Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Theofilos Petsios"'
Publikováno v:
ACM Transactions on Privacy and Security. 19:1-31
Location-based services have become an integral part of everyday life. To address the privacy issues that emerge from the use and sharing of location information, social networks and smartphone applications have adopted location proximity schemes as
Publikováno v:
CCS
Algorithmic complexity vulnerabilities occur when the worst-case time/space complexity of an application is significantly higher than the respective average case for particular user-controlled inputs. When such conditions are met, an attacker can lau
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c9d604e4ed78acc9a99b059d58b9722b
http://arxiv.org/abs/1708.08437
http://arxiv.org/abs/1708.08437
Publikováno v:
IEEE Symposium on Security and Privacy
Differential testing uses similar programs as cross-referencing oracles to find semantic bugs that do not exhibit explicit erroneous behaviors like crashes or assertion failures. Unfortunately, existing differential testing tools are domain-specific
Autor:
Marios Pomonis, Michalis Polychronakis, Vasileios P. Kemerlis, Theofilos Petsios, Angelos D. Keromytis
Publikováno v:
EuroSys
The abundance of memory corruption and disclosure vulnerabilities in kernel code necessitates the deployment of hardening techniques to prevent privilege escalation attacks. As more strict memory isolation mechanisms between the kernel and user space
Publikováno v:
ACM Conference on Computer and Communications Security
Location proximity schemes have been adopted by social networks and other smartphone apps as a means of balancing user privacy with utility. However, misconceptions about the privacy offered by proximity services have rendered users vulnerable to tri
Autor:
Marios Pomonis, Theofilos Petsios, Michalis Polychronakis, Kangkook Jee, Angelos D. Keromytis
Publikováno v:
ACSAC
Integer overflow and underflow, signedness conversion, and other types of arithmetic errors in C/C++ programs are among the most common software flaws that result in exploitable vulnerabilities. Despite significant advances in automating the detectio