Dan Boneh

Results: 106



#Item
91Input/output / Smartphones / Accelerometers / IOS / ITunes / Fingerprint / Device fingerprint / Acoustic fingerprint / Mobile Web / Computing / IPhone / Technology

Mobile Device Identification via Sensor Fingerprinting Hristo Bojinov Stanford University Dan Boneh

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2014-07-02 06:21:15
92Software quality / Stack buffer overflow / Address space layout randomization / Buffer overflow protection / Return-to-libc attack / Buffer overflow / Stack / Shellcode / FALSE / Computing / Software bugs / Software engineering

Hacking Blind Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazi`eres, Dan Boneh Stanford University Abstract—We show that it is possible to write remote stack buffer overflow exploits without possessing a copy of

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2014-05-19 16:48:47
93Software bugs / C programming language / C++ / Sizeof / Stack / Address space layout randomization / C / Buffer overflow / Computing / Software engineering / Computer programming

Hacking Blind Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazières, Dan Boneh Stanford University Hacking buffer overflows

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2014-05-19 23:54:20
94Internet protocols / Public-key cryptography / Internet standards / Cipher suite / Transport Layer Security / HTTP Secure / Diffie–Hellman key exchange / Elliptic curve Diffie–Hellman / Key size / Cryptography / Cryptographic protocols / Secure communication

An Experimental Study of TLS Forward Secrecy Deployments Lin-Shung Huang∗ , Shrikant Adhikarla† , Dan Boneh‡ , Collin Jackson∗ Mellon University, {linshung.huang, collin.jackson}@sv.cmu.edu † Microsoft, shrikan

Add to Reading List

Source URL: www.linshunghuang.com

Language: English - Date: 2014-04-16 17:21:09
95Cross-platform software / Scripting languages / Software testing / Web applications / Cross-site scripting / OWASP / Vulnerability / Web application security / JavaScript / Software / Computing / Computer network security

Webseclab Security Education Workbench Elie Bursztein, Baptiste Gourdin, Celine Fabry, Jason Bau, Gustav Rydstedt, Hristo Bojinov, Dan Boneh, John C. Mitchell Stanford University elie,bgourdin,jbau,rydstedt,hristo,dabo,m

Add to Reading List

Source URL: bojinov.org

Language: English - Date: 2011-01-05 14:09:03
96Address space layout randomization / Computer file formats / Programming language implementation / Mac OS X / PaX / Return-to-libc attack / Relocation / JIT spraying / Prelink / Software / Computing / System software

Address Space Randomization for Mobile Devices Hristo Bojinov Dan Boneh Rich Cannings

Add to Reading List

Source URL: bojinov.org

Language: English - Date: 2011-03-01 17:48:00
97Ubiquitous computing / Radio-frequency identification / Wireless / Tracking / Security token / Bluetooth low energy / SecurID / Bluetooth / Authentication / Technology / Security / Telecommunications engineering

Mobile Token-Based Authentication on a Budget Hristo Bojinov, Dan Boneh Stanford University {hristo,dabo}@cs.stanford.edu ABSTRACT

Add to Reading List

Source URL: bojinov.org

Language: English - Date: 2011-01-22 12:09:15
98Federated identity / OpenID / Cryptographic protocols / One-time password / Password manager / Password / Phishing / Single sign-on / Authentication / Security / Computer security / Access control

Secure, Consumer-Friendly Web Authentication and Payments with a Phone Ben Dodson, Debangsu Sengupta, Dan Boneh, and Monica S. Lam? Computer Science Department Stanford University Stanford, CA 94305

Add to Reading List

Source URL: mobisocial.stanford.edu

Language: English - Date: 2011-03-29 19:35:16
99Digital signature / X.509 / PKCS / Public key certificate / Revocation list / Online Certificate Status Protocol / Cryptography / Public-key cryptography / RSA

Fine-grained Control of Security Capabilities Dan Boneh Computer Science Department, Stanford University. [removed] and Xuhua Ding Department of Information and Computer Science, University of California, Irvi

Add to Reading List

Source URL: www.mysmu.edu

Language: English - Date: 2005-07-01 12:13:54
100Cryptography / Secure communication / Internet standards / Internet protocols / HTTP / Transport Layer Security / HTTP Secure / Challenge-response authentication / Public-key cryptography / Computing / Internet / Cryptographic protocols

Programming Assignment 3 Winter 2014 CS 255: Intro to Cryptography Prof. Dan Boneh

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2014-03-01 03:17:18
UPDATE