Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 149 matches
- 2022
- Quoc Huy Do, Pedram Hosseyni, Ralf Küsters, Guido Schmitz, Nils Wenzler, Tim Würtele:
A Formal Security Analysis of the W3C Web Payment APIs: Attacks and Verification. SP 2022: 215-234 - Ding Wang, Yunkai Zou, Qiying Dong, Yuanming Song, Xinyi Huang:
How to Attack and Generate Honeywords. SP 2022: 966-983 - Fan Wu, Yunhui Long, Ce Zhang, Bo Li:
LINKTELLER: Recovering Private Edges from Graph Neural Networks via Influence Analysis. SP 2022: 2005-2024 - Zhi Li, Weijie Liu, Hongbo Chen, XiaoFeng Wang, Xiaojing Liao, Luyi Xing, Mingming Zha, Hai Jin, Deqing Zou:
Robbery on DevOps: Understanding and Mitigating Illicit Cryptomining on Continuous Integration Service Platforms. SP 2022: 2397-2412 - Lei Zhang, Keke Lian, Haoyu Xiao, Zhibo Zhang, Peng Liu, Yuan Zhang, Min Yang, Haixin Duan:
Exploit the Last Straw That Breaks Android Systems. SP 2022: 2230-2247 - Mustafa Abdallah, Daniel Woods, Parinaz Naghizadeh, Issa Khalil, Timothy N. Cason, Shreyas Sundaram, Saurabh Bagchi:
TASHAROK: Using Mechanism Design for Enhancing Security Resource Allocation in Interdependent Systems. SP 2022: 249-266 - Damiano Abram, Ariel Nof, Claudio Orlandi, Peter Scholl, Omer Shlomovits:
Low-Bandwidth Threshold ECDSA via Pseudorandom Correlation Generators. SP 2022: 2554-2572 - Ayush Agarwal, Sioli O'Connell, Jason Kim, Shaked Yehezkel, Daniel Genkin, Eyal Ronen, Yuval Yarom:
Spook.js: Attacking Chrome Strict Site Isolation via Speculative Execution. SP 2022: 699-715 - Adil Ahmad, Sangho Lee, Marcus Peinado:
HARDLOG: Practical Tamper-Proof System Auditing Using a Novel Audit Device. SP 2022: 1791-1807 - Omer Akgul, Richard Roberts, Moses Namara, Dave Levin, Michelle L. Mazurek:
Investigating Influencer VPN Ads on YouTube. SP 2022: 876-892 - Martin R. Albrecht, Lenka Mareková, Kenneth G. Paterson, Igors Stepanovs:
Four Attacks and a Proof for Telegram. SP 2022: 87-106 - Amit Seal Ami, Nathan Cooper, Kaushal Kafle, Kevin Moran, Denys Poshyvanyk, Adwait Nadkarni:
Why Crypto-detectors Fail: A Systematic Evaluation of Cryptographic Misuse Detection Techniques. SP 2022: 614-631 - Önder Askin, Tim Kutta, Holger Dette:
Statistical Quantification of Differential Privacy: A Local Approach. SP 2022: 402-421 - Eugene Bagdasaryan, Vitaly Shmatikov:
Spinning Language Models: Risks of Propaganda-As-A-Service and Countermeasures. SP 2022: 769-786 - Borja Balle, Giovanni Cherubin, Jamie Hayes:
Reconstructing Training Data with Informed Adversaries. SP 2022: 1138-1156 - Federico Barbero, Feargus Pendlebury, Fabio Pierazzi, Lorenzo Cavallaro:
Transcending TRANSCEND: Revisiting Malware Classification in the Presence of Concept Drift. SP 2022: 805-823 - Suryoday Basak, Mahanth Gowda:
mmSpy: Spying Phone Calls using mmWave Radars. SP 2022: 1211-1228 - Sonia Belaïd, Darius Mercadier, Matthieu Rivain, Abdul Rahman Taleb:
IronMask: Versatile Verification of Masking Security. SP 2022: 142-160 - Bruno Blanchet, Vincent Cheval, Véronique Cortier:
ProVerif with Lemmas, Induction, Fast Subsumption, and Much More. SP 2022: 69-86 - Marton Bognar, Jo Van Bulck, Frank Piessens:
Mind the Gap: Studying the Insecurity of Provably Secure Embedded Trusted Execution Architectures. SP 2022: 1638-1655 - Priyanka Bose, Dipanjan Das, Yanju Chen, Yu Feng, Christopher Kruegel, Giovanni Vigna:
SAILFISH: Vetting Smart Contract State-Inconsistency Bugs in Seconds. SP 2022: 161-178 - Nicholas Boucher, Ilia Shumailov, Ross Anderson, Nicolas Papernot:
Bad Characters: Imperceptible NLP Attacks. SP 2022: 1987-2004 - Chris Brzuska, Eric Cornelissen, Konrad Kohbrok:
Security Analysis of the MLS Key Derivation. SP 2022: 2535-2553 - Giovanni Camurati, Aurélien Francillon:
Noise-SDR: Arbitrary Modulation of Electromagnetic Noise from Unprivileged Software and Its Impact on Emission Security. SP 2022: 1193-1210 - Nicholas Carlini, Steve Chien, Milad Nasr, Shuang Song, Andreas Terzis, Florian Tramèr:
Membership Inference Attacks From First Principles. SP 2022: 1897-1914 - Sunjay Cauligi, Craig Disselkoen, Daniel Moghimi, Gilles Barthe, Deian Stefan:
SoK: Practical Foundations for Software Spectre Defenses. SP 2022: 666-680 - Jialuo Chen, Jingyi Wang, Tinglan Peng, Youcheng Sun, Peng Cheng, Shouling Ji, Xingjun Ma, Bo Li, Dawn Song:
Copy, Right? A Testing Framework for Copyright Protection of Deep Learning Models. SP 2022: 824-841 - Ju Chen, Jinghan Wang, Chengyu Song, Heng Yin:
JIGSAW: Efficient and Scalable Path Constraints Fuzzing. SP 2022: 18-35 - Albert Cheu, Maxim Zhilyaev:
Differentially Private Histograms in the Shuffle Model from Fake Users. SP 2022: 440-457 - Animesh Chhotaray, Thomas Shrimpton:
Hardening Circuit-Design IP Against Reverse-Engineering Attacks. SP 2022: 1672-1689
skipping 119 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-15 04:35 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint