Stealthy Backdoors as Compression Artifacts | 0 | 0.34 | 2022 |
A Pragmatic Introduction to Secure Multi-Party Computation | 4 | 0.44 | 2018 |
Protecting private web content from embedded scripts | 9 | 0.70 | 2011 |
Measuring Security | 6 | 0.57 | 2011 |
Automated black-box detection of side-channel vulnerabilities in web applications | 30 | 1.19 | 2011 |
Privacy-preserving applications on smartphones | 30 | 0.87 | 2011 |
Guest Editors' Introduction: The Science of Security | 8 | 0.66 | 2011 |
GuardRails: a data-centric web application security framework | 11 | 0.51 | 2011 |
Reverse-engineering a cryptographic RFID tag | 100 | 9.46 | 2008 |
Hiding In Groups: On The Expressiveness Of Privacy Distributions | 2 | 0.39 | 2008 |
Talking to strangers without taking their candy: isolating proxied content | 14 | 1.35 | 2008 |
The user is not the enemy: fighting malware by tracking user intentions | 8 | 0.68 | 2008 |
Secure and practical defense against code-injection attacks using software dynamic translation | 42 | 1.58 | 2006 |
Perracotta: mining temporal API rules from imperfect traces | 212 | 9.00 | 2006 |
Quantifying information leakage in tree-based hash protocols (short paper) | 16 | 0.91 | 2006 |
N-variant systems: a secretless framework for security through diversity | 123 | 3.88 | 2006 |
Inculcating invariants in introductory courses | 2 | 0.52 | 2006 |
Automatically Hardening Web Applications Using Precise Tainting | 187 | 15.19 | 2005 |
Where's the FEEB? the effectiveness of instruction set randomization | 74 | 6.07 | 2005 |
Toasters, Seat Belts, and Inferring Program Properties | 0 | 0.34 | 2005 |
Second International Workshop on Dynamic Analysis (WODA 2004) | 0 | 0.34 | 2004 |
ICSE 2004 workshop summary second international workshop on dynamic analysis (WODA 2004) | 20 | 0.49 | 2004 |
.NET Security: Lessons Learned and Missed from Java | 4 | 0.53 | 2004 |
Automatically Inferring Temporal Properties for Program Evolution | 22 | 1.56 | 2004 |
Election Security: Perception and Reality | 16 | 1.03 | 2004 |
Pancakes, puzzles, and polynomials: cracking the Cracker Barrel | 0 | 0.34 | 2004 |
Secure aggregation for wireless networks | 178 | 10.58 | 2003 |
A biological programming model for self-healing | 21 | 0.94 | 2003 |
A biologically inspired programming model for self-healing systems | 21 | 1.03 | 2002 |
Improving security using extensible lightweight static analysis | 214 | 13.67 | 2002 |