CROSSING Publications

Additional Attributes

Type

Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit

Hossein Fereidooni, Jiska Classen, Tom Spink, Paul Patras, Markus Miettinen, Ahmad-Reza Sadeghi, Matthias Hollick, Mauro Conti
In: Proceedings of the 20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), September 2017
[Online-Edition: https://arxiv.org/pdf/1706.09165.pdf]
[Inproceedings]

CodeMatch: Obfuscation Won’t Conceal Your Repackaged App

Leonid Glanz, Sven Amann, Michael Eichberg, Michael Reif, Ben Hermann, Johannes Lerch, Mira Mezini
In: ESEC/FSE 2017 Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, p. 638-648, September 2017
ACM New York, NY, USA ©2017
[Online-Edition: esec-fse17.uni-paderborn.de/]
[Inproceedings]

LAZARUS: Practical Side-channel Resilient Kernel-Space Randomization

Orlando Arias, David Gens, Yier Jin, Christopher Liebchen, Ahmad-Reza Sadeghi, Dean Sullivan
In: 20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2017), September 2017
[Inproceedings]

Survey and Systematization of Secure Device Pairing

Mikhail Fomichev, Flor Álvarez, Daniel Steinmetzer, Paul Gardner-Stephen, Matthias Hollick
In: IEEE Communications Surveys & Tutorials, Vol. PP, p. 1-1, September 2017
[Online-Edition: http://ieeexplore.ieee.org/document/8023969/]
[Article]

Using Oblivious RAM in Genomic Studies

Nikolaos Karvelas, Andreas Peter, Stefan Katzenbeisser
In: DPM 2017 - Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2017 International Workshops, September 2017
Springer
[Online-Edition: https://www.ntnu.edu/esorics2017]
[Inproceedings]

AVR Processors as a Platform for Language-Based Security

Florian Dewald, Heiko Mantel, Alexandra Weber
In: ESORICS - Proceedings of the 22nd European Symposium on Research in Computer Security, September 2017
Springer
[Inproceedings]

Software Grand Exposure: SGX Cache Attacks Are Practical

Ferdinand Brasser, Urs Müller, Alexandra Dmitrienko, Kari Kostiainen, Srdjan Capkun, Ahmad-Reza Sadeghi
In: 11th USENIX Workshop on Offensive Technologies, August 2017
[Inproceedings]

TRIDEnT: Trustworthy collaboRative Intrusion DETection (POSTER)

Nikolaos Alexopoulos, Emmanouil Vasilomanolakis, Natalia Reka Ivanko, Tamara Frieß, Max Mühlhäuser
In: USENIX Security Symposium Poster Session, August 2017
[Online-Edition: https://www.usenix.org/conference/usenixsecurity17]
[Misc]

The Day the Cryptography Dies

John Mulholland, Michele Mosca, Johannes Braun
In: IEEE Security & Privacy, Vol. 15, p. 14-21, August 2017
[Article]

Postquantum Cryptography - State of the Art

Johannes Buchmann, Kristin Lauter, Michele Mosca
In: IEEE Security & Privacy, Vol. 15, p. 12-13, August 2017
[Article]
A A A | Drucken Print | Impressum Impressum | Sitemap Sitemap | Kontakt Contact | Website Analysis: More Information
zum Seitenanfangzum Seitenanfang