GAINING CONTROL OF CELLULAR TRAFFIC ACCOUNTING BY SPURIOUS TCP RETRANSMISSION
|
2020 |
Go, Younghwan |
CYBERPROBE: TOWARDS INTERNET-SCALE ACTIVE DETECTION OF MALICIOUS SERVERS
|
2020 |
Nappa, Antonio |
SCREENMILKER: HOW TO MILK YOUR ANDROID SCREEN FOR SECRETS
|
2020 |
Lin, Chia-Chi |
SIMULATION OF BUILT-IN PHP FEATURES FOR PRECISE STATIC CODE ANALYSIS
|
2020 |
Dahse, Johannes |
ENHANCED CERTIFICATE TRANSPARENCY AND END-TO-END ENCRYPTED MAIL
|
2020 |
Ryan, Mark D. |
ON SEMANTIC PATTERNS OF PASSWORDS AND THEIR SECURITY IMPACT
|
2020 |
Veras, Rafael |
PRACTICAL DYNAMIC SEARCHABLE ENCRYPTION WITH SMALL LEAKAGE
|
2020 |
Stefanov, Emil |
AUTHENTICATION USING PULSE-RESPONSE BIOMETRICS
|
2020 |
Rasmussen, Kasper B. |
NAZCA: DETECTING MALWARE DISTRIBUTION IN LARGE-SCALE NETWORKS
|
2020 |
Invernizzi, Luca |
EXECUTE THIS! ANALYZING UNSAFE AND MALICIOUS DYNAMIC CODE LOADING IN ANDROID APPLICATIONS
|
2020 |
Poeplau, Sebastian |
EFFICIENT PRIVATE FILE RETRIEVAL BY COMBINING ORAM AND PIR
|
2020 |
Mayberry, Travis |
A TRUSTED SAFETY VERIFIER FOR PROCESS CONTROLLER CODE
|
2020 |
McLaughlin, Stephen |
ROPECKER: A GENERIC AND PRACTICAL APPROACH FOR DEFENDING AGAINST ROP ATTACKS
|
2020 |
Cheng, Yueqiang |
SAFEDISPATCH: SECURING C++ VIRTUAL CALLS FROM MEMORY CORRUPTION ATTACKS
|
2020 |
Jang, Dongseok |
BREAKING AND FIXING ORIGIN-BASED ACCESS CONTROL IN HYBRID WEB/MOBILE APPLICATION FRAMEWORKS
|
2020 |
Georgiev, Martin |
TOWARD BLACK-BOX DETECTION OF LOGIC FLAWS IN WEB APPLICATIONS
|
2020 |
Pellegrino, Giancarlo |
MACAROONS: COOKIES WITH CONTEXTUAL CAVEATS FOR DECENTRALIZED AUTHORIZATION IN THE CLOUD
|
2020 |
Birgisson, Arnar |
PRIVACY THROUGH PSEUDONYMITY IN MOBILE TELEPHONY SYSTEMS
|
2020 |
Mancini, Loretta Ilaria |
TWO-FACTOR AUTHENTICATION RESILIENT TO SERVER COMPROMISE USING MIX-BANDWIDTH DEVICES
|
2020 |
Shirvanian, Maliheh |
LEVERAGING USB TO ESTABLISH HOST IDENTITY USING COMMODITY DEVICES
|
2020 |
Bates, Adam |