Dan Boneh

Results: 106



#Item
31

CESEL: Securing a Mote for 20 Years Kevin Kiningham, Mark Horowitz, Philip Levis, and Dan Boneh Stanford University Abstract

Add to Reading List

Source URL: sing.stanford.edu

Language: English - Date: 2016-01-07 20:28:46
    32

    Hacking Blind Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazi`eres, Dan Boneh Stanford University Abstract—We show that it is possible to write remote stack buffer overflow exploits without possessing a copy of

    Add to Reading List

    Source URL: css.csail.mit.edu

    Language: English - Date: 2016-01-29 11:50:05
      33

      Overshadow: A Virtualization-Based Approach to Retrofitting Protection in Commodity Operating Systems Xiaoxin Chen Tal Garfinkel E. Christopher Lewis Pratap Subrahmanyam Dan Boneh∗

      Add to Reading List

      Source URL: www.elewis.net

      Language: English - Date: 2007-12-20 12:42:01
        34

        Incentive Compatibility of Bitcoin Mining Pool Reward Functions Okke Schrijvers, Joseph Bonneau, Dan Boneh, and Tim Roughgarden Stanford University Abstract. In this paper we introduce a game-theoretic model for reward

        Add to Reading List

        Source URL: fc16.ifca.ai

        Language: English - Date: 2016-02-08 20:23:36
          35

          Exposing Private Information by Timing Web Applications Andrew Bortz Dan Boneh

          Add to Reading List

          Source URL: crypto.stanford.edu

          Language: English - Date: 2010-06-04 16:24:15
            36

            Online Cryptography Course See also: Dan Boneh http://en.wikibooks.org/High_School_Mathematics_Extensions/Discrete_Probability

            Add to Reading List

            Source URL: spark-university.s3.amazonaws.com

            Language: English - Date: 2012-06-08 16:11:29
              37Computing / Software bugs / Software engineering / Blind return oriented programming / Computer errors / Return-oriented programming / Stack buffer overflow / Return-to-libc attack / Address space layout randomization / Buffer overflow / Shellcode / Stack

              Hacking Blind Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazi`eres, Dan Boneh Stanford University Abstract—We show that it is possible to write remote stack buffer overflow exploits without possessing a copy of

              Add to Reading List

              Source URL: www.scs.stanford.edu

              Language: English - Date: 2016-01-02 20:09:14
              38

              Online Cryptography Course See also: Dan Boneh http://en.wikibooks.org/High_School_Mathematics_Extensions/Discrete_Probability

              Add to Reading List

              Source URL: spark-university.s3.amazonaws.com

              Language: English - Date: 2012-06-08 16:11:45
                39

                IoT: Security and Privacy Dan Boneh Stanford University Private discovery via secret handshakes attributes X

                Add to Reading List

                Source URL: iot.stanford.edu

                Language: English - Date: 2015-06-17 22:28:30
                  40

                  A Fully Collusion Resistant Broadcast, Trace, and Revoke System∗ Dan Boneh† Stanford University Brent Waters‡ SRI International

                  Add to Reading List

                  Source URL: eprint.iacr.org

                  Language: English - Date: 2006-08-30 21:26:58
                    UPDATE