Return to the Zombie Gadgets: Undermining Destructive Code Reads via Code Inference Attacks
Snow, Kevin Z., Rogowski, Roman, Werner, Jan, Hyungjoon Koo, Monrose, Fabian, Polychronakis, Michalis
Published in 2016 IEEE Symposium on Security and Privacy (SP) (01.05.2016)
Published in 2016 IEEE Symposium on Security and Privacy (SP) (01.05.2016)
Get full text
Conference Proceeding
Journal Article
Phonotactic Reconstruction of Encrypted VoIP Conversations: Hookt on Fon-iks
White, A. M., Matthews, A. R., Snow, K. Z., Monrose, F.
Published in 2011 IEEE Symposium on Security and Privacy (01.05.2011)
Published in 2011 IEEE Symposium on Security and Privacy (01.05.2011)
Get full text
Conference Proceeding
Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization
Snow, K. Z., Monrose, F., Davi, L., Dmitrienko, A., Liebchen, C., Sadeghi, A.
Published in 2013 IEEE Symposium on Security and Privacy (01.05.2013)
Published in 2013 IEEE Symposium on Security and Privacy (01.05.2013)
Get full text
Conference Proceeding
Revisiting Browser Security in the Modern Era: New Data-Only Attacks and Defenses
Rogowski, Roman, Morton, Micah, Li, Forrest, Monrose, Fabian, Snow, Kevin Z., Polychronakis, Michalis
Published in 2017 IEEE European Symposium on Security and Privacy (EuroS&P) (01.04.2017)
Published in 2017 IEEE European Symposium on Security and Privacy (EuroS&P) (01.04.2017)
Get full text
Conference Proceeding
Evaluating the risk of cyber attacks on SCADA systems via Petri net analysis with application to hazardous liquid loading operations
Henry, M.H., Layer, R.M., Snow, K.Z., Zaret, D.R.
Published in 2009 IEEE Conference on Technologies for Homeland Security (01.05.2009)
Published in 2009 IEEE Conference on Technologies for Homeland Security (01.05.2009)
Get full text
Conference Proceeding