YODA: ENABLING COMPUTATIONALLY INTENSIVE CONTRACTS ON BLOCKCHAINS WITH BYZANTINE AND SELFISH NODBES
|
2020 |
Das, Sourav |
MEASUREMENT AND ANALYSIS OF HAJIME, A PEER-TO-PEER IOT BOTNET
|
2020 |
Herwig, Stephen |
TEXTBUGGER: GENERATING ADVERSARIAL TEXT AGAINST REAL-WORLD APPLICATIONS
|
2020 |
Li, Jinfeng |
THE USE OF TLS IN CENSORSHIP CIRCUMVENTION
|
2020 |
Frolov, Sergey |
PERISCOPE: AN EFFECTIVE PROBING AND FUZZING FRAMEWORK FOR THE HARDWARE-OS BOUNDARY
|
2020 |
Song, Dokyung |
NAUTILUS: FISHING FOR DEEP BUGS WITH GRAMMARS
|
2020 |
Aschermann, Cornelius |
WE VALUE YOUR PRIVACY ... NOW TAKE SOME COOKIES: MEASURING THE GDPR'S IMPACT ON WEB PRIVACY
|
2020 |
Degeling, Martin |
GINSENG: KEEPING SECRETS IN REGISTERS WHEN YOU DISTRUST THE OPERATING SYSTEM
|
2020 |
Yun, Min Hong |
PLEASE FORGET WHERE I WAS LAST SUMMER: THE PRIVACY RISKS OF PUBLIC LOCATION (META)DATA
|
2020 |
Drakonakis, Kostas |
DON'T TRUST THE LOCALS: INVESTIGATING THE PREVALENCE OF PERSISTENT CLIENT-SIDE CROSS-SITE SCRIPTING IN THE NEW WILD
|
2020 |
Steffens, Marius |
TRANCO: A RESEARCH-ORIENTED TOP SITES RANKING HARDENED AGAINST MANIPULATION
|
2020 |
Pochat, Victor Le |
MATLS: HOW TO MAKE TLS MIDDLEBOX-AWARE?
|
2020 |
Lee, Hyunwoo |
SABRE: PROTECTING BITCOIN AGAINST ROUTING ATTACKS
|
2020 |
Apostolaki, Maria |
FINE-GRAINED AND CONTROLLED REWRITING IN BLOCKCHAINS: CHAMELEON-HASHING GONE ATTRIBUTE-BASED
|
2020 |
Derler, David |
CRACKING THE WALL OF CONFINEMENT: UNDERSTANDING AND ANALYZING MALICIOUS DOMAIN TAKE-DOWNS
|
2020 |
Alowaisheq, Eihal |
COUNTERING MALICIOUS PROCESSES WITH PROCESS-DNS ASSOCIATION
|
2020 |
Sivakorn, Suphannee |
NIC: DETECTING ADVERSARIAL SAMPLES WITH NEURAL NETWORK INVARIANT CHECKING
|
2020 |
Ma, Shiging |
SEND HARDEST PROBLEMS MY WAY: PROBABILISTIC PATH PRIORITIZATION FOR HYBRID FUZZING
|
2020 |
Zhao, Lei |
HOW BAD CAN IT GIT? CHARACTERIZING SECRET LEAKAGE IN PUBLIC GITHUB REPOSITORIES
|
2020 |
Meli, Michael |
MEASURING THE FACEBOOK ADVERTISING ECOSYSTEM
|
2020 |
Andreou, Athanasios |