A Formal Security Analysis of Session Resumption Across Hostnames
|
2021 |
Gellert, Kai |
PoW-How: An Enduring Timing Side-Channel to Evade Online Malware Sandboxes
|
2021 |
Nappa, Antonio |
Rope: Covert Multi-process Malware Execution with Return-Oriented Programming
|
2021 |
D’Elia, Daniele Cono |
Detecting Video-Game Injectors Exchanged in Game Cheating Communities
|
2021 |
Karkallis, Panicos |
Revocable Policy-Based Chameleon Hash
|
2021 |
Xu, Shengmin |
MediSC: Towards Secure and Lightweight Deep Learning as a Medical Diagnostic Service
|
2021 |
Liu, Xiaoning |
Common Component in Black-Boxes Is Prone to Attacks
|
2021 |
Zhang, Jiyi |
webFuzz: Grey-Box Fuzzing for Web Applications
|
2021 |
Rooij, Orpheas van |
Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains
|
2021 |
Schloegel, Moritz |
MiniLedger: Compact-Sized Anonymous and Auditable Distributed Payments
|
2021 |
Chatzigiannis, Panagiotis |
Romoa: Robust Model Aggregation for the Resistance of Federated Learning to Model Poisoning Attacks
|
2021 |
Mao, Yunlong |
FLOD : Oblivious Defender for Private Byzantine-Robust Federated Learning with Dishonest-Majority
|
2021 |
Dong, Ye |
DA3G: Detecting Adversarial Attacks by Analysing Gradients
|
2021 |
Schulze, Jan-Philipp |
LiMNet: Early-Stage Detection of IoT Botnets with Lightweight Memory Networks
|
2021 |
Giaretta, Lodovico |
AutoGuard: A Dual Intelligence Proactive Anomaly Detection at Application-Layer in 5G Networks
|
2021 |
Madi, Taous |
Shadow-Catcher: Looking into Shadows to Detect Ghost Objects in Autonomous Vehicle 3D Sensing
|
2021 |
Hau, Zhongyuan |
Iterative Selection of Categorical Variables for Log Data Anomaly Detection
|
2021 |
Landauer, Max |
More Efficient Post-quantum KEMTLS with Pre-distributed Public Keys
|
2021 |
Schwabe, Peter |
How to (Legally) Keep Secrets from Mobile Operators
|
2021 |
Arfaoui, Ghada |
Caught in the Web: DoS Vulnerabilities in Parsers for Structured Data
|
2021 |
Rasheed, Shawn |