Sciweavers

500
Voted
RAID
2015
Springer
9 years 8 months ago
Privacy is Not an Option: Attacking the IPv6 Privacy Extension
The IPv6 privacy extension introduces temporary addresses to protect against address-based correlation, i. e., the attribution of different transactions to the same origin using ad...
Johanna Ullrich, Edgar R. Weippl
RAID
2015
Springer
9 years 8 months ago
Security Analysis of PHP Bytecode Protection Mechanisms
Abstract. PHP is the most popular scripting language for web applications. Because no native solution to compile or protect PHP scripts exists, PHP applications are usually shipped...
Dario Weißer, Johannes Dahse, Thorsten Holz
RAID
2015
Springer
9 years 8 months ago
Reverse Engineering Intel Last-Level Cache Complex Addressing Using Performance Counters
Cache attacks, which exploit differences in timing to perform covert or side channels, are now well understood. Recent works leverage the last level cache to perform cache attacks...
Clémentine Maurice, Nicolas Le Scouarnec, C...
RAID
2015
Springer
9 years 8 months ago
Demystifying the IP Blackspace
A small part of the IPv4 address space has still not been assigned for use to any organization. However, some of this IP space is announced through BGP, and is, therefore, globally...
Quentin Jacquemart, Pierre-Antoine Vervier, Guilla...
RAID
2015
Springer
9 years 8 months ago
Towards Automatic Inference of Kernel Object Semantics from Binary Code
This paper presents ARGOS, the first system that can automatically uncover the semantics of kernel objects directly from a kernel binary. Based on the principle of data use reveal...
Junyuan Zeng, Zhiqiang Lin
Computer Networks
Top of PageReset Settings