NO DIRECTION HOME: THE TRUE COST OF ROUTING AROUND DECOYS
|
2020 |
Houmansadr, Amir |
HYBRID-BRIDGE: EFFICIENTLY BRIDGING THE SEMANTIC-GAP IN VMI VIA DECOUPLED EXECUTION AND TRAINING MEMOIZATION
|
2020 |
Saberi, Alireza |
ACCELPRINT: IMPERFECTIONS OF ACCELEROMETERS MAKE SMARTPHONES TRACKABLE
|
2020 |
Dey, Sanorita |
PRIVACY-PRESERVING DISTRIBUTED STREAM MONITORING
|
2020 |
Friedman, Arik |
THE TANGLED WEB OF PASSWORD REUSE
|
2020 |
Das, Anupam |
SELLING OFF USER PRIVACY AT AUCTION
|
2020 |
Castelluccia, Claude |
COPKER: COMPUTING WITH PRIVATE KEYS WITHOUT RAM
|
2020 |
Guan, Le |
POWER ATTACK: AN INCREASING THREAT TO DATA CENTERS
|
2020 |
Xu, Zhang |
SCAMBAITER: UNDERSTANDING TARGETED NIGERIAN SCAMS ON CRAIGSLIST
|
2020 |
Park, Youngsam |
A MACHINE-LEARNING APPROACH FOR CLASSIFYING AND CATEGORIZING ANDROID SOURCES AND SINKS
|
2020 |
Arzt, Steven |
PERSISTENT DATA-ONLY MALWARE: FUNCTION HOOKS WITHOUT CODE
|
2020 |
Vogl, Sebastian |
DREBIN: EFFECTIVE AND EXPLAINABLE DETECTION OF ANDROID MALWARE IN YOUR POCKET
|
2020 |
Arp, Daniel |
PRACTICAL KNOWN-PLAINTEXT ATTACKS AGAINST PHYSICAL LAYER SECURITY IN WIRELESS MIMO SYSTEMS
|
2020 |
Schulz, Matthias |
A TRUSTED SAFETY VERIFIER FOR PROCESS CONTROLLER CODE
|
2020 |
McLaughlin, Stephen |
ROPECKER: A GENERIC AND PRACTICAL APPROACH FOR DEFENDING AGAINST ROP ATTACKS
|
2020 |
Cheng, Yueqiang |
SAFEDISPATCH: SECURING C++ VIRTUAL CALLS FROM MEMORY CORRUPTION ATTACKS
|
2020 |
Jang, Dongseok |
BREAKING AND FIXING ORIGIN-BASED ACCESS CONTROL IN HYBRID WEB/MOBILE APPLICATION FRAMEWORKS
|
2020 |
Georgiev, Martin |
TOWARD BLACK-BOX DETECTION OF LOGIC FLAWS IN WEB APPLICATIONS
|
2020 |
Pellegrino, Giancarlo |
MACAROONS: COOKIES WITH CONTEXTUAL CAVEATS FOR DECENTRALIZED AUTHORIZATION IN THE CLOUD
|
2020 |
Birgisson, Arnar |
PRIVACY THROUGH PSEUDONYMITY IN MOBILE TELEPHONY SYSTEMS
|
2020 |
Mancini, Loretta Ilaria |