-
3
-
-
84870637438
-
-
Golomb Ruler. http://en.wikipedia.org/wiki/Golomb-ruler.
-
-
-
Ruler, G.1
-
11
-
-
84870649047
-
-
sysctl Mac OS X Manual. https://developer.apple.com/library/mac/ #documentation/Darwin/Reference/Manpages/man3/sysctl.3.html#//apple-ref/doc/man/ 3/sysctl.
-
Sysctl Mac OS X Manual
-
-
-
13
-
-
77955197190
-
Side-channel leaks in web applications: A reality today, a challenge tomorrow
-
S. Chen, R. Wang, X. Wang, and K. Zhang. Side-channel Leaks in Web Applications: A Reality Today, a Challenge Tomorrow. In Proc. of IEEE Security and Privacy, 2010.
-
(2010)
Proc. of IEEE Security and Privacy
-
-
Chen, S.1
Wang, R.2
Wang, X.3
Zhang, K.4
-
14
-
-
85066347237
-
Quire: Lightweight provenance for smart phone operating systems
-
M. Dietz, S. Shekhar, Y. Pisetsky, A. Shu, and D. S. Wallach. Quire: Lightweight Provenance for Smart Phone Operating Systems. In Proc. of USENIX Security Symposium, 2011.
-
(2011)
Proc. of USENIX Security Symposium
-
-
Dietz, M.1
Shekhar, S.2
Pisetsky, Y.3
Shu, A.4
Wallach, D.S.5
-
15
-
-
84888331381
-
PiOS: Detecting privacy leaks in iOS applications
-
M. Egele, C. Kruegel, E. Kirda, and G. Vigna. PiOS: Detecting Privacy Leaks in iOS Applications. In NDSS, 2011.
-
(2011)
NDSS
-
-
Egele, M.1
Kruegel, C.2
Kirda, E.3
Vigna, G.4
-
16
-
-
79955570859
-
TaintDroid: An information-ow tracking system for realtime privacy monitoring on smartphones
-
W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. TaintDroid: An Information-ow Tracking System for Realtime Privacy Monitoring on Smartphones. In OSDI, 2010.
-
(2010)
OSDI
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.N.7
-
19
-
-
85046879731
-
Permission re-delegation: Attacks and defenses
-
A. P. Felt, H. J. Wang, A. Moshchuk, S. Hanna, and E. Chin. Permission Re-delegation: Attacks and Defenses. In Proc. of USENIX Security Symposium, 2011.
-
(2011)
Proc. of USENIX Security Symposium
-
-
Felt, A.P.1
Wang, H.J.2
Moshchuk, A.3
Hanna, S.4
Chin, E.5
-
21
-
-
84878716453
-
Characterization and measurement of TCP traversal through NATs and firewalls
-
S. Guha and P. Francis. Characterization and Measurement of TCP Traversal through NATs and Firewalls. In Proc. ACM SIGCOMM IMC, 2005.
-
(2005)
Proc. ACM SIGCOMM IMC
-
-
Guha, S.1
Francis, P.2
-
26
-
-
84878347923
-
Off-Path TCP sequence number inference attack - How firewall middleboxes reduce security
-
Z. Qian and Z. M. Mao. Off-Path TCP Sequence Number Inference Attack - How Firewall Middleboxes Reduce Security. In Proc. of IEEE Security and Privacy, 2012.
-
(2012)
Proc. of IEEE Security and Privacy
-
-
Qian, Z.1
Mao, Z.M.2
-
27
-
-
77955187093
-
Investigation of triangular spamming: A stealthy and efficient spamming technique
-
Z. Qian, Z. M. Mao, Y. Xie, and F. Yu. Investigation of Triangular Spamming: A Stealthy and Efficient Spamming Technique. In Proc. of IEEE Security and Privacy, 2010.
-
(2010)
Proc. of IEEE Security and Privacy
-
-
Qian, Z.1
Mao, Z.M.2
Xie, Y.3
Yu, F.4
-
28
-
-
84857164924
-
Soundcomber: A stealthy and context-aware sound Trojan for smartphones
-
R. Schlegel, K. Zhang, X. yong Zhou, M. Intwala, A. Kapadia, and X. Wang. Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones. In NDSS, 2011.
-
(2011)
NDSS
-
-
Schlegel, R.1
Zhang, K.2
Zhou, X.Y.3
Intwala, M.4
Kapadia, A.5
Wang, X.6
-
30
-
-
84882198584
-
Compromising electromagnetic emanations of wired and wireless keyboards
-
M. Vuagnoux and S. Pasini. Compromising electromagnetic emanations of wired and wireless keyboards. In Proc. of USENIX Security Symposium, 2009.
-
(2009)
Proc. of USENIX Security Symposium
-
-
Vuagnoux, M.1
Pasini, S.2
-
31
-
-
80053141283
-
An untold stody of middleboxes in cellular networks
-
Z. Wang, Z. Qian, Q. Xu, Z. M. Mao, and M. Zhang. An Untold Stody of Middleboxes in Cellular Networks. In SIGCOMM, 2011.
-
(2011)
SIGCOMM
-
-
Wang, Z.1
Qian, Z.2
Xu, Q.3
Mao, Z.M.4
Zhang, M.5
-
32
-
-
58149088319
-
Slipping in the window: TCP reset attacks
-
P. A. Watson. Slipping in the Window: TCP Reset Attacks. In CanSecWest, 2004.
-
(2004)
CanSecWest
-
-
Watson, P.A.1
-
33
-
-
79959957319
-
Peeping tom in the neighborhood: Keystroke eavesdropping on multi-user systems
-
K. Zhang and X. Wang. Peeping Tom in the Neighborhood: Keystroke Eavesdropping on Multi-User Systems. In Proc. of USENIX Security Symposium, 2009.
-
(2009)
Proc. of USENIX Security Symposium
-
-
Zhang, K.1
Wang, X.2
|