Howard: A Dynamic Excavator for Reverse Engineering Data Structures
2023-12-27 13:18:12 Author: www.ndss-symposium.org(查看原文) 阅读量:7 收藏

Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones

Roman Schlegel, Kehuan Zhang, Xiayong Zhou, Mehool Intwala, Apu Kapadia and Xiaofeng Wang

Read More

A Security API for Distributed Social Networks

Michael Backes , Matteo Maffei and Kim Pecina

Read More

Location Privacy via Private Proximity Testing

Arvind Narayanan , Narendran Thiagarajan, Mugdha Lakhani, Mike Hamburg and Dan Boneh

Read More

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars

Aurelien Francillon , Boris Danev and Srdjan Capkun

Read More

Using Classification to Protect the Integrity of Spectrum Measurements in White Space Networks

Omid Fatemieh , Ali Farhadi, Ranyeer Chandra and Carl A. Gunter

Read More

Good Neighbor: Ad hoc Pairing of Nearby Wireless Devices by Multiple Antennas

Liang Cai, Kai Zeng, Hao Chen and Prasant Mohapatra

Read More

Practical Protection of Kernel Integrity for Commodity OS from Untrusted Extensions

Xi Xiong , Donghai Tian and Peng Liu

Read More

Efficient Monitoring of Untrusted Kernel-Mode Execution

Abhinav Srivastava and Jonathon Giffin

Read More

SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures

Zhiqiang Lin , Junghwan Rhee, Xiangyu Zhang, Dongyan Xu and Xuxian Jiang

Read More

Losing Control of the Internet: Using the Data Plane to Attack the Control Plane

Max Schuchard , Abedelaziz Mohaisen, Denis Foo Kune, Nicholas Hopper, Yongdae Kim and Eugene Y. Vasserman

Read More

EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis

Leyla Bilge , Engin Kirda, Christopher Kruegel and Marco Balduzzi

Read More

Howard: A Dynamic Excavator for Reverse Engineering Data Structures

Asia Slowinska , Traian Stancescu and Herbert Bos

Read More

No Loitering: Exploiting Lingering Vulnerabilities in Default COM Objects

David Dewey and Patrick Traynor

Read More

TIE: Principled Reverse Engineering of Types in Binary Programs

JongHyup Lee, Thanassis Avgerinos and David Brumley

Read More

DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation

Min Gyung Kang, Stephen McCamant, Pongsin Poosankam and Dawn Song

AEG: Automatic Exploit Generation

Thanassis Avgerinos , Brent Lim Tze Hao and David Brumley

Read More

Automated Discovery of Parameter Pollution Vulnerabilities in Web Applications

Marco Balduzzi , Carmen Torrano Gimenez, Davide Balzarotti and Engin Kirda

Read More

WebShield: Enabling Various Web Defense Techniques without Client Side Modifications

Zhichun Li , Yi Tang, Yinzhi Cao, Vaibhav Rastogi, Yan Chen, Bin Liu and Clint Sbisa

Read More

HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows

Xiapu Luo , Peng Zhou, Edmond W. W. Chan, Wenke Lee, Rocky K. C. Chang and Roberto Perdisci

Read More

Accurate and Provably Secure Latency Estimation with Treeple

Eric Chan-Tin and Nicholas Hopper

Read More

On Measuring the Similarity of Network Hosts: Pitfalls, New Metrics, and Empirical Analyses

Scott Coull and Fabian Monrose

Read More

SWIRL: A Scalable Watermark to Detect Correlated Network Flows

Amir Houmansadr and Nikita Borisov

Read More

SPARE: Replicas on Hold

Tobias Distler, Ivan Popov, Wolfgang Schroder-Preikschat, Hans P. Reiser and Ruediger Kapitza

Read More

Efficient Privacy-Preserving Biometric Identification

Yan Huang, Lior Malka, David Evans and Jonathan Katz

Read More

Usability Testing a Malware-Resistant Input Mechanism

Alana Libonati , Jonathan M. McCune and Michael K. Reiter

Read More

Tracker: Security and Privacy for RFID-based Supply Chains

Erik-Oliver Blass , Kaotar Elkhiyaoui and Refik Molva

Read More

PiOS: Detecting Privacy Leaks in iOS Applications

Manuel Egele, Christopher Kruegel, Engin Kirda and Giovanni Vigna

Read More

Privacy-Preserving Aggregation of Time-Series Data

Elaine Shi, T-H. Hubert Chan, Eleanor Rieffel, Richard Chow and Dawn Song

Read More


文章来源: https://www.ndss-symposium.org/ndss2011/accepted-papers/#Howard:%20A%20Dynamic%20Excavator%20for%20Reverse%20Engineering%20Data%20Structures
如有侵权请联系:admin#unsafe.sh