Security University

Results: 12075



#Item
1Computing / Software engineering / Computer programming / Object-oriented programming languages / Programming languages / Static program analysis / Software testing / Control flow / Static single assignment form / Call graph / Program analysis / Recursion

2015 IEEE Symposium on Security and Privacy Effective Real-time Android Application Auditing Mingyuan Xia McGill University

Add to Reading List

Source URL: mxia.me

Language: English - Date: 2017-02-08 07:01:32
2

Is Interaction Necessary for Distributed Private Learning? Adam Smith∗ , Abhradeep Thakurta† , Jalaj Upadhyay∗ of Electrical Engineering and Computer Science, Pennsylvania State University, Email: {asmith, jalaj}@p

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:58:45
    3Political science / International relations / Global politics / Conflict / Conflict resolution / Dispute resolution / Family therapy / Reconciliation / Wiegand / Peace and conflict studies / American University School of International Service / Territorial dispute

    DR. KRISTA E. WIEGAND Director, Global Security Program Howard H. Baker Jr. Center for Public Policy University of Tennessee, Knoxville 1640 Cumberland Ave. Knoxville, TN

    Add to Reading List

    Source URL: www.kristawiegand.com

    Language: English - Date: 2018-09-10 12:37:41
    4Computing / Free software / Dark web / Internet / Cryptographic protocols / Internet Standards / Computer network security / Tor / .onion / Botnet / Internet privacy / Bipartite graph

    HOnions: Detection and Identification of Snooping Tor HSDirs Amirali Sanatinia, Guevara Noubir College of Computer and Information Science Northeastern University, Boston, USA {amirali,noubir}@ccs.neu.edu

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-12 23:38:22
    5Computer programming / Computing / Mathematics / Theoretical computer science / Boolean algebra / Error detection and correction / Compiler construction / Hash function / Avalanche effect / Optimizing compiler / Recursion / MD5

    Cryptographic Function Detection in Obfuscated Binaries via Bit-precise Symbolic Loop Mapping Dongpeng Xu The Pennsylvania State University University Park, USA Email:

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-04-03 15:56:44
    6Logic gates / Theoretical computer science / Boolean satisfiability problem / XOR gate / XNOR gate / AND gate / Data Encryption Standard / OR gate / Block cipher / Mathematical optimization / Circuit

    Optimizing S-box Implementations for Several Criteria using SAT Solvers Ko Stoffelen Radboud University, Digital Security, Nijmegen, The Netherlands

    Add to Reading List

    Source URL: ko.stoffelen.nl

    Language: English - Date: 2018-02-09 07:40:06
    7Algebra / Linear algebra / Mathematics / Numerical linear algebra / Matrices / Matrix theory / Multiplication / Gaussian elimination / Matrix multiplication / Pivot element / Invertible matrix / Matrix

    SMITH - A Parallel Hardware Architecture for fast Gaussian Elimination over GF(2) A. Bogdanov, M.C. Mertens, C. Paar, J. Pelzl, A. Rupp Horst G¨ortz Institute for IT Security, Ruhr University Bochum, Germany {bogdanov,m

    Add to Reading List

    Source URL: www.hyperelliptic.org

    Language: English - Date: 2006-03-21 11:51:07
    8Computing / Cyberwarfare / Computer security / Cryptography / Cybercrime / Computer network security / Backdoor / Rootkits / Google Play / Android / Firebase / Password

    Poster: Design of Backdoor on Android Devices Junsung Cho, Geumhwan Cho, Sangwon Hyun and Hyoungshick Kim Department of Computer Science and Engineering, Sungkyunkwan University, Republic of Korea Email: {js.cho, geumhwa

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-13 08:11:56
    9Cryptography / Radio electronics / Block ciphers / KeeLoq / Rolling code / Data Encryption Standard / ICE

    Cryptanalysis of KeeLoq with COPACOBANA Martin Novotný1,2, Timo Kasper1 Horst Görtz Institute for IT-Security Ruhr University Bochum 1

    Add to Reading List

    Source URL: www.hyperelliptic.org

    Language: English - Date: 2009-09-22 19:00:54
    10Computer security / Cybercrime / Cyberwarfare / Computer network security / Security engineering / Computing / National security / Deception technology / Cyberattack / Intrusion detection system / Botnet / Denial-of-service attack

    Poster: A Website Protection Framework Against Targeted Attacks based on Cyber Deception Jianbao Lin*, Chaoge Liu†, Xiang Cui*†‡, Zhaopeng Jia* * Beijing University of Posts and Telecommunications, Beijing, China

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-15 12:53:26
    UPDATE