, R.5
Henniger, O.6
-
18
-
-
84867307138
-
-
August
-
"The EVITA project," http://evita-project.org/, August 2008.
-
(2008)
-
-
-
20
-
-
78751484536
-
G-free: Defeating return-oriented programming through gadget-less binaries
-
K. Onarlioglu, L. Bilge, A. Lanzi, D. Balzarotti, and E. Kirda, "G-free: Defeating return-oriented programming through gadget-less binaries," in 26th ACSAC, 12 2010.
-
(2010)
26th ACSAC
, pp. 12
-
-
Onarlioglu, K.1
Bilge, L.2
Lanzi, A.3
Balzarotti, D.4
Kirda, E.5
-
21
-
-
80455127247
-
Taint-exchange: A generic system for cross-process and cross-host taint tracking
-
A. Zavou, G. Portokalidis, and A. Keromytis, "Taint-exchange: a generic system for cross-process and cross-host taint tracking," 6th ACS, 2011.
-
(2011)
6th ACS
-
-
Zavou, A.1
Portokalidis, G.2
Keromytis, A.3
-
22
-
-
78751468715
-
Information Flow for Secure Distributed Applications
-
PhD Thesis
-
W. W.-Y. Cheng, "Information Flow for Secure Distributed Applications," PhD Thesis, MIT, 2009.
-
(2009)
MIT
-
-
Cheng, W.W.-Y.1
-
23
-
-
84927745017
-
Towards Practical Avoidance of Information Leakage in Enterprise Networks
-
J. Croft and M. Caesar, "Towards Practical Avoidance of Information Leakage in Enterprise Networks," in 6th USENIX HotSec, 2011.
-
(2011)
6th USENIX HotSec
-
-
Croft, J.1
Caesar, M.2
-
24
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
J. Newsome and D. X. Song, "Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software," in NDSS, 2005.
-
(2005)
NDSS
-
-
Newsome, J.1
Song, D.X.2
-
25
-
-
77950788046
-
Panorama: Capturing system-wide information flow for malware detection and analysis
-
H. Yin, D. Song, M. Egele, C. Kruegel, and E. Kirda, "Panorama: capturing system-wide information flow for malware detection and analysis," in 14th CCS, 2007, pp. 116-127.
-
(2007)
14th CCS
, pp. 116-127
-
-
Yin, H.1
Song, D.2
Egele, M.3
Kruegel, C.4
Kirda, E.5
-
26
-
-
57449105235
-
Secure vehicular communication systems: Design and architecture
-
P. Papadimitratos, L. Buttyan, T. Holczer, E. Schoch, J. Freudiger, M. Raya et al. "Secure vehicular communication systems: design and architecture," IEEE Communications Magazine, vol. 46, no. 11, pp. 100-109, 2008.
-
(2008)
IEEE Communications Magazine
, vol.46
, Issue.11
, pp. 100-109
-
-
Papadimitratos, P.1
Buttyan, L.2
Holczer, T.3
Schoch, E.4
Freudiger, J.5
Raya, M.6
|