OS-LEVEL SIDE CHANNELS WITHOUT PROCFS: EXPLORING CROSS-APP INFORMATION LEAKAGE ON IOS
|
2020 |
Zhang, Xiaokuan |
APPS, TRACKERS, PRIVACY, AND REGULATORS: A GLOBAL STUDY OF THE MOBILE TRACKING ECOSYSTEM
|
2020 |
Razaghpanah, Abbas |
REDUCED COOLING REDUNDANCY: A NEW SECURITY VULNERABILITY IN A HOT DATA CENTER
|
2020 |
Gao, Xing |
VEIL: PRIVATE BROWSING SEMANTICS WITHOUT BROWSER-SIDE ASSISTANCE
|
2020 |
Wang, Frank |
GAME OF MISSUGGESTIONS: SEMANTIC ANALYSIS OF SEARCH-AUTOCOMPLETE MANIPULATIONS
|
2020 |
Wang, Peng |
ACEDROID: NORMALIZING DIVERSE ANDROID ACCESS CONTROL CHECKS FOR INCONSISTENCY DETECTION
|
2020 |
Aafer, Yousra |
BREAKAPP: AUTOMATED, FLEXIBLE APPLICATION COMPARTMENTALIZATION
|
2020 |
Vasilakis, Nikos |
TLS-N: NON-REPUDIATION OVER TLS ENABLIGN UBIQUITOUS CONTENT SIGNING
|
2020 |
Ritzdorf, Hubert |
BACK TO THE EPILOGUE: EVADING CONTROL FLOW GUARD VIA UNALIGNED TARGETS
|
2020 |
Biondo, Andrea |
ENHANCING MEMORY ERROR DETECTION FOR LARGE-SCALE APPLICATIONS AND FUZZ TESTING
|
2020 |
Han, Wookhyun |
FINDING CLUES FOR YOUR SECRETS: SEMANTICS-DRIVEN, LEARNING-BASED PRIVACY DISCOVERY IN MOBILE APPS
|
2020 |
Nan, Yuhong |
BUG FIXES, IMPROVEMENTS, ... AND PRIVACY LEAKS — A LONGITUDINAL STUDY OF PII LEAKS ACROSS ANDROID APP VERSIONS
|
2020 |
Ren, Jingjing |
KNOCK KNOCK, WHO'S THERE? MEMBERSHIP INFERENCE ON AGGREGATE LOCATION DATA
|
2020 |
Pyrgelis, Apostolos |
CLOUD STRIFE: MITIGATING THE SECURITY RISKS OF DOMAIN-VALIDATED CERTIFICATES
|
2020 |
Borgolte, Kevin |
CONSENSUAL AND PRIVACY-PRESERVING SHARING OF MULTI-SUBJECT AND INTERDEPENDENT DATA
|
2020 |
Olteanu, Alexandra-Mihaela |
DE-ANONYMIZATION OF MOBILITY TRAJECTORIES: DISSECTING THE GAPS BETWEEN THEORY AND PRACTICE
|
2020 |
Wang, Huandong |
SYNODE: UNDERSTANDING AND AUTOMATICALLY PREVENTING INJECTION ATTACKS ON NODEJS
|
2020 |
Staicu, Cristian-Alexandru |
JAVASCRIPT ZERO: REAL JAVASCRIPT AND ZERO SIDE-CHANNEL ATTACKS
|
2020 |
Schwarz, Michael |
RIDING OUT DOMSDAY: TOWARDS DETECTING AND PREVENTING DOM CROSS-SITE SCRIPTING
|
2020 |
Melicher, William |
MCI : MODELING-BASED CAUSALITY INFERENCE IN AUDIT LOGGING FOR ATTACK INVESTIGATION
|
2020 |
Kwon, Yonghwi |