Showing
1 - 6
results of
6
Skip to content
VuFind
Log in
Library Catalogue Plus
Library
Subject guides
Databases
Referencing
Catalogue
Articles Plus
Keyword
Title
Author
Subject
Find
Advanced Search
Search Results - Spensky, Chad
Search Results - Spensky, Chad
Showing
1 - 6
results of
6
Refine Results
Sort
Relevance
Date Descending
Author
Title
1
Loading…
Karonte: Detecting Insecure Multi-binary Interactions in Embedded Firmware
by
Redini, Nilo
,
Machiry, Aravind
,
Wang, Ruoyu
,
Spensky, Chad
,
Continella, Andrea
,
Shoshitaishvili, Yan
,
Kruegel, Christopher
,
Vigna, Giovanni
Request full text
Conference Proceeding
Save to List
Saved in:
2
Loading…
TEEzz: Fuzzing Trusted Applications on COTS Android Devices
by
Busch, Marcel
,
Machiry, Aravind
,
Spensky, Chad
,
Vigna, Giovanni
,
Kruegel, Christopher
,
Payer, Mathias
Request full text
Conference Proceeding
Save to List
Saved in:
3
Loading…
Glitching Demystified: Analyzing Control-flow-based Glitching Attacks and Defenses
by
Spensky, Chad
,
Machiry, Aravind
,
Burow, Nathan
,
Okhravi, Hamed
,
Housley, Rick
,
Gu, Zhongshu
,
Jamjoom, Hani
,
Kruegel, Christopher
,
Vigna, Giovanni
Request full text
Conference Proceeding
Save to List
Saved in:
4
Loading…
SoK: Privacy on Mobile Devices – It’s Complicated
by
Spensky, Chad
,
Stewart, Jeffrey
,
Yerukhimovich, Arkady
,
Shay, Richard
,
Trachtenberg, Ari
,
Housley, Rick
,
Cunningham, Robert K.
Published in
Proceedings on Privacy Enhancing Technologies
Get full text
Items that cite this one
Article
Save to List
Saved in:
5
Loading…
Can Smartphones and Privacy Coexist? Assessing Technologies and Regulations Protecting Personal Data on Android and iOS Devices
by
Yerukhimovich, Arkady
,
Balebako, Rebecca
,
Boustead, Anne E
,
Cunningham, Robert K
,
Welser, William
,
Housley, Richard
,
Shay, Richard
,
Spensky, Chad
,
Stanley, Karlyn D
,
Stewart, Jeffrey
,
Trachtenberg, Ari
,
Winkelman, Zev
Published in
Policy File
Request full text
Report
Save to List
Saved in:
6
Loading…
Can Smartphones and Privacy Coexist Assessing Technologies and Regulations Protecting Personal Data on Android and iOS Devices
by
Yerukhimovich,Arkady
,
Balebako,Rebecca
,
Boustead,Anne
,
Cunningham,Robert K
,
Welser,William IV
,
Housley,Richard
,
Shay,Richard
,
Spensky,Chad
,
Stanley,Karlyn D
,
Stewart,Jeffrey
,
Trachtenberg,Ari
,
Winkelman,Zev
Request full text
Report
Save to List
Saved in:
Search Tools:
RSS Feed
Email Search
Save Search
Back
Refine Results
Page will reload when a filter is selected or excluded.
Limit To
Peer Reviewed
1 results
1
Full Text
6 results
6
Format
Conference Proceedings
3 results
3
Reports
2 results
2
Articles
1 results
1
Journal Title
Proceedings On Privacy Enhancing Technologies
1 results
1
Subjects
Computer Science
3 results
3
Computer Science, Information Systems
3 results
3
Computer Science, Theory & Methods
3 results
3
Privacy
3 results
3
Science & Technology
3 results
3
Technology
3 results
3
Android
2 results
2
Computer Bugs
2 results
2
Embedded Systems
2 results
2
Source Code
2 results
2
Static Analysis
2 results
2
Arm Trustzone
1 results
1
Attack
1 results
1
Availability
1 results
1
Cellular Networks
1 results
1
Codes
1 results
1
Communication
1 results
1
Computer Access Control
1 results
1
Computer Network Security
1 results
1
Computer Programming
1 results
1
Year of Publication
From:
To:
Source
Ieee Electronic Library (Iel) Conference Proceedings
3 results
3
Ieee Xplore All Conference Series
3 results
3
Dtic Technical Reports
1 results
1
De Gruyter Journals
1 results
1
Walter De Gruyter: Open Access Journals
1 results
1
Social Science Premium Collection
1 results
1
Policy File Index
1 results
1
Politics Collection
1 results
1
Doaj Directory Of Open Access Journals
1 results
1
Ingentaconnect Journals
1 results
1
Road
1 results
1
Ezb Electronic Journals Library
1 results
1