Riccardo Spolaor, Laila Abudahi, Veelasha Moonsamy, M. Conti, R. Poovendran
{"title":"No Free Charge Theorem: A Covert Channel via USB Charging Cable on Mobile Devices","authors":"Riccardo Spolaor, Laila Abudahi, Veelasha Moonsamy, M. Conti, R. Poovendran","doi":"10.1007/978-3-319-61204-1_5","DOIUrl":"https://doi.org/10.1007/978-3-319-61204-1_5","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130281952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pierre Lestringant, Frédéric Guihéry, Pierre-Alain Fouque
{"title":"Assisted Identification of Mode of Operation in Binary Code with Dynamic Data Flow Slicing","authors":"Pierre Lestringant, Frédéric Guihéry, Pierre-Alain Fouque","doi":"10.1007/978-3-319-39555-5_30","DOIUrl":"https://doi.org/10.1007/978-3-319-39555-5_30","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"303 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116455910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Why Software DoS Is Hard to Fix: Denying Access in Embedded Android Platforms","authors":"Ryan V. Johnson, Mohamed Elsabagh, A. Stavrou","doi":"10.1007/978-3-319-39555-5_11","DOIUrl":"https://doi.org/10.1007/978-3-319-39555-5_11","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124717306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Megumi Ando, J. Guttman, Alberto R. Papaleo, J. Scire
{"title":"Hash-Based TPM Signatures for the Quantum World","authors":"Megumi Ando, J. Guttman, Alberto R. Papaleo, J. Scire","doi":"10.1007/978-3-319-39555-5_5","DOIUrl":"https://doi.org/10.1007/978-3-319-39555-5_5","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130886942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Thomas Gougeon, Morgan Barbier, Patrick Lacharme, Gildas Avoine, C. Rosenberger
{"title":"Memory Carving in Embedded Devices: Separate the Wheat from the Chaff","authors":"Thomas Gougeon, Morgan Barbier, Patrick Lacharme, Gildas Avoine, C. Rosenberger","doi":"10.1007/978-3-319-39555-5_32","DOIUrl":"https://doi.org/10.1007/978-3-319-39555-5_32","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125870057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TMGuard: A Touch Movement-Based Security Mechanism for Screen Unlock Patterns on Smartphones","authors":"W. Meng, Wenjuan Li, D. Wong, Jianying Zhou","doi":"10.1007/978-3-319-39555-5_34","DOIUrl":"https://doi.org/10.1007/978-3-319-39555-5_34","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115811692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fuzzy Signatures: Relaxing Requirements and a New Construction","authors":"Takahiro Matsuda, Kenta Takahashi, Takao Murakami, Goichiro Hanaoka","doi":"10.1007/978-3-319-39555-5_6","DOIUrl":"https://doi.org/10.1007/978-3-319-39555-5_6","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121189748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}