BLAG: IMPROVING THE ACCURACY OF BLACKLISTS
|
2020 |
Ramanathan, Sivaramakrishnan |
REVISITING LEAKAGE ABUSE ATTACKS
|
2020 |
Blackstone, Laura |
METAL: A METADATA-HIDING FILE-SHARING SYSTEM
|
2020 |
Chen, Weikeng |
DYNAMIC SEARCHABLE ENCRYPTION WITH SMALL CLIENT STORAGE
|
2020 |
Demertzis, Ioannis |
IMPA4GT: IMPERSONATION ATTACKS IN 4G NETWORKS
|
2020 |
Rupprecht, David |
DEEPBINDIFF: LEARNING PROGRAM-WIDE CODE REPRESENTATIONS FOR BINARY DIFFING
|
2020 |
Duan, Yue |
PRECISELY CHARACTERIZING SECURITY IMPACT IN A FLOOD OF PATCHES VIA SYMBOLIC RULE COMPARISON
|
2020 |
Wu, Qiushi |
OMEGALOG: HIGH-FIDELITY ATTACK INVESTIGATION VIA TRANSPARENT MULTI-LAYER LOG ANALYSIS
|
2020 |
Hassan, Wajih Ul |
TRIDENT: EFFICIENT 4PC FRAMEWORK FOR PRIVACY PRESERVING MACHINE LEARNING
|
2020 |
Chaudhari, Harsh |
WHEN MALWARE IS PACKIN' HEAT; LIMITS OF MACHINE LEARNING CLASSIFIERS BASED ON STATIC ANALYSIS FEATURES
|
2020 |
Aghakhani, Hojjat |
COMPLEX SECURITY POLICY? A LONGITUDINAL ANALYSIS OF DEPLOYED CONTENT SECURITY POLICIES
|
2020 |
Roth, Sebastian |
PROOF OF STORAGE-TIME: EFFICIENTLY CHECKING CONTINUOUS DATA AVAILABILTIY
|
2020 |
Ateniese, Giuseppe |
TOWARDS PLAUSIBLE GRAPH ANONYMIZATION
|
2020 |
Zhang, Yang |
DESENSITIZATION: PRIVACY-AWARE AND ATTACK-PRESERVING CRASH REPORT
|
2020 |
Ding, Ren |
WITHDRAWING THE BGP RE-ROUTING CURTAIN: UNDERSTANDING THE SECURITY IMPACT OF BGP POISONING THROUGH REAL-WORLD MEASUREMENTS
|
2020 |
Smith, Jared M. |
PRACTICAL TRAFFIC ANALYSIS ATTACKS ON SECURE MESSAGING APPLICATIONS
|
2020 |
Bahramali, Alireza |
CUSTOS: PRACTICAL TAMPER-EVIDENT AUDITING OF OPERATING SYSTEMS USING TRUSTED EXECUTION
|
2020 |
Paccagnella, Riccardo |
BLAZE: BLAZING FAST PRIVACY-PRESERVING MACHINE LEARNING
|
2020 |
Patra, Arpita |
PREVALENCE AND IMPACT OF LOW-ENTROPY PACKING SCHEMES IN THE MALWARE ECOSYSTEM
|
2020 |
Mantovani, Alessandro |
ON THE RESILIENCE OF BIOMETRIC AUTHENTICATION SYSTEMS AGAINST RANDOM INPUTS
|
2020 |
Zhao, Benjamin Zi Hao |