Zobrazeno 1 - 10
of 79
pro vyhledávání: '"Athanasopoulos, Elias"'
There are around 5.3 billion Internet users, amounting to 65.7% of the global population, and web technology is the backbone of the services delivered via the Internet. To ensure web applications are free from security-related bugs, web developers te
Externí odkaz:
http://arxiv.org/abs/2406.03208
Publikováno v:
In Computers & Security October 2020 97
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Tatar, Andrei, Konoth, Radhesh Krishnan, Giuffrida, Cristiano, Bos, Herbert, Athanasopoulos, Elias, Razavi, Kaveh
Publikováno v:
Proceedings of the 2018 USENIX Annual Technical Conference, USENIX ATC 2018
213 225
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______4485::96f44ead1f49a756753f058cd0373c66
http://gnosis.library.ucy.ac.cy/handle/7/62487
http://gnosis.library.ucy.ac.cy/handle/7/62487
Publikováno v:
International Conference on Embedded Computer Systems: Architectures, Modeling and Simulation
Control-Flow Integrity (CFI) is a popular technique to de- fend against State-of-the-Art exploits, by ensuring that every (indirect) control-flow transfer points to a legitimate address and it is part of the Control-flow Graph (CFG) of a program. Ena
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::07c10c7660d5bb45e81f58fdb8d096c5
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Tatar, Andrei, Konoth, Radhesh Krishnan, Giuffrida, Cristiano, Bos, Herbert, Athanasopoulos, Elias, Razavi, Kaveh
Publikováno v:
Tatar, A, Konoth, R K, Giuffrida, C, Bos, H, Athanasopoulos, E & Razavi, K 2020, Throwhammer : Rowhammer attacks over the network and defenses . in Proceedings of the 2018 USENIX Annual Technical Conference (USENIX ATC 2018) . USENIX Association, pp. 213-225, 2018 USENIX Annual Technical Conference, USENIX ATC 2018, Boston, United States, 11/07/18 . < https://www.usenix.org/system/files/conference/atc18/atc18-tatar.pdf >
Increasingly sophisticated Rowhammer exploits allow an attacker that can execute code on a vulnerable system to escalate privileges and compromise browsers, clouds, and mobile systems. In all these attacks, the common assumption is that attackers fir
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______4612::9df2829869431e48658fa94d3698b6be
https://hdl.handle.net/1871.1/152bbc96-47ff-4fa5-926b-a5c4cca535c6
https://hdl.handle.net/1871.1/152bbc96-47ff-4fa5-926b-a5c4cca535c6
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Tzagarakis, Giannis, Papadopoulos, Panagiotis, Chariton, Antonios A., Athanasopoulos, Elias, Markatos, Evangelos P.
Publikováno v:
Proceedings of the 11th European Workshop on Systems Security
Proceedings of the 11th European Workshop on Systems Security-EuroSec18
Proceedings of the 11th European Workshop on Systems Security -EuroSec'18
EuroSec@EuroSys
Proceedings of the 11th European Workshop on Systems Security-EuroSec18
Proceedings of the 11th European Workshop on Systems Security -EuroSec'18
EuroSec@EuroSys
A plethora of Internet services and applications require user authentication. Although many alternatives have been proposed, and despite the significant advancement in attackers' capabilities to perform password cracking, the most attractive authenti
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::57efb1b6c4d37d30a04dbd0ecb43ddb2
http://gnosis.library.ucy.ac.cy/handle/7/62485
http://gnosis.library.ucy.ac.cy/handle/7/62485