Mind the Gap: Studying the Insecurity of Provably Secure Embedded Trusted Execution Architectures | 0 | 0.34 | 2022 |
Linear Capabilities For Fully Abstract Compilation Of Separation-Logic-Verified Code | 0 | 0.34 | 2021 |
Aion: Enabling Open Systems through Strong Availability Guarantees for Enclaves | 2 | 0.35 | 2021 |
Secure End-to-End Sensing in Supply Chains | 2 | 0.38 | 2020 |
Provably Secure Isolation for Interruptible Enclaved Execution on Small Microprocessors | 2 | 0.36 | 2020 |
Plundervolt: How a Little Bit of Undervolting Can Create a Lot of Trouble | 0 | 0.34 | 2020 |
Faulty Point Unit - ABI Poisoning Attacks on Intel SGX. | 0 | 0.34 | 2020 |
A categorical approach to secure compilation | 0 | 0.34 | 2020 |
Security across abstraction layers: old and new examples | 0 | 0.34 | 2020 |
A Server-Side JavaScript Security Architecture for Secure Integration of Third-Party Libraries | 1 | 0.35 | 2019 |
Verifying the Security of Enclaved Execution Against Interrupt-based Side-channel Attacks | 0 | 0.34 | 2019 |
Improving Privacy Through Fast Passive Wi-Fi Scanning | 0 | 0.34 | 2019 |
Breaking Virtual Memory Protection and the SGX Ecosystem with Foreshadow. | 3 | 0.38 | 2019 |
Automated Fuzzing of Automotive Control Units | 0 | 0.34 | 2019 |
Symbolic Execution of Security Protocol Implementations: Handling Cryptographic Primitives. | 2 | 0.38 | 2018 |
Scalagna 0.1: towards multi-tier programming with Scala and Scala.js. | 0 | 0.34 | 2018 |
Discovering Logical Vulnerabilities in the Wi-Fi Handshake Using Model-Based Testing. | 2 | 0.39 | 2017 |
Modular, Fully-abstract Compilation by Approximate Back-translation. | 4 | 0.39 | 2017 |
Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2. | 28 | 1.72 | 2017 |
Telling Your Secrets Without Page Faults: Stealthy Page Table-Based Attacks On Enclaved Execution | 20 | 0.57 | 2017 |
Authentic Execution of Distributed Event-Driven Applications with a Small TCB. | 3 | 0.40 | 2017 |
FRP IoT modules as a Scala DSL. | 0 | 0.34 | 2017 |
Developing Secure SGX Enclaves: New Challenges on the Horizon. | 1 | 0.34 | 2016 |
Request And Conquer: Exposing Cross-Origin Resource Size | 5 | 0.42 | 2016 |
Fully-abstract compilation by approximate back-translation. | 8 | 0.43 | 2016 |
Ariadne: A Minimal Approach To State Continuity | 16 | 0.64 | 2016 |
Reasoning about Object Capabilities with Logical Relations and Effect Parametricity. | 10 | 0.57 | 2016 |
On Modular and Fully-Abstract Compilation | 6 | 0.41 | 2016 |
Security Guarantees for the Execution Infrastructure of Software Applications | 1 | 0.35 | 2016 |
On Modular and Fully-Abstract Compilation - Technical Appendix. | 1 | 0.35 | 2016 |
Eliminating dependent pattern matching without K. | 2 | 0.64 | 2016 |
All your biases belong to us: breaking RC4 in WPA-TKIP and TLS | 2 | 0.36 | 2015 |
SecSess: keeping your session tucked away in your browser | 1 | 0.35 | 2015 |
Protected Web Components: Hiding Sensitive Information in the Shadows | 1 | 0.36 | 2015 |
Lightweight and Flexible Trust Assessment Modules for the Internet of Things. | 2 | 0.40 | 2015 |
Fixing non-determinism. | 2 | 0.40 | 2015 |
Secure Resource Sharing for Embedded Protected Module Architectures | 2 | 0.40 | 2015 |
ICE: a passive, high-speed, state-continuity scheme. | 1 | 0.36 | 2014 |
Stateful Declassification Policies for Event-Driven Programs | 15 | 0.53 | 2014 |
Clubbing Seals: Exploring the Ecosystem of Third-party Security Seals | 4 | 0.56 | 2014 |
Monkey-in-the-browser: malware and vulnerabilities in augmented browsing script markets | 8 | 0.50 | 2014 |
Soundsquatting: Uncovering the Use of Homophones in Domain Squatting. | 6 | 0.53 | 2014 |
Secure multi-execution of web scripts: Theory and practice | 8 | 0.43 | 2014 |
On the effectiveness of virtualization-based security. | 0 | 0.34 | 2014 |
Evolution of Security Engineering Artifacts: A State of the Art Survey. | 3 | 0.38 | 2014 |
Stranger danger: exploring the ecosystem of ad-based URL shortening services | 16 | 0.83 | 2014 |
NodeSentry: least-privilege library integration for server-side JavaScript. | 2 | 0.36 | 2014 |
Protected Software Module Architectures. | 8 | 0.51 | 2013 |
Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting | 112 | 4.53 | 2013 |
Information Flow Control for Web Scripts. | 0 | 0.34 | 2013 |