Papers tagged security
- A Protocol for Scalable Anonymous Communication
- A Virtual Machine Introspection Based Architecture for Intrusion Detection
- An Introduction to Capsicum
- And Then There Were None
- ClickOS and the Art of Network Function Virtualization
- Cloud Networking Challenges and Opportunities for Innovations
- Coda: A Highly Available File System for a Distributed Workstation Environment
- Communication Theory of Secrecy Systems
- Elm: Automatically Deriving and Enforcing Data-Centric Safety Properties in Web Applications
- Herbivore: A Scalable and Efficient Protocol for Anonymous Communication and Broadcasting
- Jails: Confining the Omnipotent Root
- Macaroons: Cookies with Contextual Caveats for Decentralized Authorization in the Cloud
- Meltdown: Reading Kernel Memory from User Space
- PPCoin: Peer-to-Peer Crypto-Currency with Proof-of-Stake
- Practical Byzantine Fault Tolerance and Proactive Recovery
- Preventing TLS Man-in-the-Middle Attacks in Real-time Video Communication Networks
- Robust Physical-World Attacks on Deep Learning Visual Classification
- SoK: Eternal War in Memory
- Spectre Attacks: Exploiting Speculative Execution
- Towards a Cloud Computing Research Agenda
- Unikernels: Library Operating Systems for the Cloud
- Unikernels: Library Operating Systems for the Cloud
- Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms
- Xen and the Art of Virtualization