NEIGHBORWATCHER: A CONTENT-AGNOSTIC COMMENT SPAM INFERENCE SYSTEM
|
2020 |
Zhang, Jialong |
INTEGUARD: TOWARD AUTOMATIC PROTECTION OF THIRD-PARTY WEB SERVICE INTEGRATIONS
|
2020 |
Xing, Luyi |
PREVENTING SIDE-CHANNEL LEAKS IN WEB TRAFFIC: A FORMAL APPROACH
|
2020 |
Backes, Michael |
THE POSTMAN ALWAYS RINGS TWICE: ATTACKING AND DEFENDING POSTMESSAGE IN HTML5 WEBSITES
|
2020 |
Son, Sooel |
PRESERVING LINK PRIVACY IN SOCIAL NETWORK BASED SYSTEMS
|
2020 |
Mittal, Prateek |
LAYING A SECURE FOUNDATION FOR MOBILE DEVICES
|
2020 |
Smalley, Stephen |
A PRACTICAL, TARGETED, AND STEALTHY ATTACK AGAINST WPA ENTERPRISE
|
2020 |
Cassola, Aldo |
DETECTING PASSIVE CONTENT LEAKS AND POLLUTION IN ANDROID APLICATIONS
|
2020 |
Zhou, Lon Yajin |
COMPA: DETECTING COMPROMISED ACCOUNTS ON SOCIAL NETWORKS
|
2020 |
Egele, Manuel |
SOCIAL TURING TESTS: CROWDSOURCING SYBIL DETECTION
|
2020 |
Wang, Gang |
COMPARING MOBILE PRIVACY PROTECTION THROUGH CROSS-PLATFORM APPLICATIONS
|
2020 |
Han, Jin |
CONTEXTUAL POLICY ENFORCEMENT IN ANDROID APPLICATIONS WITH PERMISSION EVENT GRAPHS
|
2020 |
Chen, Kevin |
HIGH ACCURACY ATTACK PROVENANCE VIA BINARY-BASED EXECUTION PARTITION
|
2020 |
Lee, Kyu Hyung |
CAMP: CONTENT-AGNOSTIC MALWARE PROTECTION
|
2020 |
Provos, Niels |
AUTHSCAN: AUTOMATIC EXTRACTION OF WEB AUTHENTICATION PROTOCOLS FROM IMPLEMENTATIONS
|
2020 |
Bai, Guangdong |
ON IMPLEMENTING DENIABLE STORAGE ENCRYPTION FOR MOBILE DEVICES
|
2020 |
Skillen, Adam |
I CAN BE YOU: QUESTIONING THE USE OF KEYSTROKE DYNAMICS AS BIOMETRICS
|
2020 |
Meng, Tey Chee |
UNOBSERVABLE RE-AUTHENTICATION FOR SMARTPHONES
|
2020 |
Li, Lingjun |
PLACERAIDER: VIRTUAL THEFT IN PHYSICAL SPACES WITH SMARTPHONES
|
2020 |
Templeman, Robert |
SECURITY ENHANCED (SE) ANDROID: BRINGING FLEXIBLE MAC TO ANDROID
|
2020 |
Smalley, Stephen |