CV-Inspector: Towards Automating Detection of Adblock Circumvention

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Network and Distributed System Security Symposium (28. : 2021 : Online) Network and Distributed System Security Symposium 2021 (NDSS'21) ; Volume 2 of 2
1. Verfasser: Le, Hieu (VerfasserIn)
Weitere Verfasser: Markopoulou, Athina (VerfasserIn), Shafiq, Zubair (VerfasserIn)
Pages:2021
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2021
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Screen Gleaning: A Screen Reading TEMPEST Attack on Mobile Devices Exploiting an Electromagnetic Side Channel 2021 Liu, Zhuoran
Rosita: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers 2021 Shelton, Madura A.
Let's Stride Blindfolded in a Forest: Sublinear Multi-Client Decision Trees Evaluation 2021 Ma, Jack P. K.
GALA: Greedy ComputAtion for Linear Algebra in Privacy-Preserved Neural Networks 2021 Zhang, Qiao
From Library Portability to Para-rehosting: Natively Executing Microcontroller Software on Commodity Hardware 2021 Li, Wenqiang
Evading Voltage-Based Intrusion Detection on Automotive CAN 2021 Bhatia, Rohit
Data Poisoning Attacks to Deep Learning Based Recommender Systems 2021 Huang, Hai
WATSON: Abstracting Behaviors from Audit Logs via Aggregation of Contextual Semantics 2021 Zeng, Jun
FlowLens: Enabling Efficient Flow Classification for ML-based Network Security Applications 2021 Barradas, Diogo
The Bluetooth CYBORG: Analysis of the Full Human-Machine Passkey Entry AKE Protocol 2021 Troncoso, Michael
Does Every Second Count? Time-based Evolution of Malware Behavior in Sandboxes 2021 Küchler, Alexander
IoTSafe: Enforcing Safety and Security Policy with Real IoT Physical Interaction Discovery 2021 Ding, Wenbo
Hey Alexa, is this Skill Safe?: Taking a Closer Look at the Alexa Skill Ecosystem 2021 Lentzsch, Christopher
EarArray: Defending against DolphinAttack via Acoustic Altenuation 2021 Zhang, Guoming
POP and PUSH: Demystifying and Defending against (Mach) Port-oriented Programming 2021 Zheng, Min
Detecting Kernel Memory Leaks in Specialized Modules with Ownership Reasoning 2021 Emamdoost, Navid
WINNIE: Fuzzing Windows Applications with Harness Synthesis and Fast CIoning 2021 Jung, Jinho
PrivacyFlash Pro: Automating Privacy Policy Generation for Mobile Apps 2021 Zimmeck, Sebastian
Hunting the Haunter — Efficient Relational Symbolic Execution for Spectre with Haunted RelSE 2021 Daniel, Lesly-Ann
Differential Training: A Generic Framework to Reduce Label Noises for Android Malware Detection 2021 Xu, Jiayun
Alle Artikel auflisten