LOCATION LEAKS OVER THE GSM AIR INTERFACE
|
2020 |
Kune, Denis Foo |
HEY, YOU, GET OFF OF MY MARKET: DETECTING MALICIOUS APPS IN OFFICIAL AND ALTERNATIVE ANDROID MARKETS
|
2020 |
Zhou, Yajin |
HOST FINGERPRINTING AND TRACKING ON THE WEB: PRIVACY AND SECURITY IMPLICATION
|
2020 |
Yen, Ting-Fang |
GHOST DOMAIN NAMES: REVOKED YET STILL RESOLVABLE
|
2020 |
Jiang, Jian |
THE CASE FOR PREFETCHING AND PREVALIDATING TLS SERVER CERTIFICATES
|
2020 |
Stark, Emily |
AUTOMATED SYNTHESIS OF SECURE DISTRIBUTED APPLICATIONS
|
2020 |
Backes, Michael |
STATIC DETECTION OF C++ VTABLE ESCAPE VULNERABILITIES IN BINARY CODE
|
2020 |
Dewey, David |
PLAIN-TEXT RECOVERY ATTACKS AGAINST DATAGRAM TLS
|
2020 |
Paterson, Kenneth |
PRIVACY-PRESERVING LOGARITHMIC-TIME SEARCH ON ENCRYPTED DATA IN CLOUD
|
2020 |
Lu, Yanbin |
HUBBLE: TRANSPARENT AND EXTENSIBLE MALWARE ANALYSIS BY COMBINING HARDWARE VIRTUALIZATION AND SOFTWARE EMULATION
|
2020 |
Yan, Lok |
TAKING ROUTERS OFF THEIR MEDS: WHY ASSUMPTIONS OF ROUTER STABILITY ARE DANGEROUS
|
2020 |
Schuchard, Maxfield |
CHARM: A FRAMEWORK FOR RAPIDLY PROTOTYPING CRYPTOSYSTEMS
|
2020 |
Akinyele, Joseph A. |
PRIVATE SET INTERSECTION: ARE GARBLED CIRCUITS BETTER THAN CUSTOM PROTOCOLS?
|
2020 |
Huang, Yan |
ADAPTIVE PASSWORD-STRENGTH METERS FROM MARKOV MODELS
|
2020 |
Castelluccia, Claude |
GUESS WHO’S TEXTING YOU? EVALUATING THE SECURITY OF SMARTPHONE MESSAGING APPLICATIONS
|
2020 |
Schrittwieser, Sebastian |
TOWARDS TAMING PRIVILEGE-ESCALATION ATTACKS ON ANDROID
|
2020 |
Bugiel, Sven |
MOCFI: A FRAMEWORK TO MITIGATE CONTROL-FLOW ATTACKS ON SMARTPHONES
|
2020 |
Davi, Lucas |
BLACR: TTP-FREE BLACKLISTABLE ANONYMOUS CREDENTIALS WITH REPUTATION
|
2020 |
Au, Man Ho |
THE LATENT COMMUNITY MODEL FOR DETECTING SYBILS IN SOCIAL NETWORKS
|
2020 |
Cai, Zhuhua |
DISCOVERING SEMANTIC DATA OF INTEREST FROM UN-MAPPABLE MEMORY WITH CONFIDENCE
|
2020 |
Lin, Zhiqiang |