SIBRA: SCALABLE INTERNET BANDWIDTH RESERVATION ARCHITECTURE
|
2020 |
Basescu, Cristina |
ENABLING PRACTICAL SOFTWARE-DEFINED NETWORKING SECURITY APPLICATIONS WITH OFX
|
2020 |
Sonchack, John |
CDN-ON-DEMAND: AN AFFORDABLE DDOS DEFENSE VIA UNTRUSTED CLOUDS
|
2020 |
Gilad, Yossi |
CENTRALLY BANKED CRYPTOCURRENCIES
|
2020 |
Gilad, Yossi |
YOU ARE A GAME BOT!: UNCOVERING GAME BOTS IN MMORPGS VIA SELF-SIMILARITY IN THE WILD
|
2020 |
Lee, Eunjo |
A SIMPLE GENERIC ATTACK ON TEXT CAPTCHAS
|
2020 |
Gao, Haichang |
FREE FOR ALL! ASSESSING USER DATA EXPOSURE TO ADVERTISING LIBRARIES ON ANDROID
|
2020 |
Demetriou, Soteris |
DISCOVRE: EFFICIENT CROSS-ARCHITECTURE IDENTIFICATION OF BUGS IN BINARY CODE
|
2020 |
Eschweiler, Sebastian |
DRILLER: AUGMENTING FUZZING THROUGH SELECTIVE SYMBOLIC EXECUTION
|
2020 |
Stephens, Nick |
TLS IN THE WILD: AN INTERNET-WIDE ANALYSIS OF TLS-BASED PROTOCOLS FOR ELECTRONIC COMMUNICATION
|
2020 |
Holz, Ralph |
IT'S FREE FOR A REASON: EXPLORING THE ECOSYSTEM OF FREE LIVE STREAMING SERVICES
|
2020 |
Rafique, M. Zubair |
CROSSFIRE: AN ANALYSIS OF FIREFOX EXTENSION-REUSE VULNERABILITIES
|
2020 |
Buyukkayhan, Ahmet |
TOWARDS SDN-DEFINED PROGRAMMABLE BYOD (BRING YOUR OWN DEVICE) SECURITY
|
2020 |
Hong, Sungmin |
WHAT MOBILE ADS KNOW ABOUT MOBILE USERS
|
2020 |
Son, Sooel |
PRACTICAL ATTACKS AGAINST PRIVACY AND AVAILABILITY IN 4G/LTE MOBILE COMMUNICATION SYSTEMS
|
2020 |
Shaik, Altaf |
ATTACKING THE NETWORK TIME PROTOCOL
|
2020 |
Malhotra, Aanchal |
SPIFFY: INDUCING COST-DETECTABILITY TRADEOFFS FOR PERSISTENT LINK-FLOODING ATTACKS
|
2020 |
Kang, Min Suk |
PROTECTING C++ DYNAMIC DISPATCH THROUGH VTABLE INTERLEAVING
|
2020 |
Bounov, Dimitar |
TRANSCRIPT COLLISION ATTACKS: BREAKING AUTHENTICATION IN TLS, IKE AND SSH
|
2020 |
Bhargavan, Karthikeyan |
KILLED BY PROXY: ANALYZING CLIENT-END TLS INTERCEPTION SOFTWARE
|
2020 |
Carnavalet, Xavier De Carné De |