EECS

Results: 4734



#Item
11

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. IEEE/ACM TRANSACTIONS ON NETWORKING 1 Milking the Cache Cow With Fairness

Add to Reading List

Source URL: www.eecs.qmul.ac.uk

Language: English - Date: 2017-08-17 05:19:01
    12Cryptography / Cryptographic hash functions / HMAC / MD5 / Crypt / Collision attack / Padding / SHA-2 / MerkleDamgrd construction / SHA-1 / Hash function / Length extension attack

    EECS 388 Intro to Computer Security September 9, 2016 Project 1: Cryptographic Attacks

    Add to Reading List

    Source URL: www.eecs.umich.edu

    Language: English - Date: 2016-11-21 18:50:22
    13

    vSQL: Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases Yupeng Zhang∗ , Daniel Genkin†,∗ , Jonathan Katz∗ , Dimitrios Papadopoulos‡,∗ and Charalampos Papamanthou∗ ∗ University † Univers

    Add to Reading List

    Source URL: web.eecs.umich.edu

    Language: English - Date: 2017-03-20 14:40:46
      14Computing / Programming language implementation / Parallel computing / Debugging / Optimizing compiler / X86 / Computer engineering

      REPT: Reverse Debugging of Failures in Deployed Software Weidong Cui and Xinyang Ge, Microsoft Research Redmond; Baris Kasikci, University of Michigan; Ben Niu, Microsoft Research Redmond; Upamanyu Sharma, University of

      Add to Reading List

      Source URL: web.eecs.umich.edu

      Language: English - Date: 2018-10-23 14:59:27
      15Cryptography / Cyberwarfare / Computer security / Key management / Public key infrastructure / Software bugs / Computer network security / E-commerce / Buffer overflow / HTTP cookie / Cross-site scripting / Certificate authority

      EECS 388 Intro to Computer Security November 11, 2016 Homework 5: Exam Review

      Add to Reading List

      Source URL: www.eecs.umich.edu

      Language: English - Date: 2016-11-21 18:50:22
      16Internet architecture / Computing / Network architecture / Routing / Information and communications technology / Computer networking / Forwarding plane / Router / Packet processing / Packet forwarding / Control plane / Transmission Control Protocol

      Ensuring Connectivity via Data Plane Mechanisms Junda Liu‡ , Aurojit Panda\ , Ankit Singla† , Brighten Godfrey† , Michael Schapira , Scott Shenker\♠ ‡ Google Inc., \ UC Berkeley, † UIUC,  Hebrew U., ♠ ICS

      Add to Reading List

      Source URL: people.eecs.berkeley.edu

      Language: English - Date: 2013-02-21 13:22:56
      17Computer security / Cryptography / Trusted computing / Computer architecture / X86 instructions / Elliptic curve cryptography / Enhanced privacy ID / Software Guard Extensions / Digital signature / Public-key cryptography / Trusted Execution Technology / CPU cache

      CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks

      Add to Reading List

      Source URL: web.eecs.umich.edu

      Language: English - Date: 2018-08-09 16:06:58
      18World Wide Web / Digital media / Computing / Notorious markets / Alphabet Inc. / Video hosting / File sharing / Copyright infringement / Tort law / The Pirate Bay / Google Search / YouTube

      Movie Pirates of the Caribbean: Exploring Illegal Streaming Cyberlockers Damilola Ibosiola† , Benjamin Steer† , Alvaro Garcia-Recuero† , Gianluca Stringhini‡ , Steve Uhlig† and Gareth Tyson† † †

      Add to Reading List

      Source URL: www.eecs.qmul.ac.uk

      Language: English - Date: 2018-08-06 12:40:12
      19Computer network security / Computer security / Cyberwarfare / Middlebox / Computing / Firewall / Network switch / Computer network

      New Directions for Network Verification Aurojit Panda, Katerina Argyraki, Mooly Sagiv, Michael Schapira, Scott Shenker •

      Add to Reading List

      Source URL: people.eecs.berkeley.edu

      Language: English - Date: 2015-06-27 13:25:24
      20Algebra / Vectors / Mathematics / Vector calculus / Linear algebra / Abstract algebra / Euclidean vector / Vector / Position

      Collapsible Contracts: Fixing a Pathology of Gradual Typing

      Add to Reading List

      Source URL: www.eecs.northwestern.edu

      Language: English - Date: 2018-10-19 08:43:24
      UPDATE