21![arXiv:1404.3465v1 [cs.CR] 14 AprNetwork-on-Chip Firewall: Countering Defective and Malicious System-on-Chip Hardware Michael LeMay∗, Carl A. Gunter University of Illinois at Urbana-Champaign arXiv:1404.3465v1 [cs.CR] 14 AprNetwork-on-Chip Firewall: Countering Defective and Malicious System-on-Chip Hardware Michael LeMay∗, Carl A. Gunter University of Illinois at Urbana-Champaign](https://www.pdfsearch.io/img/0e8d83adda193ca7c5af8c3b82efbf65.jpg) | Add to Reading ListSource URL: sharps.orgLanguage: English - Date: 2014-06-20 15:53:16
|
---|
22![Malicious Threat Detection 3 reasons why you want to integrate breach detection into a SIEM solution Many companies rely on a Security Information and Event Management (SIEM) Malicious Threat Detection 3 reasons why you want to integrate breach detection into a SIEM solution Many companies rely on a Security Information and Event Management (SIEM)](https://www.pdfsearch.io/img/e61a52ffa3b3ebbae4a74944f071eb54.jpg) | Add to Reading ListSource URL: www.redsocks.euLanguage: English - Date: 2018-08-06 04:35:01
|
---|
23![. faster malicious 2pc with online/offline dual execution Mike Rosulek @ . faster malicious 2pc with online/offline dual execution Mike Rosulek @](https://www.pdfsearch.io/img/c372b500b3834f8c0178b4a6d79ef142.jpg) | Add to Reading ListSource URL: web.engr.oregonstate.edu- Date: 2016-07-26 12:27:06
|
---|
24![Optical Delusions: A Study of Malicious QR Codes in the Wild Amin Kharraz∗ , Engin Kirda∗ , William Robertson∗ , Davide Balzarotti† , Aurélien Francillon† ∗ Northeastern University, Boston, USA Optical Delusions: A Study of Malicious QR Codes in the Wild Amin Kharraz∗ , Engin Kirda∗ , William Robertson∗ , Davide Balzarotti† , Aurélien Francillon† ∗ Northeastern University, Boston, USA](https://www.pdfsearch.io/img/42c77d0e7bf152b561ceaac436e71169.jpg) | Add to Reading ListSource URL: s3.eurecom.frLanguage: English - Date: 2018-08-15 14:28:52
|
---|
25![Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications Sebastian Poeplau∗† , Yanick Fratantonio∗ , Antonio Bianchi∗ , Christopher Kruegel∗ , Giovanni Vigna∗ ∗ UC Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications Sebastian Poeplau∗† , Yanick Fratantonio∗ , Antonio Bianchi∗ , Christopher Kruegel∗ , Giovanni Vigna∗ ∗ UC](https://www.pdfsearch.io/img/329e1bbf50031d6151f13977b8ca355d.jpg) | Add to Reading ListSource URL: www.s3.eurecom.frLanguage: English - Date: 2017-11-07 11:46:31
|
---|
26![Survivability of Large Networks in the Presence of Malicious Attacks Casey T. Deccio, Spencer Cox, Matthew Smith, Jacob Wan, Mark Clement, and Quinn Snell Computer Science Department Brigham Young University Survivability of Large Networks in the Presence of Malicious Attacks Casey T. Deccio, Spencer Cox, Matthew Smith, Jacob Wan, Mark Clement, and Quinn Snell Computer Science Department Brigham Young University](https://www.pdfsearch.io/img/589e0ebf9677bef096d104d5dab921e3.jpg) | Add to Reading ListSource URL: m.smithworx.comLanguage: English - Date: 2010-07-01 18:07:10
|
---|
27![Illustrating the Risk of Unconstrained Strings One way to reduce the likelihood that a string can contain unauthorized or malicious content is to constrain the contents of the string. As the following figure shows, there Illustrating the Risk of Unconstrained Strings One way to reduce the likelihood that a string can contain unauthorized or malicious content is to constrain the contents of the string. As the following figure shows, there](https://www.pdfsearch.io/img/0b7983a37b13ae993bd66814fd29dc58.jpg) | Add to Reading ListSource URL: www.xfront.com- Date: 2017-03-08 13:42:08
|
---|
28![Unconditional UC-Secure Computation with (Stronger-Malicious) PUFs Saikrishna Badrinarayanan∗ Dakshita Khurana† Unconditional UC-Secure Computation with (Stronger-Malicious) PUFs Saikrishna Badrinarayanan∗ Dakshita Khurana†](https://www.pdfsearch.io/img/4adc848ea064dedcaf3f1da643941212.jpg) | Add to Reading ListSource URL: web.cs.ucla.eduLanguage: English - Date: 2017-11-29 01:25:51
|
---|
29![Prophiler: A Fast Filter for the Large-Scale Detection of Malicious Web Pages Davide Canali Institute Eurecom, France Prophiler: A Fast Filter for the Large-Scale Detection of Malicious Web Pages Davide Canali Institute Eurecom, France](https://www.pdfsearch.io/img/acf5520639764b96015eee34b60f97be.jpg) | Add to Reading ListSource URL: davidecanali.comLanguage: English - Date: 2013-09-25 18:20:21
|
---|
30![User-Centric Dependence Analysis For Identifying Malicious Mobile Apps Karim O. Elish, Danfeng (Daphne) Yao, and Barbara G. Ryder Department of Computer Science Virginia Tech Blacksburg, VA, USA User-Centric Dependence Analysis For Identifying Malicious Mobile Apps Karim O. Elish, Danfeng (Daphne) Yao, and Barbara G. Ryder Department of Computer Science Virginia Tech Blacksburg, VA, USA](https://www.pdfsearch.io/img/56bbbb5c1ddd8f3991991bf4c5906266.jpg) | Add to Reading ListSource URL: people.cs.vt.eduLanguage: English - Date: 2012-04-20 15:19:52
|
---|