Fingerprinting Tooling used for SSH Compromisation Attempts
|
2021 |
Chiütte, Vincent |
DECAF++: Elastic Whole-System Dynamic Taint Analysis
|
2021 |
Davanian, Ali |
Timing Patterns and Correlations in Spontaneous SCADA Traffic for Anomaly Detection
|
2021 |
Lin, Chih-Yuan |
PAtt: Physics-based Attestation of Control Systems
|
2021 |
Ghaeini, Hamid Reza |
PRO-ORAM: Practical Read-Only Oblivious RAM
|
2021 |
Tople, Shruti |
TALON: An Automated Framework for Cross-Device Tracking Detection
|
2021 |
Solomos, Konstantinos |
Kindness is a Risky Business: On the Usage of the Accessibility APIs in Android
|
2021 |
Diao, Wenrui |
NLP-EYE: Detecting Memory Corruptions via Semantic-Aware Memory Operation Function Identification
|
2021 |
Wang, Jianqiang |
SGXJail: Defeating Enclave Malware via Confinement
|
2021 |
Weiser, Samuel |
DomainScouter: Understanding the Risks of Deceptive IDNS
|
2021 |
Chiba, Daiki |
HinDom: A Robust Malicious Domain Detection System based on Heterogeneous Information Network with Transductive Classification
|
2021 |
Sun, Xiaoqging |
S3: A DFW-based Scalable Security State Analysis Framework for Large-Scale Data Center Networks
|
2021 |
Sabur, Abdulhakim |
Time and Order: Towards Automatically Identifying Side-Channel Vulnerabilities in Enclave Binaries
|
2021 |
Wang, Wubing |
On Design Inference from Binaries Compiled using Modern C++ Defenses
|
2021 |
Erinfolami, Rukayat Ayomide |
ScaRR: Scalable Runtime Remote Attestation for Complex Systems
|
2021 |
Toffalini, Flavio |
COMA: Communication and Obfuscation Management Architecture
|
2021 |
Azar, Kimia Zamiri |
Smart Malware that Uses Leaked Control Data of Robotic Applications: The Case of Raven-II Surgical Robots
|
2021 |
Chung, Keywhan |
Robust Optimization-Based Watermarking Scheme for Sequential Data
|
2021 |
Ayday, Erman |
Fluorescence: Detecting Kernel-Resident Malware in Clouds
|
2021 |
Li, Richard |
Dynamically Finding Minimal Eviction Sets Can Be Quicker Than You Think for Side-Channel Attacks against the LLC
|
2021 |
Song, Wei |