TOWARDS ONLINE SPAM FILTERING IN SOCIAL NETWORKS
|
2020 |
Gao, Hongyu |
FREEMARKET: SHOPPING FOR FREE IN ANDROID APPLICATIONS
|
2020 |
Reynaud, Daniel |
ON LIMITATIONS OF DESIGNING LEAKAGE-RESILIENT PASSWORD SYSTEMS: ATTACKS, PRINCIPALS AND USABILITY
|
2020 |
Yan, Qiang |
SYSTEMATIC DETECTION OF CAPABILITY LEAKS IN STOCK ANDROID SMARTPHONES
|
2020 |
Grace, Michael |
INSIGHTS INTO USER BEHAVIOR IN DEALING WITH INTERNET ATTACKS
|
2020 |
Onarlioglu, Kaan |
PATHCUTTER: SEVERING THE SELF-PROPAGATION PATH OF XSS JAVASCRIPT WORMS IN SOCIAL WEB NETWORKS
|
2020 |
Cao, Yinzhi |
KRUISER: SEMI-SYNCHRONIZED NON-BLOCKING CONCURRENT KERNEL HEAP BUFFER OVERFLOW MONITORING
|
2020 |
Tian, Donghai |
SHORTMAC: EFFICIENT DATA-PLANE FAULT LOCALIZATION
|
2020 |
Zhang, Xin |
LOCATION LEAKS OVER THE GSM AIR INTERFACE
|
2020 |
Kune, Denis Foo |
HEY, YOU, GET OFF OF MY MARKET: DETECTING MALICIOUS APPS IN OFFICIAL AND ALTERNATIVE ANDROID MARKETS
|
2020 |
Zhou, Yajin |
HOST FINGERPRINTING AND TRACKING ON THE WEB: PRIVACY AND SECURITY IMPLICATION
|
2020 |
Yen, Ting-Fang |
GHOST DOMAIN NAMES: REVOKED YET STILL RESOLVABLE
|
2020 |
Jiang, Jian |
THE CASE FOR PREFETCHING AND PREVALIDATING TLS SERVER CERTIFICATES
|
2020 |
Stark, Emily |
AUTOMATED SYNTHESIS OF SECURE DISTRIBUTED APPLICATIONS
|
2020 |
Backes, Michael |
STATIC DETECTION OF C++ VTABLE ESCAPE VULNERABILITIES IN BINARY CODE
|
2020 |
Dewey, David |
PERSISTENT OSPF ATTACKS
|
2020 |
Nakibly, Gabi |
YOU ARE WHAT YOU LIKE! INFORMATION LEAKAGE THROUGH USERS' INTERESTS
|
2020 |
Chaabane, Abdelberi |
ANDANA: ANONYMOUS NAMED DATA NETWORKING APPLICATION
|
2020 |
Dibenedetto, Steven |
X-VINE: SECURE AND PSEUDONYMOUS ROUTING IN DHTS USING SOCIAL NETWORKS
|
2020 |
Mittal, Prateek |
TRACK ME IF YOU CAN: ON THE EFFECTIVENESS OF CONTEXT-BASED IDENTIFIER CHANGES IN DEPLOYED MOBILE NETWORKS
|
2020 |
Bindschaedler, Laurent |