—In the recent past, a number of approaches have been proposed to protect certain types of control data in a program, such as return addresses saved on the stack, rendering most ...
Chao Zhang, Chengyu Song, Kevin Zhijie Chen, Zhaof...
—Return-oriented programming (ROP) has become the dominant form of vulnerability exploitation in both user and kernel space. Many defenses against ROP exploits exist, which can s...
Michalis Athanasakis, Elias Athanasopoulos, Michal...
—A credit network models trust between agents in a distributed environment and enables payments between arbitrary pairs of agents. With their flexible design and robustness agai...
Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei, ...
—Some recent research presented evidence of blocks of IP addresses being stolen by BGP hijackers to launch spam campaigns [35]. This was the first time BGP hijacks were seen in ...
Pierre-Antoine Vervier, Olivier Thonnard, Marc Dac...
—We report on a user study that provides evidence that spaced repetition and a specific mnemonic technique enable users to successfully recall multiple strong passwords over tim...