Akademska digitalna zbirka SLovenije - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov konzorcija SI. Za polni dostop se PRIJAVITE.

1 2
zadetkov: 18
1.
  • Protecting Software through... Protecting Software through Obfuscation
    Schrittwieser, Sebastian; Katzenbeisser, Stefan; Kinder, Johannes ... ACM computing surveys, 07/2016, Letnik: 49, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    Software obfuscation has always been a controversially discussed research area. While theoretical results indicate that provably secure obfuscation in general is impossible, its widespread ...
Celotno besedilo
Dostopno za: IZUM, KILJ, NUK, PILJ, SAZU, UL, UM, UPUK
2.
  • From Hack to Elaborate Tech... From Hack to Elaborate Technique—A Survey on Binary Rewriting
    Wenzl, Matthias; Merzdovnik, Georg; Ullrich, Johanna ... ACM computing surveys, 05/2020, Letnik: 52, Številka: 3
    Journal Article
    Recenzirano

    Binary rewriting is changing the semantics of a program without having the source code at hand. It is used for diverse purposes, such as emulation (e.g., QEMU), optimization (e.g., DynInst), ...
Celotno besedilo
Dostopno za: IZUM, KILJ, NUK, PILJ, SAZU, UL, UM, UPUK
3.
  • An extended view on measuri... An extended view on measuring tor AS-level adversaries
    Gegenhuber, Gabriel K.; Maier, Markus; Holzbauer, Florian ... Computers & security, September 2023, 2023-09-00, Letnik: 132
    Journal Article
    Recenzirano
    Odprti dostop

    •Update on Tor AS-level adversaries (comparison of measurement results for IPv4 in 2020 and 2022).•Measuring AS-level adversaries for IPv6.•Measuring AS-level adversaries in censored countries (case ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
4.
  • Utilizing Object Capabiliti... Utilizing Object Capabilities to Improve Web Application Security
    Koppmann, Michael; Kudera, Christian; Pucher, Michael ... Applied Cybersecurity & Internet Governance, 11/2022, Letnik: 1, Številka: 1
    Journal Article
    Odprti dostop

    Nowadays, more and more applications are built with web technologies like HTML, CSS, and JavaScript, which are then executed in browsers. The web is utilized as an operating system independent ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK
5.
  • Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools
    Merzdovnik, Georg; Huber, Markus; Buhov, Damjan ... 2017 IEEE European Symposium on Security and Privacy (EuroS&P), 2017-April
    Conference Proceeding

    In this paper, we quantify the effectiveness of third-party tracker blockers on a large scale. First, we analyze the architecture of various state-of-the-art blocking solutions and discuss the ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM
6.
  • Automated Stitching of Noisy Scanning Electron Microscopy Images for Integrated Circuit Reverse Engineering
    Burian, Daniel; Kudera, Christian; Pucher, Michael ... 2022 IEEE Physical Assurance and Inspection of Electronics (PAINE), 2022-Oct.-25
    Conference Proceeding

    A scanning electron microscope (SEM) usually creates images in the range of megapixel resolutions, but analyzing an IC layer requires resolutions in the gigapixel range. To create such large images, ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM
7.
  • AVRS AVRS
    Pucher, Michael; Kudera, Christian; Merzdovnik, Georg Proceedings of the 15th International Conference on Availability, Reliability and Security, 08/2020
    Conference Proceeding

    Embedded systems and microcontrollers are becoming more and more popular as the Internet of Things continues to spread. However, while there is a wealth of different methods and tools for analyzing ...
Celotno besedilo
Dostopno za: NUK, UL
8.
  • An Extended View on Measuring Tor AS-level Adversaries
    Gabriel Karl Gegenhuber; Maier, Markus; Holzbauer, Florian ... arXiv.org, 03/2024
    Paper, Journal Article
    Odprti dostop

    Tor provides anonymity to millions of users around the globe which has made it a valuable target for malicious actors. As a low-latency anonymity system, it is vulnerable to traffic correlation ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK
9.
Celotno besedilo
10.
  • Browser History Stealing with Captive Wi-Fi Portals
    Dabrowski, Adrian; Merzdovnik, Georg; Kommenda, Nikolaus ... 2016 IEEE Security and Privacy Workshops (SPW), 05/2016
    Conference Proceeding

    In this paper we show that HSTS headers and long-term cookies (like those used for user tracking) are so prevailing that they allow a malicious Wi-Fi operator to gain significant knowledge about the ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM
1 2
zadetkov: 18

Nalaganje filtrov