Catálogo de publicaciones - actas de congreso
Annual Computer Security Applications Conference
Resumen/Descripción – provisto por la editorial
No disponible.
Palabras clave – provistas por la editorial
No disponibles.
Disponibilidad
Institución detectada | Año de publicación | Navegá | Descargá | Solicitá |
---|---|---|---|---|
No detectada | 2020 | ACM Digital Library |
Información
Tipo de recurso:
actas de congreso
ISBN impreso
978-1-4503-8858-0
Editor responsable
Association for Computing Machinery (ACM)
País de edición
Estados Unidos
Fecha de publicación
2020-12-07
Información sobre derechos de publicación
Copyright © ACM, Inc.
Cobertura temática
Tabla de contenidos
Set It and Forget It! Turnkey ECC for Instant Integration
Dmitry Belyavsky; Billy Bob Brumley; Jesús-Javier Chi-Domínguez; Luis Rivera-Zamarripa; Igor Ustinov
Pp. No disponible
Practical Over-Threshold Multi-Party Private Set Intersection
Rasoul Akhavan Mahdavi; Thomas Humphries; Bailey Kacsmar; Simeon Krastnikov; Nils Lukas; John A. Premkumar; Masoumeh Shafieinejad; Simon Oya; Florian Kerschbaum; Erik-Oliver Blass
Pp. No disponible
A Flexible Framework for Expediting Bug Finding by Leveraging Past (Mis-)Behavior to Discover New Bugs
Sanjeev Das; Kedrian James; Jan Werner; Manos Antonakakis; Michalis Polychronakis; Fabian Monrose
Pp. No disponible
CDL: Classified Distributed Learning for Detecting Security Attacks in Containerized Applications
Yuhang Lin; Olufogorehan Tunde-Onadele; Xiaohui Gu
Pp. No disponible
Guide Me to Exploit: Assisted ROP Exploit Generation for ActionScript Virtual Machine
Fadi Yilmaz; Meera Sridhar; Wontae Choi
Pp. No disponible
Effect of Security Controls on Patching Window: A Causal Inference based Approach
Aditya Kuppa; Lamine Aouad; Nhien-An Le-Khac
Pp. No disponible
Understanding Promotion-as-a-Service on GitHub
Kun Du; Hao Yang; Yubao Zhang; Haixin Duan; Haining Wang; Shuang Hao; Zhou Li; Min Yang
Pp. No disponible
Policy-based Chameleon Hash for Blockchain Rewriting with Black-box Accountability
Yangguang Tian; Nan Li; Yingjiu Li; Pawel Szalachowski; Jianying Zhou
Pp. No disponible
Probabilistic Naming of Functions in Stripped Binaries
James Patrick-Evans; Lorenzo Cavallaro; Johannes Kinder
Pp. No disponible
Double Patterns: A Usable Solution to Increase the Security of Android Unlock Patterns
Tim Forman; Adam Aviv
Pp. No disponible