A Formal Security Analysis of Session Resumption Across Hostnames
|
2021 |
Gellert, Kai |
PoW-How: An Enduring Timing Side-Channel to Evade Online Malware Sandboxes
|
2021 |
Nappa, Antonio |
Rope: Covert Multi-process Malware Execution with Return-Oriented Programming
|
2021 |
D’Elia, Daniele Cono |
Detecting Video-Game Injectors Exchanged in Game Cheating Communities
|
2021 |
Karkallis, Panicos |
Revocable Policy-Based Chameleon Hash
|
2021 |
Xu, Shengmin |
MediSC: Towards Secure and Lightweight Deep Learning as a Medical Diagnostic Service
|
2021 |
Liu, Xiaoning |
Common Component in Black-Boxes Is Prone to Attacks
|
2021 |
Zhang, Jiyi |
More Efficient Post-quantum KEMTLS with Pre-distributed Public Keys
|
2021 |
Schwabe, Peter |
How to (Legally) Keep Secrets from Mobile Operators
|
2021 |
Arfaoui, Ghada |
Caught in the Web: DoS Vulnerabilities in Parsers for Structured Data
|
2021 |
Rasheed, Shawn |
Peeler: Profiling Kernel-Level Events to Detect Ransomware
|
2021 |
Ahmed, Muhammad Ejaz |
Mingling of Clear and Muddy Water: Understanding and Detecting Semantic Confusion in Blackhat SEO
|
2021 |
Yang, Hao |
An Explainable Online Password Strength Estimator
|
2021 |
David, Liron |
Succinct Scriptable NIZK via Trusted Hardware
|
2021 |
Zhang, Bingsheng |
CONTRA: Defending Against Poisoning Attacks in Federated Learning
|
2021 |
Awan, Sana |
TAFA: A Task-Agnostic Fingerprinting Algorithm for Neural Networks
|
2021 |
Pan, Xudong |
CAN-SQUARE - Decimeter Level Localization of Electronic Control Units on CAN Buses
|
2021 |
Groza, Bogdan |
webFuzz: Grey-Box Fuzzing for Web Applications
|
2021 |
Rooij, Orpheas van |
Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains
|
2021 |
Schloegel, Moritz |
MiniLedger: Compact-Sized Anonymous and Auditable Distributed Payments
|
2021 |
Chatzigiannis, Panagiotis |