Security analysis

Results: 6956



#Item
11Cryptography / NIST hash function competition / Cryptographic hash functions / MerkleDamgrd construction / SIMD / CubeHash / Hash function / SHA-3 / Block cipher

Security Analysis of SIMD Charles Bouillaguet, Pierre-Alain Fouque, and Gaëtan Leurent École Normale Supérieure – Département d’Informatique, 45 rue d’Ulm, 75230 Paris Cedex 05, France {Charles.Bouillaguet,Gaet

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:39
12Data management / Computing / Software / Relational database management systems / Cross-platform software / MySQL / Weka / SQL injection / Database server / Database / Application server / Code injection

Poster: Multi-source data analysis for SQL injection detection Kevin Ross, Melody Moh, Teng-Sheng Moh Jason Yao

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-13 00:41:20
13Computing / Software / Cryptography / Transport Layer Security / HTTP Strict Transport Security / HTTP Public Key Pinning / HTTP cookie / Browser security / HTTPS / Public key certificate / Google Chrome / Firefox

Poster: Security Analysis of HSTS Implementation in Browsers Yan Jia1,2, Yuqing Zhang2,1 1 2

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-14 22:48:20
14Cryptocurrencies / Ethereum / Alternative currencies / Blockchains / Numismatics / Economy / Money / Cross-platform software / Initial coin offering / Token / Kin / Draft:Bancor protocol

A Securities Law Framework for Blockchain Tokens To estimate how likely a particular blockchain token is be a security under US federal securities law Refer to: full legal analysis Instructions Step 1: Copy to a new goog

Add to Reading List

Source URL: hacken.io

Language: English - Date: 2017-10-05 12:07:04
15Cryptocurrencies / Ethereum / Alternative currencies / Blockchains / Numismatics / Economy / Money / Cross-platform software / Initial coin offering / Token / Kin / Draft:Bancor protocol

A Securities Law Framework for Blockchain Tokens To estimate how likely a particular blockchain token is be a security under US federal securities law Refer to: full legal analysis Instructions Step 1: Copy to a new goog

Add to Reading List

Source URL: hacken.io

Language: English - Date: 2017-10-12 11:57:44
16Computer access control / Computer security / Identity management / Federated identity / Cloud standards / OAuth / Identity provider / OpenID / Single sign-on / Authentication / Relying party / SAML-based products and services

A Comprehensive Formal Security Analysis of OAuth 2.0 arXiv:1601.01229v3 [cs.CR] 27 MayDaniel Fett

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2018-06-14 12:33:34
17Computer security / Computing / Compiler construction / Computer programming / Software engineering / Return-oriented programming / Control-flow integrity / Code reuse / Control flow graph / Program analysis / Data-flow analysis / Cyberattack

Poster: CRAFTED: Code Reuse Analysis for Trusted and Effective Defense Ethan Johnson Tianqin Zhao John Criswell

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-14 00:24:54
18Software testing / Computer security / Security engineering / Cyberwarfare / Cybercrime / Computer network security / Fuzzing / Software bugs / Application security / Vulnerability / Internet of things / Heartbleed

Poster: IoTcube: An Automated Analysis Platform for Finding Security Vulnerabilities Seulbae Kim, Seunghoon Woo, Heejo Lee, Hakjoo Oh Department of Computer Science and Engineering Korea University Seoul, Korea

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-21 15:07:31
19Computer architecture / Robotics / Computing / Industrial robot / Robot / Humanrobot interaction / Comau / Cobot / VxWorks / Robot software / Mobile robot

An Experimental Security Analysis of an Industrial Robot Controller Davide Quarta∗ , Marcello Pogliani∗ , Mario Polino∗ , Federico Maggi∗† , Andrea Maria Zanchettin∗ , and Stefano Zanero∗ ∗ Dipartimento

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:56:59
20

Formal Expression of BBc-1 Mechanism and Its Security Analysis Jun KURIHARA† and Takeshi KUBO†† † ††

Add to Reading List

Source URL: beyond-blockchain.org

Language: English - Date: 2017-10-30 20:24:43
    UPDATE