Index of /~bryan/papers2/security

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]Chaff bugs: Deterring attackers by making software buggier - 2018.pdf2018-08-02 17:22 1.3M 
[DIR]cryptography/2018-07-15 11:56 -  
[TXT]url.txt2018-02-25 10:41 8.1K 
[   ]Untagging tor: A formal treatment of onion encryption - 2018.pdf2018-02-08 13:28 516K 
[   ]Pricing anonymity - 2018.pdf2017-12-23 01:20 318K 
[   ]Proof-of-censorship: Enabling centralized censorship-resistant content providers - 2018.pdf2017-12-23 01:19 318K 
[   ]Privacy-preserving genome-wide association study is practical - 2017.pdf2017-11-20 02:01 483K 
[   ]Decentralized certificate authorities - 2017.pdf2017-10-10 18:23 730K 
[   ]DEF CON 25 voting village report.pdf2017-10-10 08:50 1.3M 
[   ]1Password for Teams White Paper.pdf2017-04-24 11:04 472K 
[   ]05-DNSSEC-root-sign.pdf2017-03-09 19:46 1.7M 
[   ]caribnog-dnssec-design-module1-12jun12-en.pdf2017-03-09 19:46 1.9M 
[   ]USBee: Air-gap covert-channel via electromagnetic emission from USB - 2016.pdf2016-08-29 10:52 1.0M 
[   ]Entropy Loss and Output Predictability in the Libgcrypt PRNG - CVE-2016-6313 - 2016.pdf2016-08-18 03:04 157K 
[   ]Twice the bits, twice the trouble: Vulnerabilities introduced by migrating to 64-bit platforms - 2016.pdf2016-08-10 10:55 372K 
[   ]Decentralized public key infrastructure - a white paper from Rebooting the Web of Trust.pdf2016-08-02 09:28 658K 
[   ]No place to hide: contactless probing of secret data on FPGAs - 2016.pdf2016-06-06 03:07 2.0M 
[   ]Antikernel: A decentralized secure hardware-software operating system architecture - Andrew Zonenberg - 2016.pdf2016-06-01 12:44 269K 
[   ]Practical DRAM physically unclonable functions in commodity devices - 2016.pdf2016-03-11 07:25 1.3M 
[   ]Reverse Engineering Intel DRAM Addressing and Exploitation.pdf2015-11-30 17:17 222K 
[   ]Riffle: an efficient communication system with strong anonymity.pdf2015-11-09 23:20 4.4M 
[   ]Beware your hands reveal your secrets.pdf2015-10-29 14:25 1.4M 
[   ]Robust and efficient elimination of cache and timing side channels - Dan Boneh - 2015.pdf2015-08-31 20:55 529K 
[   ]Exploiting bittorrent vulnerabilities to launch reflective DDoS attacks.pdf2015-08-18 14:48 119K 
[   ]HORNET: High-speed onion routing at the network layer.pdf2015-07-21 18:13 466K 
[   ]Riposte: An anonymous messaging system handling millions of users.pdf2015-06-30 01:11 600K 
[   ]The_Mystery_of_Duqu_2_0_a_sophisticated_cyberespionage_actor_returns.pdf2015-06-10 02:00 5.4M 
[   ]Measuring and mitigating AS-level adversaries with Tor.pdf2015-05-21 17:12 2.5M 
[   ]Anti-DDoS: Threat detection with kafka and storm - 2015.pdf2015-04-19 14:01 4.9M 
[DIR]pynchon/2014-11-27 17:54 -  
[   ]Program synthesis in reverse engineering - Rolf Rolles.pdf2014-11-19 00:30 826K 
[DIR]advances-in-cryptology/2014-10-22 21:19 -  
[   ]Towards reliable storage of 56-bit secrets in human memory (using spaced repetition).pdf2014-10-18 15:47 417K 
[   ]Making sure crypto stays insecure - Daniel J. Bernstein - slides.pdf2014-10-18 07:03 409K 
[   ]Baseband attacks: Remote exploitation of memory corruptions in cellular protocol stacks.pdf2014-10-16 20:01 411K 
[   ]Reversing Stealthy Dopant-Level Circuits.pdf2014-09-28 18:02 6.5M 
