Characterizing GPU Overclocking Faults
|
2021 |
Zuberi, Eldad |
ARIstoteles – Dissecting Apple’s Baseband Interface
|
2021 |
Kröll, Tobias |
My Fuzzer Beats Them All! Developing a Framework for Fair Evaluation and Comparison of Fuzzers
|
2021 |
Paaßen, David |
Fair Peer-to-Peer Content Delivery via Blockchain
|
2021 |
He, Songlin |
Conclave: A Collective Stake Pool Protocol
|
2021 |
Karakostas, Dimitris |
Probabilistic Micropayments with Transferability
|
2021 |
Takahashi, Taisei |
Adversarial Activity Detection Using Keystroke Acoustics
|
2021 |
Fallahi, Amin |
Tell Me How You Re-Charge, I Will Tell You Where You Drove To: Electric Vehicles Profiling Based on Charging-Current Demand
|
2021 |
Brighente, Alessandro |
MORTON: Detection of Malicious Routines in Large-Scale DNS Traffic
|
2021 |
Daihes, Yael |
A Formal Security Analysis of Session Resumption Across Hostnames
|
2021 |
Gellert, Kai |
PoW-How: An Enduring Timing Side-Channel to Evade Online Malware Sandboxes
|
2021 |
Nappa, Antonio |
Rope: Covert Multi-process Malware Execution with Return-Oriented Programming
|
2021 |
D’Elia, Daniele Cono |
Detecting Video-Game Injectors Exchanged in Game Cheating Communities
|
2021 |
Karkallis, Panicos |
Revocable Policy-Based Chameleon Hash
|
2021 |
Xu, Shengmin |
MediSC: Towards Secure and Lightweight Deep Learning as a Medical Diagnostic Service
|
2021 |
Liu, Xiaoning |
Common Component in Black-Boxes Is Prone to Attacks
|
2021 |
Zhang, Jiyi |
More Efficient Post-quantum KEMTLS with Pre-distributed Public Keys
|
2021 |
Schwabe, Peter |
How to (Legally) Keep Secrets from Mobile Operators
|
2021 |
Arfaoui, Ghada |
Caught in the Web: DoS Vulnerabilities in Parsers for Structured Data
|
2021 |
Rasheed, Shawn |
Peeler: Profiling Kernel-Level Events to Detect Ransomware
|
2021 |
Ahmed, Muhammad Ejaz |