561
click to vote
RAID
10 years 4 days ago
2015 Springer
The IPv6 privacy extension introduces temporary addresses to protect against address-based correlation, i. e., the attribution of different transactions to the same origin using ad...
131
click to vote
RAID
10 years 4 days ago
2015 Springer
Abstract. PHP is the most popular scripting language for web applications. Because no native solution to compile or protect PHP scripts exists, PHP applications are usually shipped...
129
click to vote
RAID
10 years 4 days ago
2015 Springer
This paper presents ARGOS, the first system that can automatically uncover the semantics of kernel objects directly from a kernel binary. Based on the principle of data use reveal...
126
click to vote
RAID
10 years 4 days ago
2015 Springer
Cache attacks, which exploit differences in timing to perform covert or side channels, are now well understood. Recent works leverage the last level cache to perform cache attacks...
124
click to vote
RAID
10 years 4 days ago
2015 Springer
Abstract. Software systems are often engineered and tested for functionality under normal rather than worst-case conditions. This makes the systems vulnerable to denial of service ...
|