Items where Division is "Information Security and Cryptography (InfSec)" and Year is 2016

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Item Type | No Grouping
Jump to: A | B | D | E | G | H | K | L | M | N | S | W | Y
Number of items: 45.

A

Acar, Yasemin and Backes, Michael and Bugiel, Sven and Fahl, Sascha and McDaniel, Patrick and Smith, Matthew
(2016) SoK: Lessons Learned From Android Security Research For Appified Software Platforms.
In: 37th IEEE Symposium on Security and Privacy (S&P '16).
Conference: S&P - IEEE Symposium on Security and Privacy

Acar, Yasemin and Backes, Michael and Fahl, Sascha and Kim, Doowon and Mazurek, Michelle and Stransky, Christian
(2016) You Get Where You're Looking For: The Impact Of Information Sources On Code Security.
In: 37th IEEE Symposium on Security and Privacy (S&P '16).
Conference: S&P - IEEE Symposium on Security and Privacy

Awazid, Tahleen Rahman
(2016) Curious Volunteers: Anonymity Impact of adding Tor nodes.
Masters thesis, UNSPECIFIED.

B

Backes, Michael and Berrang, Pascal and Goga, Oana and Gummadi, Krishna P. and Manoharan, Praveen
(2016) On Profile Linkability despite Anonymity in Social Media Systems.
In: Proceedings of the 2016 ACM Workshop on Privacy in the Electronic Society (WPES).
Conference: None | Not Set

Backes, Michael and Berrang, Pascal and Hecksteden, Anne and Humbert, Mathias and Keller, Andreas and Meyer, Tim
(2016) Privacy in Epigenetics: Temporal Linkability of MicroRNA Expression Profiles.
In: Proceedings of the 25th USENIX Security Symposium (USENIX Security '16).
Conference: USENIX-Security - Usenix Security Symposium

Backes, Michael and Berrang, Pascal and Humbert, Mathias and Manoharan, Praveen
(2016) Membership Privacy in MicroRNA-based Studies.
In: Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16).
Conference: CCS - ACM Conference on Computer and Communications Security

Backes, Michael and Berrang, Pascal and Humbert, Mathias and Shen, Xiaoyu and Wolf, Verena
(2016) Simulating the Large-Scale Erosion of Genomic Privacy Over Time.
In: Proceedings of the 3rd International Workshop on Genome Privacy and Security (GenoPri'16).
Conference: None | Not Set

Backes, Michael and Berrang, Pascal and Manoharan, Praveen
(2016) From Zoos to Safaris - From Closed-World Enforcement to Open-World Assessment of Privacy.
In: UNSPECIFIED Springer International Publishing, Cham, pp. 87-138. ISBN 978-3-319-43005-8

Backes, Michael and Bugiel, Sven and Derr, Erik
(2016) Reliable Third-Party Library Detection in Android and its Security Applications.
In: Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16).
Conference: CCS - ACM Conference on Computer and Communications Security

Backes, Michael and Bugiel, Sven and Derr, Erik and Gerling, Sebastian and Hammer, Christian
(2016) R-Droid: Leveraging Android App Analysis with Static Slice Optimization.
In: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security.
Conference: None | Not Set

Backes, Michael and Bugiel, Sven and Derr, Erik and McDaniel, Patrick and Octeau, Damien and Weisgerber, Sebastian
(2016) On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis.
In: Proceedings of the 25th USENIX Security Symposium (USENIX Security '16).
Conference: USENIX-Security - Usenix Security Symposium

Backes, Michael and Bugiel, Sven and Huang, Jie and Schranz, Oliver
(2016) POSTER: The ART of App Compartmentalization.
In: Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16 ).
Conference: CCS - ACM Conference on Computer and Communications Security

Backes, Michael and Bugiel, Sven and Schranz, Oliver and Styp-Rekowsky, Philipp von
(2016) Boxify: Bringing Full-Fledged App Sandboxing to Stock Android.
USENIX ;login:, 41 (2). pp. 16-21.

