Personensuche
X
?
Computer Security – ESORICS 2023; Lecture Notes in Computer Science ,
1
ResolFuzz: Differential Fuzzing of DNS Resolvers:
, In:
?
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security ,
3
FetchBench: Systematic Identification and Characterization ..:
, In:
?
2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P) ,
4
Anomaly-based Filtering of Application-Layer DDoS Against D..:
, In:
?
Proceedings of the 38th Annual Computer Security Applications Conference ,
7
TyPro: Forward CFI for C-Style Indirect Function Calls Usin..:
, In:
?
Computer Security – ESORICS 2022; Lecture Notes in Computer Science ,
8
Browser-Based CPU Fingerprinting:
, In:
?
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security ,
9
FeIDo : Recoverable FIDO2 Tokens Using Electronic IDs:
, In:
?
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security ,
10
Microarchitectural Leakage Templates and Their Application ..:
, In:
?
Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security ,
11
Cali: Compiler-Assisted Library Isolation:
, In:
?
2021 IEEE European Symposium on Security and Privacy (EuroS&P) ,
12
NoVT: Eliminating C++ Virtual Calls to Mitigate Vtable Hija..:
, In:
?
2021 IEEE European Symposium on Security and Privacy (EuroS&P) ,
13
BGPeek-a-Boo: Active BGP-based Traceback for Amplification ..:
, In:
?
Proceedings of the ACM Internet Measurement Conference ,
14
On the Origin of Scanning : The Impact of Location on In..:
, In:
?
Annual Computer Security Applications Conference ,
15