Control flow defenses against ROP either use strict, expensive, but strong protection against redirected RET instructions with shadow stacks, or much faster but weaker protection...
Thurston H. Y. Dang, Petros Maniatis, David Wagner
Syntactic data anonymization strives to (i) ensure that an adversary cannot identify an individual’s record from published attributes with high probability, and (ii) provide hig...
Although studies have shown that at least one in ten Web pages contains a client-side XSS vulnerability, the prevalent causes for this class of Cross-Site Scripting have not been ...
Ben Stock, Stephan Pfistner, Bernd Kaiser, Sebasti...
Moving Target Defenses (MTD) have been touted as a game changing approach to computer security that eliminates the static nature of current computer systems – an attacker’s bi...
Rui Zhuang, Alexandru G. Bardas, Scott A. DeLoach,...
Smartphone app updates are critical to user security and privacy. New versions may fix important security bugs, which is why users should usually update their apps. However, occas...
Yuan Tian, Bin Liu, Weisi Dai, Blase Ur, Patrick T...