ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
2011 IEEE Symposium on Security and Privacy
Latest Publications
TOTAL DOCUMENTS
46
(FIVE YEARS 0)
H-INDEX
24
(FIVE YEARS 0)
Published By IEEE
9781457701474
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Differential Slicing: Identifying Causal Execution Differences for Security Applications
2011 IEEE Symposium on Security and Privacy
◽
10.1109/sp.2011.41
◽
2011
◽
Cited By ~ 34
Author(s):
Noah M. Johnson
◽
Juan Caballero
◽
Kevin Zhijie Chen
◽
Stephen McCamant
◽
Pongsin Poosankam
◽
...
Keyword(s):
Security Applications
Download Full-text
Program Committee
2011 IEEE Symposium on Security and Privacy
◽
10.1109/sp.2011.7
◽
2011
◽
Keyword(s):
Program Committee
Download Full-text
Symposium Organizers
2011 IEEE Symposium on Security and Privacy
◽
10.1109/sp.2011.6
◽
2011
◽
Cited By ~ 1
Download Full-text
A Formalization of the Security Features of Physical Functions
2011 IEEE Symposium on Security and Privacy
◽
10.1109/sp.2011.10
◽
2011
◽
Cited By ~ 82
Author(s):
Frederik Armknecht
◽
Roel Maes
◽
Ahmad-Reza Sadeghi
◽
François-Xavier Standaert
◽
Christian Wachsmann
Keyword(s):
Physical Functions
Download Full-text
Design and Evaluation of a Real-Time URL Spam Filtering Service
2011 IEEE Symposium on Security and Privacy
◽
10.1109/sp.2011.25
◽
2011
◽
Cited By ~ 194
Author(s):
Kurt Thomas
◽
Chris Grier
◽
Justin Ma
◽
Vern Paxson
◽
Dawn Song
Keyword(s):
Real Time
◽
Spam Filtering
Download Full-text
Defeating UCI: Building Stealthy and Malicious Hardware
2011 IEEE Symposium on Security and Privacy
◽
10.1109/sp.2011.32
◽
2011
◽
Cited By ~ 65
Author(s):
Cynthia Sturton
◽
Matthew Hicks
◽
David Wagner
◽
Samuel T. King
Keyword(s):
Malicious Hardware
Download Full-text
Copyright Page
2011 IEEE Symposium on Security and Privacy
◽
10.1109/sp.2011.3
◽
2011
◽
Download Full-text
Automated Analysis of Security-Critical JavaScript APIs
2011 IEEE Symposium on Security and Privacy
◽
10.1109/sp.2011.39
◽
2011
◽
Cited By ~ 58
Author(s):
Ankur Taly
◽
Úlfar Erlingsson
◽
John C. Mitchell
◽
Mark S. Miller
◽
Jasvir Nagra
Keyword(s):
Automated Analysis
Download Full-text
The Complexity of Intransitive Noninterference
2011 IEEE Symposium on Security and Privacy
◽
10.1109/sp.2011.30
◽
2011
◽
Cited By ~ 7
Author(s):
Sebastian Eggert
◽
Ron van der Meyden
◽
Henning Schnoor
◽
Thomas Wilke
Download Full-text
Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices
2011 IEEE Symposium on Security and Privacy
◽
10.1109/sp.2011.29
◽
2011
◽
Cited By ~ 75
Author(s):
Michael Becher
◽
Felix C. Freiling
◽
Johannes Hoffmann
◽
Thorsten Holz
◽
Sebastian Uellenbeck
◽
...
Keyword(s):
Mobile Devices
◽
Mobile Security
◽
Catching Up
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close