HIGH ACCURACY ATTACK PROVENANCE VIA BINARY-BASED EXECUTION PARTITION
|
2020 |
Lee, Kyu Hyung |
CAMP: CONTENT-AGNOSTIC MALWARE PROTECTION
|
2020 |
Provos, Niels |
AUTHSCAN: AUTOMATIC EXTRACTION OF WEB AUTHENTICATION PROTOCOLS FROM IMPLEMENTATIONS
|
2020 |
Bai, Guangdong |
ON IMPLEMENTING DENIABLE STORAGE ENCRYPTION FOR MOBILE DEVICES
|
2020 |
Skillen, Adam |
I CAN BE YOU: QUESTIONING THE USE OF KEYSTROKE DYNAMICS AS BIOMETRICS
|
2020 |
Meng, Tey Chee |
UNOBSERVABLE RE-AUTHENTICATION FOR SMARTPHONES
|
2020 |
Li, Lingjun |
PLACERAIDER: VIRTUAL THEFT IN PHYSICAL SPACES WITH SMARTPHONES
|
2020 |
Templeman, Robert |
SECURITY ENHANCED (SE) ANDROID: BRINGING FLEXIBLE MAC TO ANDROID
|
2020 |
Smalley, Stephen |
THE CORE OF THE MATTER: ANALYZING MALICIOUS TRAFFIC IN CELLULAR CARRIERS
|
2020 |
Lever, Charles |
ATTACK SURFACE METRICS AND AUTOMATED COMPILE-TIME OS KERNEL TAILORING
|
2020 |
Kurmus, A. |
TAMING HOSTED HYPERVISORS WITH (MOSTLY) DEPRIVILEGED EXECUTION
|
2020 |
Wu, Chiachih |
WHEN FIRMWARE MODIFICATIONS ATTACK: A CASE STUDY OF EMBEDDED EXPLOITATION
|
2020 |
Cui, Ang |
PISCES: ANONYMOUS COMMUNICATION USING SOCIAL NETWORKS
|
2020 |
Mittal, Prateek |
A PRACTICAL, TARGETED, AND STEALTHY ATTACK AGAINST WPA ENTERPRISE
|
2020 |
Cassola, Aldo |
DETECTING PASSIVE CONTENT LEAKS AND POLLUTION IN ANDROID APLICATIONS
|
2020 |
Zhou, Lon Yajin |
COMPA: DETECTING COMPROMISED ACCOUNTS ON SOCIAL NETWORKS
|
2020 |
Egele, Manuel |
SOCIAL TURING TESTS: CROWDSOURCING SYBIL DETECTION
|
2020 |
Wang, Gang |
COMPARING MOBILE PRIVACY PROTECTION THROUGH CROSS-PLATFORM APPLICATIONS
|
2020 |
Han, Jin |
CONTEXTUAL POLICY ENFORCEMENT IN ANDROID APPLICATIONS WITH PERMISSION EVENT GRAPHS
|
2020 |
Chen, Kevin |
NEIGHBORWATCHER: A CONTENT-AGNOSTIC COMMENT SPAM INFERENCE SYSTEM
|
2020 |
Zhang, Jialong |