Backes, Michael and Hammer, Christian and Pfaff, David and Skoruppa, Malte
(2016) Implementation-level Analysis of the JavaScript Helios Voting Client.
In: Proceedings of the 31st Annual ACM Symposium on Applied Computing - SAC 2016.
Conference: None | Not Set

Backes, Michael and Herzberg, Amir and Kate, Aniket and Pryvalov, Ivan
(2016) Anonymous RAM.
In: 21st European Symposium on Research in Computer Security (ESORICS).
Conference: ESORICS - European Symposium On Research In Computer Security

Backes, Michael and Holz, Thorsten and Rossow, Christian and Rytilahti, Teemu and Simeonovski, Milivoj and Stock, Ben
(2016) On the Feasibility of TTL-based Filtering for DRDoS Mitigation.
In: RAID 2016, 19th International Symposium on Research in Attacks, Intrusions and Defenses.
Conference: RAID - International Symposium on Recent Advances in Intrusion Detection

Backes, Michael and Künnemann, Robert and Mohammadi, Esfandiar
(2016) Computational Soundness for Dalvik Bytecode.
In: Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS'16).
Conference: CCS - ACM Conference on Computer and Communications Security

Backes, Michael and Manoharan, Praveen and Grosse, Kathrin and Papernot, Nicolas
(2016) Adversarial Perturbations Against Deep Neural Networks for Malware Classification.
The Computing Research Repository (CoRR), abs/16.

Backes, Michael and Meiser, Sebastian and Schröder, Dominique
(2016) Delegatable Functional Signatures.
In: UNSPECIFIED Springer Berlin Heidelberg, Berlin, Heidelberg, pp. 357-386. ISBN 978-3-662-49384-7

Brengel, Michael and Backes, Michael and Rossow, Christian
(2016) Detecting Hardware-Assisted Virtualization.
In: Detection of Intrusions and Malware, and Vulnerability Assessment: 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings.
Conference: None | Not Set

Bugiel, Sven
(2016) Establishing mandatory access control on Android OS.
Doctoral thesis, UNSPECIFIED.

Bushart, Jonas
(2016) Time-to-Live based Trilateration.
Bachelors thesis, UNSPECIFIED.

D

Dietel, Sebastian
(2016) Towards Native Client Executables via Binary Translation on the x86 Platform.
Bachelors thesis, UNSPECIFIED.

E

Endner-Dühr, Frederic
(2016) Extracting and Modeling Typosquatting Errors from Large-scale Passive DNS Data.
Masters thesis, UNSPECIFIED.

G

Götzfried, Johannes and Müller, Tilo and Drescher, Gabor and Nürnberger, Stefan and Backes, Michael
(2016) RamCrypt: Kernel-based Address Space Encryption for User-mode Processes.
In: ACM SIGSAC Symposium on Information, Computer and Communications Security (ASIACCS).
Conference: None | Not Set

H

Hagestedt, Inken
(2016) Static Analysis of Non-interference for Android Apps.
Masters thesis, UNSPECIFIED.

K

Kremer, Steve and Künnemann, Robert
(2016) Automated analysis of security protocols with global state.
Journal of Computer Security.

Krupp, Johannes and Backes, Michael and Rossow, Christian
(2016) Identifying the Scan and Attack Infrastructures behind Amplification DDoS attacks.
In: Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16).
Conference: CCS - ACM Conference on Computer and Communications Security

L

Lipp, Nils Peter
(2016) Full Reference Monitoring for Android Intents.
Bachelors thesis, UNSPECIFIED.

