Z. Li,W. He, D. Akhawe, and D. Song. The
emperor ?s new password manager: Security analysis of web-based password
managers. Technical Report UCB/EECS-2014-138, EECS Department, University of
California, Berkeley, Jul 2014.
P. Royal, M. Halpin, D. Dagon, R. Edmonds, and W. Lee. PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware. In ACSAC, pages 289–300, 2006.
P. Royal, M. Halpin, D. Dagon, R. Edmonds, and W. Lee. PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware. In ACSAC, pages 289–300, 2006.
C. Kruegel, W. Robertson, and G.
Vigna. Detecting Kernel-Level Rootkits Through Binary Analysis. In ACSAC, pages
91–100, 2004.
M. Christodorescu, S. Jha, S. A.
Seshia, D. Song, and R. E. Bryant. Semantics-Aware Malware Detection. In S&P
(Oakland), pages 32–46, 2005.
WEINMANN, R.-P., AND APPELBAUM, J. Unlocking
FileVault. Presentation, 23rd Chaos Communication Congress, Dec. 2006.
SKOROBOGATOV, S. Low-temperature data remanence
in static RAM. University of Cambridge Computer Laborary Technical Report No.
536, June 2002
FERGUSON, N. AES-CBC + Elephant diffuser: A disk
encryption algorithm for Windows Vista.
http://www.microsoft.com/downloads/details.aspx?FamilyID=131dae03-39ae-48be-a8d6-8b0034c92555,
Aug. 2006.
CARRIER, B. D., AND GRAND, J. A
hardware-based memory acquisition procedure for digital investigations. Digital
Investigation 1 (Dec. 2003), 50–60.
BAR-LEV, A. Linux, Loop-AES and
optional smartcard based disk encryption. http://wiki.tuxonice.net/EncryptedSwapAndRoot,
Nov. 2007.
D. Akhawe, P. Saxena, and D. Song. Privilege
separation in html5 applications. In Proc. the 21st USENIX Security
symposium, 2012.
If you write only for money you would not write anything Great. Write from the heart; write the book you want to read. You can't hire an essay writing service to write your Great novel for you.
ReplyDeleteDissertation Proposal