[   ]Stealthy dopant-level hardware trojans.pdf2014-09-28 18:00 433K 
[   ]A survey of remote automotive attack surfaces.pdf2014-08-12 11:57 5.6M 
[DIR]covert.io/2014-07-21 11:52 -  
[   ]The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network.pdf2014-07-19 23:22 548K 
[   ]Synthesis of masking countermeasures against side channel attacks.pdf2014-07-18 16:36 175K 
[   ]Flipping bits in memory without accessing them: an experimental study of DRAM disturbance errors.pdf2014-06-24 14:54 828K 
[TXT]get.txt2014-04-11 13:59 194  
[   ]Framing signals - a return to portable shellcode.pdf2014-03-24 07:31 302K 
[   ]LIRA: Lightweight Incentivized Routing for Anonymity.pdf2014-03-21 15:26 1.1M 
[DIR]infomarkets/2014-03-13 20:43 -  
[   ]Reconfigurable random bit storage using polymer-dispersed liquid crystal.pdf2014-03-11 17:54 1.2M 
[   ]Profiling a Million User DHT.pdf2013-12-22 11:39 1.3M 
[   ]DNSNMC okTurtles - DNSNMC replaces Certificate Authorities with Namecoin and fixes HTTPS security.pdf2013-12-21 12:03 325K 
[   ]Power and timing side channels for PUFs and their efficient exploitation.pdf2013-12-20 03:36 342K 
[   ]RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis.pdf2013-12-18 04:17 7.7M 
[TXT]Tor hidden-service passive de-cloaking.html2013-12-15 17:34 35K 
[   ]Fingerprinting Tor's hidden service log files using a timing channel.pdf2013-12-15 17:33 362K 
[   ]Full-Disclosure.pdf2013-12-09 07:03 2.5M 
[   ]A model for quantifying information leakage.pdf2013-10-20 14:49 290K 
[   ]Crawling BitTorrent DHTs for Fun and Profit.pdf2013-10-04 16:54 338K 
[   ]Factoring RSA keys from certified smart cards - Coppersmith in the wild.pdf2013-09-15 23:15 360K 
[   ]Users Get Routed - Traffic Correlation on Tor by Realistic Adversaries.pdf2013-09-05 08:49 1.8M 
[   ]De-anonymizing alt.anonymous.messages - defcon - slides.pdf2013-08-03 11:42 6.2M 
[   ]Bitmessage - a peer-to-peer message authentication and delivery system.pdf2013-07-30 17:37 194K 
[   ]BREACH - SSL, gone in 30 seconds.pdf2013-07-27 16:05 1.0M 
[   ]Comparison Between Two Practical Mix Designs - 2004.pdf2013-05-25 23:45 4.3M 
[   ]Towards an information theoretic metric for anonymity - 2004.ps2013-05-25 23:44 220K 
[TXT]Degree_of_anonymity.wikipedia.html2013-04-21 18:43 41K 
[   ]You can type, but you can't hide: a stealthy GPU-based keylogger.pdf2013-04-09 02:11 345K 
[   ]Trawling for Tor Hidden Services - Detection, Measurement, Deanonymization.pdf2013-04-05 16:56 470K 
[DIR]android/2013-03-30 20:39 -  
[DIR]ardrone/2013-03-30 14:19 -  
[   ]Microgadgets: size does matter in turing-complete return-oriented programming.pdf2013-03-30 13:25 285K 
[   ]On the Applicability of Time-Driven Cache Attacks on Mobile Devices.pdf2013-03-26 07:37 754K 
[   ]Cloudopsy: an Autopsy of Data Flows in the Cloud.pdf2013-03-20 10:57 446K 
[   ]CloudFilter: practical control of sensitive data propagation to the cloud.pdf2013-03-10 10:40 213K 
[   ]Hacking the Xbox - bunnie.pdf2013-03-06 21:16 18M 
[   ]Efficient LDPC code based secret sharing schemes and private data storage in cloud without encryption.pdf2013-03-01 13:17 330K 
[   ]aws-security-whitepaper.pdf2013-03-01 11:48 1.2M 
