ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Proceedings 2015 Network and Distributed System Security Symposium
Latest Publications
TOTAL DOCUMENTS
50
(FIVE YEARS 0)
H-INDEX
27
(FIVE YEARS 0)
Published By Internet Society
189156238x
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge
Proceedings 2015 Network and Distributed System Security Symposium
◽
10.14722/ndss.2015.23096
◽
2015
◽
Cited By ~ 35
Author(s):
Shouling Ji
◽
Weiqing Li
◽
Neil Zhenqiang Gong
◽
Prateek Mittal
◽
Raheem Beyah
Keyword(s):
Social Network
◽
Large Scale
◽
Scale Evaluation
Download Full-text
Thwarting Cache Side-Channel Attacks Through Dynamic Software Diversity
Proceedings 2015 Network and Distributed System Security Symposium
◽
10.14722/ndss.2015.23264
◽
2015
◽
Cited By ~ 58
Author(s):
Stephen Crane
◽
Andrei Homescu
◽
Stefan Brunthaler
◽
Per Larsen
◽
Michael Franz
Keyword(s):
Side Channel
◽
Side Channel Attacks
◽
Software Diversity
◽
Dynamic Software
Download Full-text
Knock Yourself Out: Secure Authentication with Short Re-Usable Passwords
Proceedings 2015 Network and Distributed System Security Symposium
◽
10.14722/ndss.2015.23261
◽
2015
◽
Cited By ~ 1
Author(s):
Benjamin Guldenring
◽
Volker Roth
◽
Lars Ries
Keyword(s):
Secure Authentication
Download Full-text
P2C: Understanding Output Data Files via On-the-Fly Transformation from Producer to Consumer Executions
Proceedings 2015 Network and Distributed System Security Symposium
◽
10.14722/ndss.2015.23318
◽
2015
◽
Author(s):
Yonghwi Kwon
◽
Fei Peng
◽
Dohyeong Kim
◽
Kyungtae Kim
◽
Xiangyu Zhang
◽
...
Keyword(s):
Output Data
◽
Data Files
Download Full-text
Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming
Proceedings 2015 Network and Distributed System Security Symposium
◽
10.14722/ndss.2015.23262
◽
2015
◽
Cited By ~ 71
Author(s):
Lucas Davi
◽
Christopher Liebchen
◽
Ahmad-Reza Sadeghi
◽
Kevin Z. Snow
◽
Fabian Monrose
Keyword(s):
Just In Time
◽
Return Oriented Programming
Download Full-text
Run-time Monitoring and Formal Analysis of Information Flows in Chromium
Proceedings 2015 Network and Distributed System Security Symposium
◽
10.14722/ndss.2015.23295
◽
2015
◽
Cited By ~ 21
Author(s):
Lujo Bauer
◽
Shaoying Cai
◽
Limin Jia
◽
Timothy Passaro
◽
Michael Stroucken
◽
...
Keyword(s):
Formal Analysis
◽
Information Flows
◽
Run Time
Download Full-text
Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures
Proceedings 2015 Network and Distributed System Security Symposium
◽
10.14722/ndss.2015.23283
◽
2015
◽
Cited By ~ 157
Author(s):
Sungmin Hong
◽
Lei Xu
◽
Haopei Wang
◽
Guofei Gu
Keyword(s):
Software Defined Networks
Download Full-text
Principled Sampling for Anomaly Detection
Proceedings 2015 Network and Distributed System Security Symposium
◽
10.14722/ndss.2015.23268
◽
2015
◽
Cited By ~ 11
Author(s):
Brendan Juba
◽
Christopher Musco
◽
Fan Long
◽
Stelios Sidiroglou-Douskos
◽
Martin Rinard
Keyword(s):
Anomaly Detection
Download Full-text
The Devil is in the Constants: Bypassing Defenses in Browser JIT Engines
Proceedings 2015 Network and Distributed System Security Symposium
◽
10.14722/ndss.2015.23209
◽
2015
◽
Cited By ~ 15
Author(s):
Michalis Athanasakis
◽
Elias Athanasopoulos
◽
Michalis Polychronakis
◽
Georgios Portokalidis
◽
Sotiris Ioannidis
Keyword(s):
The Devil
Download Full-text
EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework
Proceedings 2015 Network and Distributed System Security Symposium
◽
10.14722/ndss.2015.23140
◽
2015
◽
Cited By ~ 75
Author(s):
Yinzhi Cao
◽
Yanick Fratantonio
◽
Antonio Bianchi
◽
Manuel Egele
◽
Christopher Kruegel
◽
...
Keyword(s):
Control Flow
◽
Flow Transitions
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close