Leaky Controller: Cross-VM Memory Controller Covert Channel on Multi-core Systems
|
2020 |
Semal, Benjamin |
MULTITLS: Secure Communication Channels with Cipher Suite Diversity
|
2020 |
Moura, Ricardo |
JavaScript Malware Detection Using Locality Sensitive Hashing
|
2020 |
Peiser, Stefan Carl |
Code Between the Lines: Semantic Analysis of Android Applications
|
2020 |
Feichtner, Johannes |
Evaluation of Statistical Tests for Detecting Storage-Based Covert Channels
|
2020 |
Sattolo, Thomas A. V. |
Assisting Users to Create Stronger Passwords Using ContextBased MicroTraining
|
2020 |
Kävrestad, Joakim |
Privacy CURE: Consent Comprehension Made Easy
|
2020 |
Drozd, Olha |
Revisiting Security Vulnerabilities in Commercial Password Managers
|
2020 |
Carr, Michael |
Actively Probing Routes for Tor AS-Level Adversaries with RIPE Atlas
|
2020 |
Mayer, Wilfried |
Improvements of the Balance Discovery Attack on Lightning Network Payment Channels
|
2020 |
Dam, Gijs van |
Fuzzy Vault for Behavioral Authentication System
|
2020 |
Islam, Morshedul |
Establishing a Strong Baseline for Privacy Policy Classification
|
2020 |
Nejad, Najmeh Mousavi |
Cross-Platform File System Activity Monitoring and Forensics — A Semantic Approach
|
2020 |
Kurniawan, Kabul |
IE-Cache: Counteracting Eviction-Based Cache Side-Channel Attacks Through Indirect Eviction
|
2020 |
Mukhtar, Muhammad Asim |
Refined Detection of SSH Brute-Force Attackers Using Machine Learning
|
2020 |
Hynek, Karel |
Zeek-Osquery: Host-Network Correlation for Advanced Monitoring and Intrusion Detection
|
2020 |
Haas, Steffen |
CCBRSN: A System with High Embedding Capacity for Covert Communication in Bitcoin
|
2020 |
Wang, Weizheng |
Privacy-Friendly Monero Transaction Signing on a Hardware Wallet
|
2020 |
Klinec, Dusan |
Improving Big Data Clustering for Jamming Detection in Smart Mobility
|
2020 |
Bangui, Hind |
Facilitating Privacy Attitudes and Behaviors with Affective Visual Design
|
2020 |
Kitkowska, Agnieszka |