[   ]Minimizing disclosure of private information in credential-based interactions: A graph-based approach.pdf2013-02-27 05:44 625K 
[   ]Towards Provably Secure Software Attestation.pdf2013-02-20 03:01 673K 
[   ]Launching Return-Oriented Programming Attacks against Randomized Relocatable Executables.pdf2012-12-04 00:13 272K 
[   ]OS-Sommelier: Memory-Only Operating System Fingerprinting in the Cloud.pdf2012-10-07 14:39 443K 
[   ]Securing Untrusted Code via Compiler-Agnostic Binary Rewriting.pdf2012-09-27 23:53 378K 
[   ]Breakthrough silicon scanning discovers backdoor in military chip.pdf2012-09-13 08:41 648K 
[   ]Bin-Carver: Automatic Recovery of Binary Executable Files.pdf2012-08-06 21:15 1.0M 
[   ]Real-World Sybil Attacks in BitTorrent Mainline DHT.pdf2012-07-27 02:58 393K 
[   ]Mining your P's and Q's: Detection of widespread weak keys in network devices.pdf2012-07-11 12:38 489K 
[   ]Q - Exploit Hardening Made Easy.pdf2012-07-08 19:58 686K 
[   ]Automatic Patch-Based Exploit Generation is Possible - Techniques and Implications.pdf2012-07-08 19:57 215K 
[   ]SplitScreen - Enabling Efficient, Distributed Malware Detection.pdf2012-07-08 19:56 521K 
[   ]Theory and Techniques for Automatic Generation of Vulnerability-Based Signatures.pdf2012-07-08 19:41 293K 
[   ]Generating Test Data with Enhanced Context Free Grammars.pdf2012-07-08 17:46 213K 
[   ]Grammar-Based Specification and Parsing of Binary File Formats.pdf2012-07-08 17:46 236K 
[   ]Bootkit Threats - In Depth Reverse Engineering and Defense.pdf2012-07-08 16:25 3.9M 
[   ]Undangle - Early Detection of Dangling Pointers in Use-After-Free.pdf2012-07-07 21:16 522K 
[   ]Debugging Tech Guide Dev.pdf2012-07-07 15:22 490K 
[   ]Deriving Input Syntactic Structure From Execution.pdf2012-07-07 15:18 546K 
[   ]Automatic Partial Loop Summarization in Dynamic Test Generation.pdf2012-07-07 15:17 232K 
[   ]Automated Synthesis of Symbolic Instruction Encodings from IO Samples.pdf2012-07-07 15:17 229K 
[   ]TIE - Principled Reverse Engineering of Types in Binary Programs.pdf2012-07-07 15:15 1.5M 
[   ]A Semantics-Based Approach to Malware Detection.pdf2012-07-06 14:45 344K 
[   ]Renovo - A Hidden Code Extractor for Packed Executables.pdf2012-07-06 14:44 124K 
[   ]Enabling Sophisticated Analyses of x86 Binaries with RevGen.pdf2012-07-06 02:59 112K 
[   ]The CLASP Application Security Process.pdf2012-07-02 02:15 1.4M 
[   ]LZfuzz - a fast compression-based fuzzer for poorly documentd protocols.pdf2012-07-02 02:13 395K 
[   ]Smashing the Gadgets - Hindering Return-Oriented Programming Using In-Place Code Randomization.pdf2012-06-29 02:15 850K 
[   ]Analysis and Defense of Vulnerabilities in Binary Code.pdf2012-06-28 18:53 856K 
[   ]Dynamic Test Generation for Large Binary Programs.pdf2012-06-28 18:53 1.3M 
[   ]Automatic Generation of Control Flow Hijacking Exploits for Software Vulnerabilities.pdf2012-06-28 18:52 927K 
[   ]mayhem-oakland-12.pdf2012-06-27 07:50 415K 
[   ]Dealing with next-generation malware.pdf2012-06-25 22:15 1.3M 
[   ]Packed, Printable, and Polymorphic Return-Oriented Programming.pdf2012-06-25 21:58 466K 
[   ]String Oriented Programming.pdf2012-06-25 21:48 210K 
[   ]Retrofitting Security in COTS Software with Binary Rewriting.pdf2012-06-25 21:43 138K 
