Dawn Song

Results: 140



#Item
51

Timing Analysis of Keystrokes and Timing Attacks on SSH Dawn Xiaodong Song David Wagner University of California, Berkeley Xuqing Tian

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:40
    52

    Computer Security Course. Song Dawn Software Security (I):

    Add to Reading List

    Source URL: inst.eecs.berkeley.edu

    Language: English - Date: 2015-02-09 16:40:51
      53

      Computer Security Course. Song Dawn Software Security (II):

      Add to Reading List

      Source URL: inst.eecs.berkeley.edu

      - Date: 2015-02-09 16:40:51
        54Android / Smartphones / Alphabet Inc. / Google Play / Facebook Platform / Signal

        Mining Permission Request Patterns from Android and Facebook Applications (extended author version) Mario Frank, Ben Dong, Adrienne Porter Felt, Dawn Song University of California, Berkeley arXiv:1210.2429v1 [cs.CR] 8 O

        Add to Reading List

        Source URL: www.cs.berkeley.edu

        Language: English - Date: 2013-03-07 17:48:53
        55

        *Benediction *Benediction Song On Eagle’s Wings And God will raise you up on eagle’s wings, bear you on the breath of dawn, make you to shine like the sun, and hold you in the palm of His hand. *Postlude

        Add to Reading List

        Source URL: www.fumctallassee.com

        Language: English
          56Software bugs / Pointer / X86 memory segmentation / C / X86 / Memory safety / 64-bit / Ring / Computing / Computer architecture / Software engineering

          Poster: Getting The Point(er): On the Feasibility of Attacks on Code-Pointer Integrity Volodymyr Kuznetsov∗ , L´aszl´o Szekeres† , Mathias Payer‡ , George Candea∗ , and Dawn Song§ ∗ Ecole ´

          Add to Reading List

          Source URL: www.ieee-security.org

          Language: English - Date: 2015-05-11 16:42:34
          57Computer network security / Internet / Botnets / Email / Email spam / Storm botnet / Mega-D botnet / McColo / Spam / Computing / Spamming / Multi-agent systems

          Insights from the Inside: A View of Botnet Management from Infiltration Chia Yuan Cho§ , Juan Caballero†§ , Chris Grier§ , Vern Paxson‡§ , and Dawn Song§ § UC Berkeley † Carnegie Mellon University ‡ ICSI

          Add to Reading List

          Source URL: security.cs.berkeley.edu

          Language: English - Date: 2011-03-08 19:40:30
          58Data types / Software bugs / Primitive types / Pointer / Subroutines / Memory management / Memory safety / Cyclone / C / Software engineering / Computing / Computer programming

          Code-Pointer Integrity Volodymyr Kuznetsov∗ , L´aszl´o Szekeres‡ , Mathias Payer†,§ George Candea∗ , R. Sekar‡ , Dawn Song† ∗ Ecole ´ † UC

          Add to Reading List

          Source URL: dslab.epfl.ch

          Language: English - Date: 2015-07-16 16:17:00
          59

          2013 IEEE Symposium on Security and Privacy SoK: Eternal War in Memory L´aszl´o Szekeres† , Mathias Payer‡ , Tao Wei∗‡ , Dawn Song‡ † Stony Brook University ‡ University of California, Berkeley

          Add to Reading List

          Source URL: ieee-security.org

          Language: English - Date: 2013-04-05 19:52:16
            60

            Context-centric Security Mohit Tiwari Prashanth Mohan Andrew Osheroff Hilfi Alkaff Elaine Shi1 Eric Love Dawn Song University of California, Berkeley University of Maryland, College Park1

            Add to Reading List

            Source URL: www.dhosa.org

            Language: English - Date: 2012-08-23 02:44:37
              UPDATE