Zobrazeno 1 - 10
of 64
pro vyhledávání: '"Hovav Shacham"'
Autor:
Yingchen Wang, Riccardo Paccagnella, Elizabeth Tang He, Hovav Shacham, Christopher W. Fletcher, David Kohlbrenner
Publikováno v:
IEEE Micro. :1-8
Publikováno v:
Proceedings of the ACM on Programming Languages. 4:1-26
System call whitelisting is a powerful sandboxing approach that can significantly reduce the capabilities of an attacker if an application is compromised. Given a policy that specifies which system calls can be invoked with what arguments, a sandboxi
Publikováno v:
PLDI
We present VeRA, a system for verifying the range analysis pass in browser just-in-time (JIT) compilers. Browser developers write range analysis routines in a subset of C++, and verification developers write infrastructure to verify custom analysis p
Autor:
Stephen Checkoway, Nadia Heninger, Hovav Shacham, Eric Rescorla, Matthew Green, Ralf-Philipp Weinmann, Jacob Maskiewicz, Shaanan Cohney, Joshua Fried, Christina Garman
Publikováno v:
Communications of the ACM. 61:148-155
In December 2015, Juniper Networks announced multiple security vulnerabilities stemming from unauthorized code in ScreenOS, the operating system for their NetScreen Virtual Private Network (VPN) routers. The more sophisticated of these vulnerabilitie
Publikováno v:
Proceedings on Privacy Enhancing Technologies, Vol 2016, Iss 4, Pp 403-417 (2016)
In many online communities, it is the norm to redact names and other sensitive text from posted screenshots. Sometimes solid bars are used; sometimes a blur or other image transform is used. We consider the effectiveness of two popular image transfor
Publikováno v:
ASPLOS
Heterogeneous Chip Multiprocessors have been shown to provide significant performance and energy efficiency gains over homogeneous designs. Recent research has expanded the dimensions of heterogeneity to include diverse Instruction Set Architectures,
Autor:
Hovav Shacham
Publikováno v:
Financial Cryptography and Data Security ISBN: 9783662583869
Financial Cryptography
Financial Cryptography
A signature scheme is unique if for every public key and message there is only one signature that is accepted as valid by the verification algorithm. At Crypto 2017, Guo, Chen, Susilo, Lai, Yang, and Mu gave a unique signature scheme whose security p
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8493a94da92046e831164d600c6f0a1a
https://doi.org/10.1007/978-3-662-58387-6_4
https://doi.org/10.1007/978-3-662-58387-6_4
Autor:
Hovav Shacham, Alexandra Boldyreva
The three volume-set, LNCS 10991, LNCS 10992, and LNCS 10993, constitutes the refereed proceedings of the 38th Annual International Cryptology Conference, CRYPTO 2018, held in Santa Barbara, CA, USA, in August 2018. The 79 revised full papers present
Autor:
Jonathan Katz, Hovav Shacham
The three volume-set, LNCS 10401, LNCS 10402, and LNCS 10403, constitutes the refereed proceedings of the 37th Annual International Cryptology Conference, CRYPTO 2017, held in Santa Barbara, CA, USA, in August 2017.The 72 revised full papers presen
Publikováno v:
NDSS