[   ]Binary Rewriting without Relocation Information.pdf2012-06-25 21:43 189K 
[   ]Code-Reuse Attacks - New Frontiers and Defenses [bletsch].pdf2012-06-25 20:24 784K 
[   ]Return-Oriented Programming without Returns.pdf2012-06-25 20:15 569K 
[   ]Jump-Oriented Programming - A New Class of Code-Reuse Attack.pdf2012-06-25 20:13 333K 
[   ]Chopping - A Generalization of Slicing.pdf2012-06-25 17:03 108K 
[   ]A New Model of Program Dependences for Reverse Engineering.pdf2012-06-25 16:49 170K 
[   ]Introduction to OCaml.pdf2012-06-25 03:29 2.2M 
[   ]Developing Applications With Objective Caml.pdf2012-06-25 02:14 2.7M 
[   ]Neuroscience meets cryptography: Designing crypto primitives secure against rubber hose attacks.pdf2012-06-19 08:56 519K 
[   ]Space Traveling across VM: Automatically Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection.pdf2012-05-21 22:36 882K 
[   ]Cryptanalysis of the Random Number Generator of the Windows Operating System.pdf2012-05-04 02:44 289K 
[   ]Jump-oriented programming: a new class of code-reuse attack.pdf2012-03-21 08:19 333K 
[   ]Python arsenal for RE.pdf2012-03-19 20:49 1.1M 
[   ]Grammar-based Whitebox Fuzzing.pdf2012-03-10 19:08 171K 
[   ]Polyglot - Automatic Extraction of Protocol Message Format using Dynamic Binary Analysis.pdf2012-03-10 13:10 184K 
[   ]Dynamic Taint Analysis and Forward Symbolic Execution.pdf2012-03-10 02:32 283K 
[   ]Symbolic Execution Algorithms for Test Generation.pdf2012-03-09 22:08 760K 
[   ]Dytan - A Generic Dynamic Taint Analysis Framework.pdf2012-01-24 18:59 348K 
[   ]REIL - A platform-independent intermediate representation of disassembled code for static code analysis.pdf2012-01-24 18:38 102K 
[   ]Automated Whitebox Fuzz Testing.pdf2012-01-23 14:45 637K 
[   ]A Survey of Program Slicing Techniques.pdf2012-01-21 20:12 377K 
[   ]EXE - A System for Automatically Generating Inputs of Death Using Symbolic Execution.pdf2012-01-21 20:00 193K 
[   ]Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software.pdf2012-01-21 19:08 196K 
[   ]RWset - Attacking Path Explosion in Constraint-Based Test Generation.pdf2012-01-21 18:23 237K 
[   ]Symbolic Execution for Software Testing in Practice - Preliminary Assessment.pdf2012-01-21 18:17 165K 
[   ]A Smart Fuzzer for x86 Executables.pdf2012-01-21 05:11 273K 
[   ]DART - Directed Automated Random Testing.pdf2012-01-21 00:37 158K 
[   ]Flayer - Exposing Application Internals.pdf2012-01-21 00:27 81K 
[   ]Experiences with Model Inference Assisted Fuzzing.pdf2012-01-17 16:09 141K 
[   ]A game-theoretic analysis of cooperation in anonymity networks.pdf2012-01-07 18:39 1.1M 
[   ]Formalizing the LLVM intermediate representation for verified program transformations (with Coq) - 2012.pdf2012-01-05 08:49 415K 
[   ]Prospex - Protocol Specification Extraction.pdf2011-12-15 12:45 247K 
[   ]Creating Vulnerability Signatures Using Weakest Preconditions.pdf2011-12-15 12:44 224K 
[   ]IntScope - Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution.pdf2011-12-15 12:41 198K 
[   ]LoongChecker: Practical summary-based semi-simulation to detect vulnerability in binary code.pdf2011-11-23 04:07 262K 
[   ]Precise static analysis of binaries by extracting relational information - REIL.pdf2011-10-07 05:45 204K 
