GAINING CONTROL OF CELLULAR TRAFFIC ACCOUNTING BY SPURIOUS TCP RETRANSMISSION
|
2020 |
Go, Younghwan |
CYBERPROBE: TOWARDS INTERNET-SCALE ACTIVE DETECTION OF MALICIOUS SERVERS
|
2020 |
Nappa, Antonio |
SCREENMILKER: HOW TO MILK YOUR ANDROID SCREEN FOR SECRETS
|
2020 |
Lin, Chia-Chi |
SIMULATION OF BUILT-IN PHP FEATURES FOR PRECISE STATIC CODE ANALYSIS
|
2020 |
Dahse, Johannes |
ENHANCED CERTIFICATE TRANSPARENCY AND END-TO-END ENCRYPTED MAIL
|
2020 |
Ryan, Mark D. |
ON SEMANTIC PATTERNS OF PASSWORDS AND THEIR SECURITY IMPACT
|
2020 |
Veras, Rafael |
PRACTICAL DYNAMIC SEARCHABLE ENCRYPTION WITH SMALL LEAKAGE
|
2020 |
Stefanov, Emil |
AUTHENTICATION USING PULSE-RESPONSE BIOMETRICS
|
2020 |
Rasmussen, Kasper B. |
NAZCA: DETECTING MALWARE DISTRIBUTION IN LARGE-SCALE NETWORKS
|
2020 |
Invernizzi, Luca |
EXECUTE THIS! ANALYZING UNSAFE AND MALICIOUS DYNAMIC CODE LOADING IN ANDROID APPLICATIONS
|
2020 |
Poeplau, Sebastian |
EFFICIENT PRIVATE FILE RETRIEVAL BY COMBINING ORAM AND PIR
|
2020 |
Mayberry, Travis |
NO DIRECTION HOME: THE TRUE COST OF ROUTING AROUND DECOYS
|
2020 |
Houmansadr, Amir |
HYBRID-BRIDGE: EFFICIENTLY BRIDGING THE SEMANTIC-GAP IN VMI VIA DECOUPLED EXECUTION AND TRAINING MEMOIZATION
|
2020 |
Saberi, Alireza |
ACCELPRINT: IMPERFECTIONS OF ACCELEROMETERS MAKE SMARTPHONES TRACKABLE
|
2020 |
Dey, Sanorita |
PRIVACY-PRESERVING DISTRIBUTED STREAM MONITORING
|
2020 |
Friedman, Arik |
THE TANGLED WEB OF PASSWORD REUSE
|
2020 |
Das, Anupam |
SELLING OFF USER PRIVACY AT AUCTION
|
2020 |
Castelluccia, Claude |
COPKER: COMPUTING WITH PRIVATE KEYS WITHOUT RAM
|
2020 |
Guan, Le |
POWER ATTACK: AN INCREASING THREAT TO DATA CENTERS
|
2020 |
Xu, Zhang |
SCAMBAITER: UNDERSTANDING TARGETED NIGERIAN SCAMS ON CRAIGSLIST
|
2020 |
Park, Youngsam |