ON THE MISMANAGEMENT AND MALICIOUSNESS OF NETWORKS
|
2020 |
Zhang, Jing |
AMPLIFICATION HELL: REVISITING NETWORK PROTOCOLS FOR DDOS ABUSE
|
2020 |
Rossow, Christian |
AVATAR: A FRAMEWORK TO SUPPORT DYNAMIC SECURITY ANALYSIS OF EMBEDDED SYSTEMS’ FIRMWARES
|
2020 |
Zaddach, Jonas |
SMARTPHONES AS PRACTICAL AND SECURE LOCATION VERIFICATION TOKENS FOR PAYMENTS
|
2020 |
Marforio, Claudio |
INSIDE JOB: UNDERSTANDING AND MITIGATING THE THREAT OF EXTERNAL DEVICE MIS-BINDING ON ANDROID
|
2020 |
Naveed, Muhammad |
DSPIN: DETECTING AUTOMATICALLY SPUN CONTENT ON THE WEB
|
2020 |
Zhang, Qing |
DETECTING LOGIC VULNERABILITIES IN E-COMMERCE APPLICATIONS
|
2020 |
Sun, Fangqi |
THE SNIPER ATTACK: ANONYMOUSLY DEANONYMIZING AND DISABLING THE TOR NETWORK
|
2020 |
Jansen, Rob |
FROM VERY WEAK TO VERY STRONG: ANALYZING PASSWORD-STRENGTH METERS
|
2020 |
Carnavalet, Xavier De Carné De |
DYNAMIC SEARCHABLE ENCRYPTION IN VERY-LARGE DATABASES: DATA STRUCTURES AND IMPLEMENTATION
|
2020 |
Cash, David |
HARDENING PERSONA - IMPROVING FEDERATED WEB LOGIN
|
2020 |
Dietz, Michael |
DECENTRALIZED ANONYMOUS CREDENTIALS
|
2020 |
Garman, Christina |
PLACEAVOIDER: STEERING FIRST-PERSON CAMERAS AWAY FROM SENSITIVE SPACES
|
2020 |
Templeman, Robert |
AUDITABLE VERSION CONTROL SYSTEMS
|
2020 |
Chen, Bo |
PRACTICAL ISSUES WITH TLS CLIENT CERTIFICATE AUTHENTICATION
|
2020 |
Parsovs, Arnis |
NEURAL SIGNATURES OF USER-CENTERED SECURITY: AN FMRI STUDY OF PHISHING, AND MALWARE WARNINGS
|
2020 |
Neupane, Ajaya |
A TRUSTED SAFETY VERIFIER FOR PROCESS CONTROLLER CODE
|
2020 |
McLaughlin, Stephen |
ROPECKER: A GENERIC AND PRACTICAL APPROACH FOR DEFENDING AGAINST ROP ATTACKS
|
2020 |
Cheng, Yueqiang |
SAFEDISPATCH: SECURING C++ VIRTUAL CALLS FROM MEMORY CORRUPTION ATTACKS
|
2020 |
Jang, Dongseok |
BREAKING AND FIXING ORIGIN-BASED ACCESS CONTROL IN HYBRID WEB/MOBILE APPLICATION FRAMEWORKS
|
2020 |
Georgiev, Martin |