[   ]IDA PLUG-IN WRITING IN C and C++.pdf2011-10-05 18:26 507K 
[   ]Can a program reverse-engineer itself?.pdf2011-09-12 23:56 306K 
[   ]usenix11.pdf2011-08-23 10:44 686K 
[   ]SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures.pdf2011-08-18 10:58 463K 
[   ]LibsafeXP.tar.gz2011-08-18 10:58 27K 
[   ]Automatic Reverse Engineering of Data Structures from Binary Execution.pdf2011-08-18 10:57 367K 
[   ]IntScope: Automatically Detecting Integer Overflow Vulnerability In X86 Binary Using Symbolic Execution.pdf2011-08-18 10:56 198K 
[   ]LibsafeXP: A Practical and Transparent Tool for Run-time Buffer Overflow Preventions.pdf2011-08-18 10:55 616K 
[   ]Automatic Protocol Format Reverse Engineering Through Context-Aware Monitored Execution.pdf2011-08-18 10:54 642K 
[   ]AutoPaG: Towards Automated Software Patch Generation with Source Code Root Cause Identification and Repair.pdf2011-08-18 10:54 352K 
[   ]ExperimenTor: A testbed for safe and realistic Tor experimentation.pdf2011-07-08 10:42 478K 
[   ]On the Expressiveness of Return-into-libc Attacks.pdf2011-06-21 20:44 289K 
[   ]ROPdefender: A detection tool to defend against return-oriented programming attacks.pdf2011-06-13 05:46 387K 
[   ]Metsploit Unleashed.pdf2011-06-09 13:22 4.6M 
[   ]Following the White Rabbit - Software attacks against Intel VT-d technology.pdf2011-05-31 12:44 688K 
[   ]Characterizing Kernel Malware Behavior with Kernel Data Access Patterns.pdf2011-04-04 10:50 272K 
[   ]Privilege escalation attacks on android.pdf2010-12-16 12:25 260K 
[   ]Return-oriented programming without returns on ARM.pdf2010-12-13 01:50 427K 
[DIR]stuxnet/2010-11-07 09:13 -  
[   ]Jakstab - a static analysis platform for binaries.pdf2010-10-27 07:00 47K 
[   ]G-Free: defeating return-oriented programming through gadget-less binaries.pdf2010-09-29 12:43 263K 
[   ]A framework for automated architecture-independent gadget search.pdf2010-07-14 06:36 242K 
[   ]Whanau: A sybil-proof distributed hash table.pdf2010-03-18 10:36 875K 
[   ]Chip and PIN is broken.pdf2010-02-11 15:37 1.8M 
[   ]Using sphinx to improve onion routing circuit construction - 2009.pdf2009-12-19 11:07 186K 
[   ]Opportunities and limits of remote timing attacks - 2009.pdf2009-06-18 09:23 674K 
[   ]IDA_Pro_Shortcuts.pdf2009-06-16 13:20 71K 
[   ]EigenSpeed: Secure peer-to-peer bandwidth evaluation.pdf2009-03-25 10:10 421K 
[   ]Helios: Web-based open-audit voting.pdf2008-07-14 15:15 1.2M 
[   ]Framework for instruction-level tracing and analysis of program executions.pdf2007-06-26 08:33 223K 
[TXT]fuzzy-fingerprints.html2006-10-29 12:33 42K 
[   ]SybilGuard: Defending against sybil attacks via social networks.pdf2006-09-24 16:23 454K 
[   ]ZIP attacks with reduced known plaintext.pdf2006-03-09 13:25 315K 
[   ]The Pynchon Gate: A secure method of pseudonymous mail retrieval - Len Sassaman - Bram Cohen - Nick Mathewson.pdf2005-10-04 11:01 253K 
[   ]Traffic analysis and trade-offs in anonymity providing systems.pdf2003-11-23 19:37 54K 
[   ]Towards measuring anonymity - 2002.ps.gz2003-09-08 22:01 77K 
[   ]Practical threshold signatures.pdf2001-03-06 07:33 210K 

Apache/2.4.25 (Debian) Server at diyhpl.us Port 80