Filter your results
- 5
- 5
- 5
- 1
- 1
- 2
- 1
- 5
- 5
- 2
- 2
- 1
- 3
- 3
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
CASFinder: Detecting Common Attack Surface33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2019, Charleston, SC, United States. pp.338-358, ⟨10.1007/978-3-030-22479-0_18⟩
Conference papers
hal-02384581v1
|
||
|
A Comparison between Two Off-the-Shelf Algebraic Tools for Extraction of Cryptographic Keys from Corrupted Memory Images1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.75-90
Conference papers
hal-01506556v1
|
||
|
On Understanding Permission Usage Contextuality in Android Apps32th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2018, Bergamo, Italy. pp.232-242, ⟨10.1007/978-3-319-95729-6_15⟩
Conference papers
hal-01954415v1
|
||
|
Modeling and Mitigating Security Threats in Network Functions Virtualization (NFV)34th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jun 2020, Regensburg, Germany. pp.3-23, ⟨10.1007/978-3-030-49669-2_1⟩
Conference papers
hal-03243631v1
|
||
|
Modeling and Mitigating the Insider Threat of Remote Administrators in Clouds32th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2018, Bergamo, Italy. pp.3-20, ⟨10.1007/978-3-319-95729-6_1⟩
Conference papers
hal-01954402v1
|