| Title: |
Undermining Information Hiding (and What to Do about It) |
| Article URLs: |
|
| Alternative Article URLs: |
|
| Authors: |
Enes Göktas |
-
Vrije Universiteit Amsterdam, The Netherlands, Computer Science Institute
|
| Robert Gawlik |
-
Ruhr-Universität Bochum, Germany, Horst Görtz Institut for IT-Security (HGI)
|
| Benjamin Kollenda |
-
Ruhr-Universität Bochum, Germany, Horst Görtz Institut for IT-Security (HGI)
|
| Elias Athanasopoulos |
-
Vrije Universiteit Amsterdam, The Netherlands, Computer Science Institute
|
| Georgios Portokalidis |
-
Stevens Institute of Technology, Department of Computer Science
|
| Cristiano Giuffrida |
-
Vrije Universiteit Amsterdam, The Netherlands, Computer Science Institute
|
| Herbert Bos |
-
Vrije Universiteit Amsterdam, The Netherlands, Computer Science Institute
|
| Sharing: |
Unknown
|
| Verification: |
Authors have
not verified
information
|
| Artifact Evaluation Badge: |
none
|
| Artifact URLs: |
|
| Artifact Correspondence Email Addresses: |
|
| NSF Award Numbers: |
|
| DBLP Key: |
conf/uss/GoktasGKAPGB16
|
| Author Comments: |
|