IEEE

Results: 22018



#Item
21Computer programming / Computing / Mathematics / Theoretical computer science / Boolean algebra / Error detection and correction / Compiler construction / Hash function / Avalanche effect / Optimizing compiler / Recursion / MD5

Cryptographic Function Detection in Obfuscated Binaries via Bit-precise Symbolic Loop Mapping Dongpeng Xu The Pennsylvania State University University Park, USA Email:

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:56:44
22Software / Computing / System software / Instant messaging clients / Internet privacy / Cross-platform software / Cryptographic software / Public key infrastructure / Email encryption / IMessage / Secure communication / Threema

Obstacles to the Adoption of Secure Communication Tools Ruba Abu-Salma M. Angela Sasse

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 16:01:17
23Cryptography / Secure communication / Message authentication codes / Transport Layer Security / Cryptographic protocols / Internet Standards / Cipher suite / Authenticated encryption / Poly1305 / Galois/Counter Mode / OpenSSL / Key generation

Implementing and Proving the TLS 1.3 Record Layer Antoine Delignat-Lavaud, Cédric Fournet, Markulf Kohlweiss, Jonathan Protzenko, Aseem Rastogi, Nikhil Swamy, Santiago Zanella-Béguelin Microsoft Research {antdl,fournet

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:58:36
24

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. IEEE/ACM TRANSACTIONS ON NETWORKING 1 Milking the Cache Cow With Fairness

Add to Reading List

Source URL: www.eecs.qmul.ac.uk

Language: English - Date: 2017-08-17 05:19:01
    25Cybercrime / Computer network security / Cyberwarfare / Computing / Spamming / Malware / Domain generation algorithm / Botnet / Web threat / Blacklist

    A Lustrum of Malware Network Communication: Evolution and Insights Chaz Lever† , Platon Kotzias∗ , Davide Balzarotti∓ , Juan Caballero∗ , Manos Antonakakis‡ {chazlever,manos}@gatech.edu, davide.balzarotti@eurec

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-04-03 15:56:17
    26Cybercrime / Computing / Human behavior / Cyberspace / Social engineering / Cyberwarfare / Phishing / Spamming / Social networking service / Facebook / Computer security / Transaction authentication number

    Poster: Phishing on Facebook Sovantharith Seng Mahdi Nasrullah Al-Ameen Matthew Wright

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-14 07:46:24
    27Software engineering / Computer programming / Computing / Object-oriented programming languages / KeY / Symbolic execution / Thread / LLVM / Parallel computing / D / Concolic testing

    Poster: Dynamic Taint Analysis of Concurrent Program Based on Symbolic Execution Yu Hao∗ , Xiaodong Zhang∗ , Zijiang Yang† and Ting Liu∗ ,IEEEauthorrefmark2 ∗ Ministry of Education Key Lab for Intelligent Netw

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-04-30 18:44:12
    28

    The Password Reset MitM Attack Nethanel Gelernter Senia Kalma, Bar Magnezi, Hen Porcilan Cyberpion, Israel

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-04-03 16:02:25
      29Software / Computing / Antivirus software / Security breaches / Proprietary software / Malware / Kaspersky Lab / Google Chrome / Internet Explorer

      Poster: Detecting WebInjects through Live Memory Inspection Nicola Mariani∗ , Andrea Continella∗ , Marcello Pogliani∗ , Michele Carminati∗ , Federico Maggi∗† , and Stefano Zanero∗ ∗ Dipartimento

      Add to Reading List

      Source URL: www.ieee-security.org

      Language: English - Date: 2017-05-02 20:58:16
      30Computing / Cyberwarfare / Computer security / Cryptography / Cybercrime / Computer network security / Backdoor / Rootkits / Google Play / Android / Firebase / Password

      Poster: Design of Backdoor on Android Devices Junsung Cho, Geumhwan Cho, Sangwon Hyun and Hyoungshick Kim Department of Computer Science and Engineering, Sungkyunkwan University, Republic of Korea Email: {js.cho, geumhwa

      Add to Reading List

      Source URL: www.ieee-security.org

      Language: English - Date: 2017-05-13 08:11:56
      UPDATE