GEO-LOCATING DRIVERS: A STUDY OF SENSITIVE DATA LEAKAGE IN RIDE-HAILING SERVICES

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Network and Distributed System Security Symposium (26. : 2019 : San Diego, Calif.) Network and Distributed System Security Symposium 2019 ; Volume 1 of 2
1. Verfasser: Zhao, Qingchuan (VerfasserIn)
Weitere Verfasser: Zuo, Chaoshun (VerfasserIn), Pellegrino, Giancarlo (VerfasserIn), Lin, Zhiqiang (VerfasserIn)
Pages:2019
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
GINSENG: KEEPING SECRETS IN REGISTERS WHEN YOU DISTRUST THE OPERATING SYSTEM 2020 Yun, Min Hong
PLEASE FORGET WHERE I WAS LAST SUMMER: THE PRIVACY RISKS OF PUBLIC LOCATION (META)DATA 2020 Drakonakis, Kostas
DON'T TRUST THE LOCALS: INVESTIGATING THE PREVALENCE OF PERSISTENT CLIENT-SIDE CROSS-SITE SCRIPTING IN THE NEW WILD 2020 Steffens, Marius
TRANCO: A RESEARCH-ORIENTED TOP SITES RANKING HARDENED AGAINST MANIPULATION 2020 Pochat, Victor Le
MATLS: HOW TO MAKE TLS MIDDLEBOX-AWARE? 2020 Lee, Hyunwoo
SABRE: PROTECTING BITCOIN AGAINST ROUTING ATTACKS 2020 Apostolaki, Maria
FINE-GRAINED AND CONTROLLED REWRITING IN BLOCKCHAINS: CHAMELEON-HASHING GONE ATTRIBUTE-BASED 2020 Derler, David
CRACKING THE WALL OF CONFINEMENT: UNDERSTANDING AND ANALYZING MALICIOUS DOMAIN TAKE-DOWNS 2020 Alowaisheq, Eihal
COUNTERING MALICIOUS PROCESSES WITH PROCESS-DNS ASSOCIATION 2020 Sivakorn, Suphannee
NIC: DETECTING ADVERSARIAL SAMPLES WITH NEURAL NETWORK INVARIANT CHECKING 2020 Ma, Shiging
SEND HARDEST PROBLEMS MY WAY: PROBABILISTIC PATH PRIORITIZATION FOR HYBRID FUZZING 2020 Zhao, Lei
HOW BAD CAN IT GIT? CHARACTERIZING SECRET LEAKAGE IN PUBLIC GITHUB REPOSITORIES 2020 Meli, Michael
MEASURING THE FACEBOOK ADVERTISING ECOSYSTEM 2020 Andreou, Athanasios
DNS CACHE-BASED USER TRACKING 2020 Klein, Amit
YODA: ENABLING COMPUTATIONALLY INTENSIVE CONTRACTS ON BLOCKCHAINS WITH BYZANTINE AND SELFISH NODBES 2020 Das, Sourav
MEASUREMENT AND ANALYSIS OF HAJIME, A PEER-TO-PEER IOT BOTNET 2020 Herwig, Stephen
TEXTBUGGER: GENERATING ADVERSARIAL TEXT AGAINST REAL-WORLD APPLICATIONS 2020 Li, Jinfeng
THE USE OF TLS IN CENSORSHIP CIRCUMVENTION 2020 Frolov, Sergey
PERISCOPE: AN EFFECTIVE PROBING AND FUZZING FRAMEWORK FOR THE HARDWARE-OS BOUNDARY 2020 Song, Dokyung
NAUTILUS: FISHING FOR DEEP BUGS WITH GRAMMARS 2020 Aschermann, Cornelius
Alle Artikel auflisten