FUSE: FINDING FILE UPLOAD BUGS VIA PENETRATION TESTING
|
2020 |
Lee, Taekjin |
CROSS-ORIGIN STATE INFERENCE (COSI) ATTACKS: LEAKING WEB SITE STATES TGHROUGH XS-LEAKS
|
2020 |
Sudhodanan, Avinash |
HOTFUZZ: DISCOVERING ALGORITHMIC DENIAL-OF-SERVICE VULNERABILITIES THROUGH GUIDED MICRO-FUZZING
|
2020 |
Blair, William |
MASSBROWSER: UNBLOCKING THE CENSORED WEB FOR THE MASSES, BY THE MASSES
|
2020 |
Nasr, Milad |
ET TU ALEXA? WHEN COMMODITY WIFI DEVICES TURN INTO ADVERSARIAL MOTION SENSORS
|
2020 |
Zhu, Yanzi |
ON USING APPLICATION-LAYER MIDDLEBOX PROTOCOLS FOR PEEKING BEHIND NAT GATEWAYS
|
2020 |
Rytilahti, Teemu |
DATA-DRIVEN DEBUGGING FOR FUNCTIONAL SIDE CHANNELS
|
2020 |
Tizpaz-Niari, Saeid |
CARNUS: EXPLORING THE PRIVACY THREATS OF BROWSER EXTENSION FINGERPRINTING
|
2020 |
Karami, Soroush |
DECENTRALIZED CONTROL: A CASE STUDY OF RUSSIA
|
2020 |
Ramesh, Reethika |
SYMTCP: ELUDING STATEFUL DEEP PACKET INSPECTION WITH AUTOMATED DISCREPANCY DISCOVERY
|
2020 |
Wang, Zhongjie |
METAMORPH: INJECTING INAUDIBLE COMMANDS INTO OVER-THE-AIR VOICE CONTROLLED SYSTEMS
|
2020 |
Chen, Tao |
LEARNING-BASED PRACTICAL SMARTPHONE EAVESDROPPING WITH BUILT-IN ACCELEROMETER
|
2020 |
Ba, Zhongjie |
ARE YOU GOING TO ANSWER THAT? MEASURING USER RESPONSES TO ANTI-ROBOCALL APPLICATION INDICATORS
|
2020 |
Sherman, Imani N. |
TKPERM: CROSS-PLATFORM PERMISSION KNOWLEDGE TRANSFER TO DETECT OVERPRIVILEGED THIRD-PARTY APPLICATIONS
|
2020 |
Shezan, Faysal Hossain |
THE ATTACK OF THE CLONES AGAINST PROOF-OF-AUTHORITY
|
2020 |
Ekparinya, Parinya |
WHEN MATCH FIELDS DO NOT NEED TO MATCH: BUFFERED PACKETS HIJACKING IN SDN
|
2020 |
Cao, Jiahao |
SVLAN: SECURE & SCALABLE NETWORK VIRTUALIZATION
|
2020 |
Kwon, Jonghoon |
NOJITSU: LOCKING DOWN JAVASCRIPT ENGINES
|
2020 |
Park, Taemin |
DESIGNING A BETTER BROWSER FOR TOR WITH BLAST
|
2020 |
Wang, Tao |
ENCRYPTED DNS --> PRIVACY? A TRAFFIC ANALYSIS PERSPECTIVE
|
2020 |
Siby, Sandra |