NO DIRECTION HOME: THE TRUE COST OF ROUTING AROUND DECOYS
|
2020 |
Houmansadr, Amir |
HYBRID-BRIDGE: EFFICIENTLY BRIDGING THE SEMANTIC-GAP IN VMI VIA DECOUPLED EXECUTION AND TRAINING MEMOIZATION
|
2020 |
Saberi, Alireza |
ACCELPRINT: IMPERFECTIONS OF ACCELEROMETERS MAKE SMARTPHONES TRACKABLE
|
2020 |
Dey, Sanorita |
PRIVACY-PRESERVING DISTRIBUTED STREAM MONITORING
|
2020 |
Friedman, Arik |
THE TANGLED WEB OF PASSWORD REUSE
|
2020 |
Das, Anupam |
SELLING OFF USER PRIVACY AT AUCTION
|
2020 |
Castelluccia, Claude |
COPKER: COMPUTING WITH PRIVATE KEYS WITHOUT RAM
|
2020 |
Guan, Le |
POWER ATTACK: AN INCREASING THREAT TO DATA CENTERS
|
2020 |
Xu, Zhang |
SCAMBAITER: UNDERSTANDING TARGETED NIGERIAN SCAMS ON CRAIGSLIST
|
2020 |
Park, Youngsam |
A MACHINE-LEARNING APPROACH FOR CLASSIFYING AND CATEGORIZING ANDROID SOURCES AND SINKS
|
2020 |
Arzt, Steven |
PERSISTENT DATA-ONLY MALWARE: FUNCTION HOOKS WITHOUT CODE
|
2020 |
Vogl, Sebastian |
DREBIN: EFFECTIVE AND EXPLAINABLE DETECTION OF ANDROID MALWARE IN YOUR POCKET
|
2020 |
Arp, Daniel |
PRACTICAL KNOWN-PLAINTEXT ATTACKS AGAINST PHYSICAL LAYER SECURITY IN WIRELESS MIMO SYSTEMS
|
2020 |
Schulz, Matthias |
GAINING CONTROL OF CELLULAR TRAFFIC ACCOUNTING BY SPURIOUS TCP RETRANSMISSION
|
2020 |
Go, Younghwan |
CYBERPROBE: TOWARDS INTERNET-SCALE ACTIVE DETECTION OF MALICIOUS SERVERS
|
2020 |
Nappa, Antonio |
SCREENMILKER: HOW TO MILK YOUR ANDROID SCREEN FOR SECRETS
|
2020 |
Lin, Chia-Chi |
SIMULATION OF BUILT-IN PHP FEATURES FOR PRECISE STATIC CODE ANALYSIS
|
2020 |
Dahse, Johannes |
ENHANCED CERTIFICATE TRANSPARENCY AND END-TO-END ENCRYPTED MAIL
|
2020 |
Ryan, Mark D. |
ON SEMANTIC PATTERNS OF PASSWORDS AND THEIR SECURITY IMPACT
|
2020 |
Veras, Rafael |
PRACTICAL DYNAMIC SEARCHABLE ENCRYPTION WITH SMALL LEAKAGE
|
2020 |
Stefanov, Emil |