Protecting Instruction Set Randomization from Code Reuse Attacks
Get full text
Book Chapter
Conference Proceeding
Identification and Evaluation of Security Activities in Agile Projects
Get full text
Book Chapter
Conference Proceeding
X-Pro: Distributed XDP Proxies Against Botnets of Things
Atiiq, Syafiq Al, Gehrmann, Christian
Published in 26th Nordic Conference on Secure IT Systems, NordSec 2021,Virtual, Online,2021-11-29 - 2021-11-30 (2021)
Published in 26th Nordic Conference on Secure IT Systems, NordSec 2021,Virtual, Online,2021-11-29 - 2021-11-30 (2021)
Get full text
Book Chapter
Conference Proceeding
Data Modelling for Predicting Exploits
Reinthal, Alexander, Filippakis, Eleftherios Lef, Almgren, Magnus
Published in Secure IT Systems (2018)
Published in Secure IT Systems (2018)
Get full text
Book Chapter
Efficient Sparse Merkle Trees: Caching Strategies and Secure (Non-)Membership Proofs
Get full text
Book Chapter
Conference Proceeding
Using Features of Encrypted Network Traffic to Detect Malware
Afzal, Zeeshan, Brunstrom, Anna, Lindskog, Stefan
Published in High Quality Networked Services in a Mobile World (2021)
Published in High Quality Networked Services in a Mobile World (2021)
Get full text
Book Chapter
Conference Proceeding
IMSI Probing: Possibilities and Limitations
Fraunholz, Daniel, Brunke, Dominik, Beidenhauser, Simon, Berger, Sebastian, Koenig, Hartmut, Reti, Daniel
Published in Secure IT Systems (2023)
Published in Secure IT Systems (2023)
Get full text
Book Chapter