A TRUSTED SAFETY VERIFIER FOR PROCESS CONTROLLER CODE
|
2020 |
McLaughlin, Stephen |
ROPECKER: A GENERIC AND PRACTICAL APPROACH FOR DEFENDING AGAINST ROP ATTACKS
|
2020 |
Cheng, Yueqiang |
SAFEDISPATCH: SECURING C++ VIRTUAL CALLS FROM MEMORY CORRUPTION ATTACKS
|
2020 |
Jang, Dongseok |
BREAKING AND FIXING ORIGIN-BASED ACCESS CONTROL IN HYBRID WEB/MOBILE APPLICATION FRAMEWORKS
|
2020 |
Georgiev, Martin |
TOWARD BLACK-BOX DETECTION OF LOGIC FLAWS IN WEB APPLICATIONS
|
2020 |
Pellegrino, Giancarlo |
MACAROONS: COOKIES WITH CONTEXTUAL CAVEATS FOR DECENTRALIZED AUTHORIZATION IN THE CLOUD
|
2020 |
Birgisson, Arnar |
PRIVACY THROUGH PSEUDONYMITY IN MOBILE TELEPHONY SYSTEMS
|
2020 |
Mancini, Loretta Ilaria |
TWO-FACTOR AUTHENTICATION RESILIENT TO SERVER COMPROMISE USING MIX-BANDWIDTH DEVICES
|
2020 |
Shirvanian, Maliheh |
LEVERAGING USB TO ESTABLISH HOST IDENTITY USING COMMODITY DEVICES
|
2020 |
Bates, Adam |
BOTCOIN: MONETIZING STOLEN CYCLES
|
2020 |
Huang, Danny Yuxing |
AIRBAG: BOOSTING SMARTPHONE RESISTANCE TO MALWARE INFECTION
|
2020 |
Wu, Chiachih |
APPSEALER: AUTOMATIC GENERATION OF VULNERABILITY-SPECIFIC PATCHES FOR PREVENTING COMPONENT HIJACKING ATTACKS IN ANDROID APPLICATIONS
|
2020 |
Zhang, Mu |
SMV-HUNTER: LARGE SCALE, AUTOMATED DETECTION OF SSL/TLS MAN-IN-THE-MIDDLE VULNERABILITIES IN ANDROID APPS
|
2020 |
Sounthiraraj, David |
GYRUS: A FRAMEWORK FOR USER-INTENT MONITORING OF TEXT-BASED NETWORKED APPLICATIONS
|
2020 |
Jang, Yeongjin |
WEB PKI: CLOSING THE GAP BETWEEN GUIDELINES AND PRACTICES
|
2020 |
Delignat-Lavaud, Antoine |
GAINING CONTROL OF CELLULAR TRAFFIC ACCOUNTING BY SPURIOUS TCP RETRANSMISSION
|
2020 |
Go, Younghwan |
CYBERPROBE: TOWARDS INTERNET-SCALE ACTIVE DETECTION OF MALICIOUS SERVERS
|
2020 |
Nappa, Antonio |
SCREENMILKER: HOW TO MILK YOUR ANDROID SCREEN FOR SECRETS
|
2020 |
Lin, Chia-Chi |
SIMULATION OF BUILT-IN PHP FEATURES FOR PRECISE STATIC CODE ANALYSIS
|
2020 |
Dahse, Johannes |
ENHANCED CERTIFICATE TRANSPARENCY AND END-TO-END ENCRYPTED MAIL
|
2020 |
Ryan, Mark D. |