GAINING CONTROL OF CELLULAR TRAFFIC ACCOUNTING BY SPURIOUS TCP RETRANSMISSION
|
2020 |
Go, Younghwan |
CYBERPROBE: TOWARDS INTERNET-SCALE ACTIVE DETECTION OF MALICIOUS SERVERS
|
2020 |
Nappa, Antonio |
SCREENMILKER: HOW TO MILK YOUR ANDROID SCREEN FOR SECRETS
|
2020 |
Lin, Chia-Chi |
SIMULATION OF BUILT-IN PHP FEATURES FOR PRECISE STATIC CODE ANALYSIS
|
2020 |
Dahse, Johannes |
ENHANCED CERTIFICATE TRANSPARENCY AND END-TO-END ENCRYPTED MAIL
|
2020 |
Ryan, Mark D. |
ON SEMANTIC PATTERNS OF PASSWORDS AND THEIR SECURITY IMPACT
|
2020 |
Veras, Rafael |
PRACTICAL DYNAMIC SEARCHABLE ENCRYPTION WITH SMALL LEAKAGE
|
2020 |
Stefanov, Emil |
AUTHENTICATION USING PULSE-RESPONSE BIOMETRICS
|
2020 |
Rasmussen, Kasper B. |
NAZCA: DETECTING MALWARE DISTRIBUTION IN LARGE-SCALE NETWORKS
|
2020 |
Invernizzi, Luca |
EXECUTE THIS! ANALYZING UNSAFE AND MALICIOUS DYNAMIC CODE LOADING IN ANDROID APPLICATIONS
|
2020 |
Poeplau, Sebastian |
EFFICIENT PRIVATE FILE RETRIEVAL BY COMBINING ORAM AND PIR
|
2020 |
Mayberry, Travis |
ON THE MISMANAGEMENT AND MALICIOUSNESS OF NETWORKS
|
2020 |
Zhang, Jing |
AMPLIFICATION HELL: REVISITING NETWORK PROTOCOLS FOR DDOS ABUSE
|
2020 |
Rossow, Christian |
AVATAR: A FRAMEWORK TO SUPPORT DYNAMIC SECURITY ANALYSIS OF EMBEDDED SYSTEMS’ FIRMWARES
|
2020 |
Zaddach, Jonas |
SMARTPHONES AS PRACTICAL AND SECURE LOCATION VERIFICATION TOKENS FOR PAYMENTS
|
2020 |
Marforio, Claudio |
INSIDE JOB: UNDERSTANDING AND MITIGATING THE THREAT OF EXTERNAL DEVICE MIS-BINDING ON ANDROID
|
2020 |
Naveed, Muhammad |
DSPIN: DETECTING AUTOMATICALLY SPUN CONTENT ON THE WEB
|
2020 |
Zhang, Qing |
DETECTING LOGIC VULNERABILITIES IN E-COMMERCE APPLICATIONS
|
2020 |
Sun, Fangqi |
THE SNIPER ATTACK: ANONYMOUSLY DEANONYMIZING AND DISABLING THE TOR NETWORK
|
2020 |
Jansen, Rob |
FROM VERY WEAK TO VERY STRONG: ANALYZING PASSWORD-STRENGTH METERS
|
2020 |
Carnavalet, Xavier De Carné De |