Hacker News new | past | comments | ask | show | jobs | submit | from login
Practical Timing Side Channel Attacks Against Kernel Space ASLR [pdf] (ieee-security.org)
1 point by godelmachine on May 31, 2018 | past | web
The Password Reset MitM Attack [pdf] (ieee-security.org)
3 points by lainon on Dec 23, 2017 | past | web
The Impact of Copy&Paste on Android Application Security [pdf] (ieee-security.org)
1 point by lainon on Aug 29, 2017 | past | web
The Password Reset MitM Attack [pdf] (ieee-security.org)
1 point by based2 on July 5, 2017 | past | web
The Password Reset MitM Attack[pdf] (ieee-security.org)
2 points by Deinos on July 3, 2017 | past | web
The Password Reset MitM Attack [pdf] (ieee-security.org)
1 point by paultopia on June 21, 2017 | past | web | 1 comment
Password Typos and How to Correct Them Securely (2016) [pdf] (ieee-security.org)
51 points by sillysaurus3 on June 16, 2017 | past | web | 13 comments
Obstacles to the Adoption of Secure Communication Tools [pdf] (ieee-security.org)
1 point by sr2 on May 29, 2017 | past | web
Obstacles to the Adoption of Secure Communication Tools [pdf] (ieee-security.org)
3 points by progval on May 26, 2017 | past | web
Security Impact of Copy&Paste from StackOverflow in Android Apps [pdf] (ieee-security.org)
2 points by jor-el on May 24, 2017 | past | web
Finding and Preventing Bugs in JavaScript Bindings [pdf] (ieee-security.org)
1 point by ingve on May 23, 2017 | past | web
An Analysis of Emission Defeat Devices in Modern Automobiles [pdf] (ieee-security.org)
2 points by sr2 on May 22, 2017 | past | web
“Is Our Children’s Apps Learning?” [pdf] (ieee-security.org)
2 points by edtechstrats on Apr 30, 2017 | past | web
Inferring User Routes and Locations Using Zero-Permission Mobile Sensors [pdf] (ieee-security.org)
1 point by feelthepain on June 2, 2016 | past | web
LAVA: Large-Scale Automated Vulnerability Addition [pdf] (ieee-security.org)
20 points by ingve on May 29, 2016 | past | web | 4 comments
Analog chip poisoning [pdf] (ieee-security.org)
2 points by damc13 on May 27, 2016 | past | web
Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector [pdf] (ieee-security.org)
3 points by jvdh on May 26, 2016 | past | web
A2: Analog Malicious Hardware [pdf] (ieee-security.org)
4 points by petethomas on May 24, 2016 | past | web
Not-So-Random Numbers in Virtualized Linux and the Whirlwind RNG [pdf] (ieee-security.org)
2 points by noyesno on Nov 3, 2015 | past | web
IEEE-Security.org has certificate only valid for *.sites.myregisteredsite.com (ieee-security.org)
2 points by galapago on July 3, 2015 | past | web
Tracking Protection in Firefox for Privacy and Performance [pdf] (ieee-security.org)
8 points by jsingleton on May 28, 2015 | past | web | 2 comments
The pitfalls of protocol design [pdf] (ieee-security.org)
11 points by DyslexicAtheist on Sept 25, 2014 | past | web | 1 comment
Attacks Exploiting the HTML5 Screen Sharing API [pdf] (ieee-security.org)
3 points by pmontra on June 26, 2014 | past | web
Stealing Webpages Rendered on Your Browser by Exploiting GPU Vulns [pdf] (ieee-security.org)
10 points by ingenter on May 30, 2014 | past | web
Lucky13: Breaking the TLS and DTLS Record Protocols (2013) (ieee-security.org)
1 point by edwincheese on Mar 3, 2014 | past | web
Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization [pdf] (ieee-security.org)
3 points by grysh on May 24, 2013 | past | web
I Still Know What You Visited Last Summer (ieee-security.org)
1 point by willlll on May 4, 2013 | past | web
Unleashing MAYHEM on Binary Code (AEG) (ieee-security.org)
1 point by mmastrac on June 19, 2012 | past | web

Guidelines | FAQ | Support | API | Security | Lists | Bookmarklet | Legal | Apply to YC | Contact

Search: