Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 86 matches
- 2017
- Sangho Lee, Ming-Wei Shih, Prasun Gera, Taesoo Kim, Hyesoon Kim, Marcus Peinado:
Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing. USENIX Security Symposium 2017: 557-574 - Nikolaos Alexopoulos, Aggelos Kiayias, Riivo Talviste, Thomas Zacharias:
MCMix: Anonymous Messaging via Secure Multiparty Computation. USENIX Security Symposium 2017: 1217-1234 - Manos Antonakakis, Tim April, Michael D. Bailey, Matt Bernhard, Elie Bursztein, Jaime Cochran, Zakir Durumeric, J. Alex Halderman, Luca Invernizzi, Michalis Kallitsis, Deepak Kumar, Chaz Lever, Zane Ma, Joshua Mason, Damian Menscher, Chad Seaman, Nick Sullivan, Kurt Thomas, Yi Zhou:
Understanding the Mirai Botnet. USENIX Security Symposium 2017: 1093-1110 - Brendan Avent, Aleksandra Korolova, David Zeber, Torgeir Hovden, Benjamin Livshits:
BLENDER: Enabling Local Search with a Hybrid Differential Privacy Model. USENIX Security Symposium 2017: 747-764 - Xiaolong Bai, Zhe Zhou, XiaoFeng Wang, Zhou Li, Xianghang Mi, Nan Zhang, Tongxin Li, Shi-Min Hu, Kehuan Zhang:
Picking Up My Tab: Understanding and Mitigating Synchronized Token Lifting and Spending in Mobile Payment. USENIX Security Symposium 2017: 593-608 - Sebastian Banescu, Christian S. Collberg, Alexander Pretschner:
Predicting the Resilience of Obfuscated Code Against Symbolic Execution Attacks via Machine Learning. USENIX Security Symposium 2017: 661-678 - Christian Bayens, Tuan Le, Luis Garcia, Raheem A. Beyah, Mehdi Javanmard, Saman A. Zonouz:
See No Evil, Hear No Evil, Feel No Evil, Print No Evil? Malicious Fill Patterns Detection in Additive Manufacturing. USENIX Security Symposium 2017: 1181-1198 - Priyam Biswas, Alessandro Di Federico, Scott A. Carr, Prabhu Rajasekaran, Stijn Volckaert, Yeoul Na, Michael Franz, Mathias Payer:
Venerable Variadic Vulnerabilities Vanquished. USENIX Security Symposium 2017: 186-198 - Tim Blazytko, Moritz Contag, Cornelius Aschermann, Thorsten Holz:
Syntia: Synthesizing the Semantics of Obfuscated Code. USENIX Security Symposium 2017: 643-659 - Barry Bond, Chris Hawblitzel, Manos Kapritsos, K. Rustan M. Leino, Jacob R. Lorch, Bryan Parno, Ashay Rane, Srinath T. V. Setty, Laure Thompson:
Vale: Verifying High-Performance Cryptographic Assembly Code. USENIX Security Symposium 2017: 917-934 - Ferdinand Brasser, Lucas Davi, David Gens, Christopher Liebchen, Ahmad-Reza Sadeghi:
CAn't Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory. USENIX Security Symposium 2017: 117-130 - Jo Van Bulck, Nico Weichbrodt, Rüdiger Kapitza, Frank Piessens, Raoul Strackx:
Telling Your Secrets without Page Faults: Stealthy Page Table-Based Attacks on Enclaved Execution. USENIX Security Symposium 2017: 1041-1056 - Stefano Calzavara, Alvise Rabitti, Michele Bugliesi:
CCSP: Controlled Relaxation of Content Security Policies by Runtime Policy Composition. USENIX Security Symposium 2017: 695-712 - Yue Chen, Yulong Zhang, Zhi Wang, Liangzhao Xia, Chenfu Bao, Tao Wei:
Adaptive Android Kernel Live Patching. USENIX Security Symposium 2017: 1253-1270 - Zheng Leong Chua, Shiqi Shen, Prateek Saxena, Zhenkai Liang:
Neural Nets Can Learn Function Type Signatures From Binaries. USENIX Security Symposium 2017: 99-116 - Taejoong Chung, Roland van Rijswijk-Deij, Balakrishnan Chandrasekaran, David R. Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Christo Wilson:
A Longitudinal, End-to-End View of the DNSSEC Ecosystem. USENIX Security Symposium 2017: 1307-1322 - Thurston H. Y. Dang, Petros Maniatis, David A. Wagner:
Oscar: A Practical Page-Permissions-Based Scheme for Thwarting Dangling Pointers. USENIX Security Symposium 2017: 815-832 - Ren Ding, Chenxiong Qian, Chengyu Song, William Harris, Taesoo Kim, Wenke Lee:
Efficient Protection of Path-Sensitive Control Security. USENIX Security Symposium 2017: 131-148 - Craig Disselkoen, David Kohlbrenner, Leo Porter, Dean M. Tullsen:
Prime+Abort: A Timer-Free High-Precision L3 Cache Attack using Intel TSX. USENIX Security Symposium 2017: 51-67 - Kevin Eykholt, Atul Prakash, Barzan Mozafari:
Ensuring Authorized Updates in Multi-user Database-Backed Applications. USENIX Security Symposium 2017: 1445-1462 - Adrienne Porter Felt, Richard Barnes, April King, Chris Palmer, Chris Bentzel, Parisa Tabriz:
Measuring HTTPS Adoption on the Web. USENIX Security Symposium 2017: 1323-1338 - Cesar Pereida García, Billy Bob Brumley:
Constant-Time Callees with Variable-Time Callers. USENIX Security Symposium 2017: 83-98 - Ioannis Gasparis, Zhiyun Qian, Chengyu Song, Srikanth V. Krishnamurthy:
Detecting Android Root Exploits by Learning from Root Providers. USENIX Security Symposium 2017: 1129-1144 - Nirnimesh Ghose, Loukas Lazos, Ming Li:
HELP: Helper-Enabled In-Band Device Pairing Resistant Against Signal Cancellation. USENIX Security Symposium 2017: 433-450 - Marc Green, Leandro Rodrigues Lima, Andreas Zankl, Gorka Irazoqui, Johann Heyszl, Thomas Eisenbarth:
AutoLock: Why Cache Attacks on ARM Are Harder Than You Think. USENIX Security Symposium 2017: 1075-1091 - Daniel Gruss, Julian Lettner, Felix Schuster, Olga Ohrimenko, István Haller, Manuel Costa:
Strong and Efficient Cache Side-Channel Protection using Hardware Transactional Memory. USENIX Security Symposium 2017: 217-233 - Grant Ho, Aashish Sharma, Mobin Javed, Vern Paxson, David A. Wagner:
Detecting Credential Spearphishing in Enterprise Settings. USENIX Security Symposium 2017: 469-485 - Md Nahid Hossain, Sadegh M. Milajerdi, Junao Wang, Birhanu Eshete, Rigel Gjomemo, R. Sekar, Scott D. Stoller, V. N. Venkatakrishnan:
SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data. USENIX Security Symposium 2017: 487-504 - Zhichao Hua, Jinyu Gu, Yubin Xia, Haibo Chen, Binyu Zang, Haibing Guan:
vTZ: Virtualizing ARM TrustZone. USENIX Security Symposium 2017: 541-556 - Samuel Jero, William Koch, Richard Skowyra, Hamed Okhravi, Cristina Nita-Rotaru, David Bigelow:
Identifier Binding Attacks and Defenses in Software-Defined Networks. USENIX Security Symposium 2017: 415-432
skipping 56 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-09 03:53 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint