EFFICIENT PRIVATE STATISTICS WITH SUCCINCT SKETCHES
|
2020 |
Melis, Luca |
DEPENDENCE MAKES YOU VULNERABLE: DIFFERENTIAL PRIVACY UNDER DEPENDENT TUPLES
|
2020 |
Liu, Changchang |
LINKMIRAGE: ENABLING PRIVACY-PRESERVING ANALYTICS ON SOCIAL RELATIONSHIPS
|
2020 |
Liu, Changchang |
MEASURING AND MITIGATING AS-LEVEL ADVERSARIES AGAINST TOR
|
2020 |
Nithyanand, Rishab |
WEBSITE FINGERPRINTING AT INTERNET SCALE
|
2020 |
Panchenko, Andriy |
WHEN A TREE FALLS: USING DIVERSITY IN ENSEMBLE CLASSIFIERS TO IDENTIFY EVASION IN MALWARE DETECTORS
|
2020 |
Smutz, Charles |
FLEXDROID: ENFORCING IN-APP PRIVILEGE SEPARATION IN ANDROID
|
2020 |
Seo, Jaebaek |
CACHE, TRIGGER, IMPERSONATE: ENABLING CONTEXT-SENSITIVE HONEYCLIENT ANALYSIS ON-THE-WIRE
|
2020 |
Taylor, Teryl |
HOW TO MAKE ASLR WIN THE CLONE WARS: RUNTIME RE-RANDOMIZATION
|
2020 |
Lu, Kangjie |
WHO ARE YOU? A STATISTICAL APPROACH TO MEASURING USER AUTHENTICITY
|
2020 |
Freeman, David |
VISIBLE: VIDEO-ASSISTED KEYSTROKE INFERENCE FROM TABLET BACKSIDE MOTION
|
2020 |
Sun, Jingchao |
WHO’S IN CONTROL OF YOUR CONTROL SYSTEM? DEVICE FINGERPRINTING FOR CYBER-PHYSICAL SYSTEMS
|
2020 |
Formby, David |
OPENSGX: AN OPEN PLATFORM FOR SGX RESEARCH
|
2020 |
Jain, Prerit |
PRIVACY-PRESERVING SHORTEST PATH COMPUTATION
|
2020 |
Wu, David J. |
AUTOMATICALLY EVADING CLASSIFIERS: A CASE STUDY ON PDF MALWARE CLASSIFIERS
|
2020 |
Xu, Weilin |
LO-PHI: LOW-OBSERVABLE PHYSICAL HOST INSTRUMENTATION FOR MALWARE ANALYSIS
|
2020 |
Spensky, Chad |
LEAKAGE-RESILIENT LAYOUT RANDOMIZATION FOR MOBILE DEVICES
|
2020 |
Braden, Kjell |
KRATOS: DISCOVERING INCONSISTENT SECURITY POLICY ENFORCEMENT IN THE ANDROID FRAMEWORK
|
2020 |
Shao, Yuru |
ENFORCING KERNEL SECURITY INVARIANTS WITH DATA FLOW INTEGRITY
|
2020 |
Song, Chengyu |
DIFFERENTIALLY PRIVATE PASSWORD FREQUENCY LISTS
|
2020 |
Blocki, Jeremiah |