Lu, Kangjie and Backes, Michael and Nürnberger, Stefan and Lee, Wenke
(2016) How to Make ASLR Win the Clone Wars: Runtime Re-Randomization.
In: Proceedings of the 23rd Annual Symposium on Network and Distributed System Security (NDSS '16).
Conference: NDSS - Network and Distributed System Security Symposium

M

Maisuradze, Giorgi and Backes, Michael and Rossow, Christian
(2016) What Cannot be Read, Cannot be Leveraged? Revisiting Assumptions of JIT-ROP Defenses.
In: Proceedings of the 25th USENIX Security Symposium (USENIX Security '16).
Conference: USENIX-Security - Usenix Security Symposium

Marnau, Ninja
(2016) Anonymisierung, Pseudonymisierung und Transparenz für Big Data. Technische Herausforderungen und Regelung in der Datenschutz-Grundverordnung.
Datenschutz und Datensicherheit (DuD), 05/201.

N

Nürnberger, Stefan and Bugiel, Sven
(2016) Autonome Systeme.
Datenschutz und Datensicherheit, 40 (8). pp. 503-506.

Nürnberger, Stefan and Rossow, Christian
(2016) VatiCAN - Vetted, Authenticated CAN Bus.
In: . Conference on Cryptographic Hardware and Embedded Systems (CHES).
Conference: CHES - Workshop on Cryptographic Hardware and Embedded Systems

S

Salem, Ahmed
(2016) CRRP: A Cryptographic Protocol for Coercion-Resistant Rating Platforms.
Masters thesis, UNSPECIFIED.

Schneider, Jonas and Fleischhacker, Nils and Schröder, Dominique and Backes, Michael
(2016) Efficient Cryptographic Password Hardening Services From Partially Oblivious Commitments.
In: Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16 ).
Conference: CCS - ACM Conference on Computer and Communications Security

Schürmann, Dominik and Busse, Karoline and Smith, Matthew and Fahl, Sascha and Dechand, Sergej and Acar, Yasemin
(2016) An Empirical Study of Textual Key-Fingerprint Representations.
In: Proceedings of the 25th USENIX Security Symposium (USENIX Security '16).
Conference: USENIX-Security - Usenix Security Symposium

Shirazi, Fatemeh and Simeonovski, Milivoj and Asghar, Muhammad Rizwan and Backes, Michael and Díaz, Claudia
(2016) A Survey on Routing in Anonymous Communication Protocols.
The Computing Research Repository (CoRR), abs/16.

Steffensky, Joshua
(2016) Hardening Intel SGX enclaves against memory safety exploits.
Bachelors thesis, UNSPECIFIED.

Stock, Ben and Livshits, Benjamin and Zorn, Benjamin
(2016) Kizzle: A Signature Compiler for Detecting Exploit Kits.
In: The 46th Annual IEEE/IFIP Conference on Dependable Systems and Networks.
Conference: DSN - IEEE/IFIP International Conference on Dependable Systems

Stock, Ben and Pellegrino, Giancarlo and Rossow, Christian and Johns, Martin and Backes, Michael
(2016) Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability Notification.
In: Proceedings of the 25th USENIX Security Symposium (USENIX Security '16).
Conference: USENIX-Security - Usenix Security Symposium

Stock, Ben and Pellegrino, Giancarlo and Rossow, Christian and Johns, Martin and Backes, Michael
(2016) POSTER: Mapping the Landscape of Large-Scale Vulnerability Notifications.
In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016.
Conference: CCS - ACM Conference on Computer and Communications Security

W

Waxweiler, Daniel
(2016) Making Chromium´s Certificate Transparency integration more accessible.
Masters thesis, UNSPECIFIED.

Wedeking, Lukas
(2016) Anonymity Guarantees for Tor Hidden Services.
Bachelors thesis, Saarland University.

Y

Yokoyama, Akira and Ishii, Kou and Tanabe, Rui and Papa, Yinmin and Yoshioka, Katsunari and Matsumoto, Tsutomu and Kasama, Takahiro and Inoue, Daisuke and Brengel, Michael and Backes, Michael and Rossow, Christian
(2016) SandPrint: Fingerprinting Malware Sandboxes to Provide Intelligence for Sandbox Evasion.
In: Research in Attacks, Intrusions, and Defenses - 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedings.
Conference: RAID - International Symposium on Recent Advances in Intrusion Detection

This list was generated on Wed Jan 16 00:02:39 2019 CET.