ATTACKING THE NETWORK TIME PROTOCOL
|
2020 |
Malhotra, Aanchal |
SPIFFY: INDUCING COST-DETECTABILITY TRADEOFFS FOR PERSISTENT LINK-FLOODING ATTACKS
|
2020 |
Kang, Min Suk |
PROTECTING C++ DYNAMIC DISPATCH THROUGH VTABLE INTERLEAVING
|
2020 |
Bounov, Dimitar |
TRANSCRIPT COLLISION ATTACKS: BREAKING AUTHENTICATION IN TLS, IKE AND SSH
|
2020 |
Bhargavan, Karthikeyan |
KILLED BY PROXY: ANALYZING CLIENT-END TLS INTERCEPTION SOFTWARE
|
2020 |
Carnavalet, Xavier De Carné De |
DON'T FORGET TO LOCK THE BACK DOOR! A CHARACTERIZATION OF IPV6 NETWORK SECURITY POLICY
|
2020 |
Czyz, Jakub |
ARE THESE ADS SAFE: DETECTING HIDDEN ATTACKS THROUGH THE MOBILE APP-WEB INTERFACES
|
2020 |
Rastogi, Vaibhav |
ATTACK PATTERNS FOR BLACK-BOX SECURITY TESTING OF MULTI-PARTY WEB APPLICATIONS
|
2020 |
Sudhodanan, Avinash |
FORWARDING-LOOP ATTACKS IN CONTENT DELIVERY NETWORKS
|
2020 |
Chen, Jianjun |
EQUIHASH: ASYMMETRIC PROOF-OF-WORK BASED ON THE GENERALIZED BIRTHDAY PROBLEM
|
2020 |
Biryukov, Alex |
THE PRICE OF FREE: PRIVACY LEAKAGE IN PERSONALIZED MOBILE IN-APPS ADS
|
2020 |
Meng, Wei |
TRACKING MOBILE WEB USERS THROUGH MOTION SENSORS: ATTACKS AND DEFENSES
|
2020 |
Das, Anupam |
TOWARDS AUTOMATED DYNAMIC ANALYSIS FOR LINUX-BASED EMBEDDED FIRMWARE
|
2020 |
Chen, Daming D. |
VTRUST: REGAINING TRUST ON VIRTUAL CALLS
|
2020 |
Zhang, Chao |
TLS IN THE WILD: AN INTERNET-WIDE ANALYSIS OF TLS-BASED PROTOCOLS FOR ELECTRONIC COMMUNICATION
|
2020 |
Holz, Ralph |
IT'S FREE FOR A REASON: EXPLORING THE ECOSYSTEM OF FREE LIVE STREAMING SERVICES
|
2020 |
Rafique, M. Zubair |
CROSSFIRE: AN ANALYSIS OF FIREFOX EXTENSION-REUSE VULNERABILITIES
|
2020 |
Buyukkayhan, Ahmet |
TOWARDS SDN-DEFINED PROGRAMMABLE BYOD (BRING YOUR OWN DEVICE) SECURITY
|
2020 |
Hong, Sungmin |
WHAT MOBILE ADS KNOW ABOUT MOBILE USERS
|
2020 |
Son, Sooel |
PRACTICAL ATTACKS AGAINST PRIVACY AND AVAILABILITY IN 4G/LTE MOBILE COMMUNICATION SYSTEMS
|
2020 |
Shaik, Altaf |