BLAG: IMPROVING THE ACCURACY OF BLACKLISTS
|
2020 |
Ramanathan, Sivaramakrishnan |
REVISITING LEAKAGE ABUSE ATTACKS
|
2020 |
Blackstone, Laura |
METAL: A METADATA-HIDING FILE-SHARING SYSTEM
|
2020 |
Chen, Weikeng |
DYNAMIC SEARCHABLE ENCRYPTION WITH SMALL CLIENT STORAGE
|
2020 |
Demertzis, Ioannis |
IMPA4GT: IMPERSONATION ATTACKS IN 4G NETWORKS
|
2020 |
Rupprecht, David |
DEEPBINDIFF: LEARNING PROGRAM-WIDE CODE REPRESENTATIONS FOR BINARY DIFFING
|
2020 |
Duan, Yue |
PRECISELY CHARACTERIZING SECURITY IMPACT IN A FLOOD OF PATCHES VIA SYMBOLIC RULE COMPARISON
|
2020 |
Wu, Qiushi |
OMEGALOG: HIGH-FIDELITY ATTACK INVESTIGATION VIA TRANSPARENT MULTI-LAYER LOG ANALYSIS
|
2020 |
Hassan, Wajih Ul |
TRIDENT: EFFICIENT 4PC FRAMEWORK FOR PRIVACY PRESERVING MACHINE LEARNING
|
2020 |
Chaudhari, Harsh |
WHEN MALWARE IS PACKIN' HEAT; LIMITS OF MACHINE LEARNING CLASSIFIERS BASED ON STATIC ANALYSIS FEATURES
|
2020 |
Aghakhani, Hojjat |
COMPLEX SECURITY POLICY? A LONGITUDINAL ANALYSIS OF DEPLOYED CONTENT SECURITY POLICIES
|
2020 |
Roth, Sebastian |
PROOF OF STORAGE-TIME: EFFICIENTLY CHECKING CONTINUOUS DATA AVAILABILTIY
|
2020 |
Ateniese, Giuseppe |
TOWARDS PLAUSIBLE GRAPH ANONYMIZATION
|
2020 |
Zhang, Yang |
DESENSITIZATION: PRIVACY-AWARE AND ATTACK-PRESERVING CRASH REPORT
|
2020 |
Ding, Ren |
EASI: EDGE-BASED SENDER IDENTIFICATION ON RESOURCE-CONSTRAINED PLATFORMS FOR AUTOMOTIVE NETWORKS
|
2020 |
Kneib, Marcel |
MACAO: A MALICIOUSLY-SECURE AND CLIENT-EFFICIENT ACTIVE ORAM
|
2020 |
Hoang, Thang |
HETEROGENEOUS PRIVATE INFORMATION RETRIEVAL
|
2020 |
Mozaffari, Hamid |
CDN JUDO: BREAKING THE CDN DOS PROTECTION WITH ITSELF
|
2020 |
Guo, Run |
UNICORN: RUNTIME PROVENANCE-BASED DETECTOR FOR ADVANCED PERSISTENT THREATS
|
2020 |
Han, Xueyuan |
SECURE SUBLINEAR TIME DIFFERENTIALLY PRIVATE MEDIAN COMPUTATION
|
2020 |
Böhler, Jonas |