BLAG: IMPROVING THE ACCURACY OF BLACKLISTS
|
2020 |
Ramanathan, Sivaramakrishnan |
REVISITING LEAKAGE ABUSE ATTACKS
|
2020 |
Blackstone, Laura |
METAL: A METADATA-HIDING FILE-SHARING SYSTEM
|
2020 |
Chen, Weikeng |
DYNAMIC SEARCHABLE ENCRYPTION WITH SMALL CLIENT STORAGE
|
2020 |
Demertzis, Ioannis |
IMPA4GT: IMPERSONATION ATTACKS IN 4G NETWORKS
|
2020 |
Rupprecht, David |
DEEPBINDIFF: LEARNING PROGRAM-WIDE CODE REPRESENTATIONS FOR BINARY DIFFING
|
2020 |
Duan, Yue |
PRECISELY CHARACTERIZING SECURITY IMPACT IN A FLOOD OF PATCHES VIA SYMBOLIC RULE COMPARISON
|
2020 |
Wu, Qiushi |
OMEGALOG: HIGH-FIDELITY ATTACK INVESTIGATION VIA TRANSPARENT MULTI-LAYER LOG ANALYSIS
|
2020 |
Hassan, Wajih Ul |
TRIDENT: EFFICIENT 4PC FRAMEWORK FOR PRIVACY PRESERVING MACHINE LEARNING
|
2020 |
Chaudhari, Harsh |
WHEN MALWARE IS PACKIN' HEAT; LIMITS OF MACHINE LEARNING CLASSIFIERS BASED ON STATIC ANALYSIS FEATURES
|
2020 |
Aghakhani, Hojjat |
COMPLEX SECURITY POLICY? A LONGITUDINAL ANALYSIS OF DEPLOYED CONTENT SECURITY POLICIES
|
2020 |
Roth, Sebastian |
PROOF OF STORAGE-TIME: EFFICIENTLY CHECKING CONTINUOUS DATA AVAILABILTIY
|
2020 |
Ateniese, Giuseppe |
TOWARDS PLAUSIBLE GRAPH ANONYMIZATION
|
2020 |
Zhang, Yang |
DESENSITIZATION: PRIVACY-AWARE AND ATTACK-PRESERVING CRASH REPORT
|
2020 |
Ding, Ren |
DEFREC: ESTABLISHING PHYSICAL FUNCTION VIRTUALIZATION TO DISRUPT RECONNAISSANCE OF POWER GRIDS' CYBER-PHYSICAL INFRASTRUCTURES
|
2020 |
Lin, Hui |
YOU ARE WHAT YOU DO: HUNTING STEALTHY MALWARE VIA DATA PROVENANCE ANALYSIS
|
2020 |
Wang, Qi |
STRONG AUTHENTICATION WITHOUT TEMPER-RESISTANT HARDWARE AND APPLICATION TO FEDERATED IDENTITIES
|
2020 |
Zhang, Zhenfeng |
COMPLIANCE CAUTIONS: INVESTIGATING SECURITY ISSUES ASSOCIATED WITH U.S. DIGITAL-SECURITY STANDARDS
|
2020 |
Stevens, Rock |
SPEECHMINER: A FRAMEWORK FOR INVESTIGATING AND MEASURING SPECULATIVE EXECUTION VULNERABILITIES
|
2020 |
Xiao, Yuan |
CONTEXT: A GENERIC APPROACH FOR MITIGATING SPECTRE
|
2020 |
Schwarz, Michael |