WHAT YOU CORRUPT IS NOT YOU CRASH: CHALLENGES IN FUZZING EMBEDDED DEVICES
|
2020 |
Muench, Marius |
EXPOSING CONGESTION ATTACK ON EMERGING CONNECTED VEHICLE BASED TRAFFIC SIGNAL CONTROL
|
2020 |
Chen, Qi Alfred |
DIDN'T YOU HEAR ME? – TOWARDS MORE SUCCESSFUL WEB VULNERABILITY NOTIFICATIONS
|
2020 |
Stock, Ben |
REMOVING SECRETS FROM ANDROID'S TLS
|
2020 |
Lee, Jaeho |
AUTOMATED ATTACK DISCOVERY IN TCP CONGESTION CONTROL USING A MODEL-GUIDED APPROACH
|
2020 |
Jero, Samuel |
LTEINSPECTOR: A SYSTEMATIC APPROACH FOR ADVERSARIAL TESTING OF 4G LTE
|
2020 |
Hussain, Syed Rafiul |
A SECURITY ANALYSIS OF HONEYWORDS
|
2020 |
Wang, Ding |
KITSUNE: AN ENSEMBLE OF AUTOENCODERS FOR ONLINE NETWORK INTRUSION DETECTION
|
2020 |
Mirsky, Yisroel |
K-MEANS++ VS. BEHAVIORAL BIOMETRICS: ONE LOOP TO RULE THEM ALL
|
2020 |
Negi, Parimarjan |
TROJANING ATTACK ON NEURAL NETWORKS
|
2020 |
Liu, Yingqi |
ABC: ENABLING SMARTPHONE AUTHENTICATION WITH BUILT-IN CAMERA
|
2020 |
Ba, Zhongjie |
MEASURING AND DISRUPTING ANTI-ADBLOCKERS USING DIFFERENTIAL EXECUTION ANALYSIS
|
2020 |
Zhu, Shitong |
A LARGE-SCALE ANALYSIS OF CONTENT MODIFICATION BY OPEN HTTP PROXIES
|
2020 |
Tsirantonakis, Giorgos |
KEYDROWN: ELIMINATING SOFTWARE-BASED KEYSTROKE TIMING SIDE-CHANNEL ATTACKS
|
2020 |
Schwarz, Michael |
RTCAPTCHA: A REAL-TIME CAPTCHA BASED LIVENESS DETECTION SYSTEM
|
2020 |
Uzun, Erkam |
MIND YOUR KEYS? A SECURITY EVALUATION OF JAVA KEYSTORES
|
2020 |
Focardi, Riccardo |
FEATURE SQUEEZING: DETECTING ADVERSARIAL EXAMPLES IN DEEP NEURAL NETWORKS
|
2020 |
Xu, Weilin |
DEVICE PAIRING AT THE TOUCH OF AN ELECTRODE
|
2020 |
Roeschlin, Marc |
FACE FLASHING: A SECURE LIVENESS DETECTION PROTOCOL BASED ON LIGHT REFLECTIONS
|
2020 |
Tang, Di |
TOWARDS MEASURING THE EFFECTIVENESS OF TELEPHONY BLACKLISTS
|
2020 |
Pandit, Sharbani |