TOWARDS ONLINE SPAM FILTERING IN SOCIAL NETWORKS
|
2020 |
Gao, Hongyu |
FREEMARKET: SHOPPING FOR FREE IN ANDROID APPLICATIONS
|
2020 |
Reynaud, Daniel |
ON LIMITATIONS OF DESIGNING LEAKAGE-RESILIENT PASSWORD SYSTEMS: ATTACKS, PRINCIPALS AND USABILITY
|
2020 |
Yan, Qiang |
SYSTEMATIC DETECTION OF CAPABILITY LEAKS IN STOCK ANDROID SMARTPHONES
|
2020 |
Grace, Michael |
INSIGHTS INTO USER BEHAVIOR IN DEALING WITH INTERNET ATTACKS
|
2020 |
Onarlioglu, Kaan |
PATHCUTTER: SEVERING THE SELF-PROPAGATION PATH OF XSS JAVASCRIPT WORMS IN SOCIAL WEB NETWORKS
|
2020 |
Cao, Yinzhi |
KRUISER: SEMI-SYNCHRONIZED NON-BLOCKING CONCURRENT KERNEL HEAP BUFFER OVERFLOW MONITORING
|
2020 |
Tian, Donghai |
SHORTMAC: EFFICIENT DATA-PLANE FAULT LOCALIZATION
|
2020 |
Zhang, Xin |
LOCATION LEAKS OVER THE GSM AIR INTERFACE
|
2020 |
Kune, Denis Foo |
HEY, YOU, GET OFF OF MY MARKET: DETECTING MALICIOUS APPS IN OFFICIAL AND ALTERNATIVE ANDROID MARKETS
|
2020 |
Zhou, Yajin |
HOST FINGERPRINTING AND TRACKING ON THE WEB: PRIVACY AND SECURITY IMPLICATION
|
2020 |
Yen, Ting-Fang |
GHOST DOMAIN NAMES: REVOKED YET STILL RESOLVABLE
|
2020 |
Jiang, Jian |
THE CASE FOR PREFETCHING AND PREVALIDATING TLS SERVER CERTIFICATES
|
2020 |
Stark, Emily |
AUTOMATED SYNTHESIS OF SECURE DISTRIBUTED APPLICATIONS
|
2020 |
Backes, Michael |
STATIC DETECTION OF C++ VTABLE ESCAPE VULNERABILITIES IN BINARY CODE
|
2020 |
Dewey, David |
PLAIN-TEXT RECOVERY ATTACKS AGAINST DATAGRAM TLS
|
2020 |
Paterson, Kenneth |
PRIVACY-PRESERVING LOGARITHMIC-TIME SEARCH ON ENCRYPTED DATA IN CLOUD
|
2020 |
Lu, Yanbin |
HUBBLE: TRANSPARENT AND EXTENSIBLE MALWARE ANALYSIS BY COMBINING HARDWARE VIRTUALIZATION AND SOFTWARE EMULATION
|
2020 |
Yan, Lok |
TAKING ROUTERS OFF THEIR MEDS: WHY ASSUMPTIONS OF ROUTER STABILITY ARE DANGEROUS
|
2020 |
Schuchard, Maxfield |
CHARM: A FRAMEWORK FOR RAPIDLY PROTOTYPING CRYPTOSYSTEMS
|
2020 |
Akinyele, Joseph A. |