OblivSketch: Oblivious Network Measurement as a Cloud Service
|
2021 |
Lai, Shanggi |
ROV++: Improved Deployable Defense against BGP Hijacking
|
2021 |
Morillo, Reynaldo |
A Devil of a Time: How Vulnerable is NTP to Malicious Timeservers?
|
2021 |
Perry, Yarin |
Improving Signal's Sealed Sender
|
2021 |
Martiny, Ian |
Forward and Backward Private Conjunctive Searchable Symmetric Encryption
|
2021 |
Patranabis, Sikhar |
To Err.Is Human: Characterizing the Threat of Unintended URLs in Social Media
|
2021 |
Kaleli, Beliz |
Your Phone is My Proxy: Detecting and Understanding Mobile Proxy Networks
|
2021 |
Mi, Xianghang |
RandRunner: Distributed Randomness from Trapdoor VDFs with Strong Uniqueness
|
2021 |
Schindler, Philipp |
LaKSA: A Probabilistic Proof-of-Stake Protocol
|
2021 |
Reijsbergen, Daniel |
Shadow Attacks: Hiding and Replacing Content in Signed PDFs
|
2021 |
Mainka, Christian |
From WHOIS to WHOWAS: A Large-Scale Measurement Study of Domain Registration Privacy under the GDPR
|
2021 |
Lu, Chaoyi |
Understanding the Growth and Security Considerations Of ECS
|
2021 |
Kountouras, Athanasios |
Reining in the Web's Inconsistencies with Site Policy
|
2021 |
Calzavara, Stefano |
Bringing Balance to the Force: Dynamic Analysis of the Android Application Framework
|
2021 |
Dawoud, Abdallah |
SymQEMU: Compilation-based Symbolic Execution for Binaries
|
2021 |
Poeplau, Sebastian |
Deceptive Deletions for Protecting Withdrawn Posts on Social Media Platforms
|
2021 |
Minaei, Mohsen |
Who's Hosting the Block Party? Studying Third-Party Blockage of CSP and SRI
|
2021 |
Steffens, Marius |
Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages
|
2021 |
Duan, Ruian |
XDA: Accurate, Robust Disassembly with Transfer Learning
|
2021 |
Pei, Kexin |
KUBO: Precise and Scalable Detection of User-triggerable Undefined Behavior Bugs in OS Kernel
|
2021 |
Liu, Changming |