"Flawed, but like democracy we don't have a better system": The Experts' Insights on the Peer Review Process of Evaluating Security Papers | 0 | 0.34 | 2022 |
Playing for K(H)eaps: Understanding and Improving Linux Kernel Exploit Reliability | 0 | 0.34 | 2022 |
CrawlPhish: Large-Scale Analysis of Client-Side Cloaking Techniques in Phishing | 0 | 0.34 | 2022 |
Hybrid Pruning: Towards Precise Pointer and Taint Analysis | 0 | 0.34 | 2022 |
Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs | 0 | 0.34 | 2022 |
Unleash the Simulacrum: Shifting Browser Realities for Robust Extension-Fingerprinting Prevention | 0 | 0.34 | 2022 |
CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing | 1 | 0.38 | 2021 |
Favocado: Fuzzing The Binding Code Of Javascript Engines Using Semantically Correct Test Cases | 1 | 0.35 | 2021 |
Everything You Ever Wanted to Know About Bitcoin Mixers (But Were Afraid to Ask) | 0 | 0.34 | 2021 |
Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-Service | 0 | 0.34 | 2021 |
Scam Pandemic: How Attackers Exploit Public Fear through Phishing | 2 | 0.39 | 2020 |
Exploiting Uses of Uninitialized Stack Variables in Linux Kernels to Leak Kernel Pointers. | 0 | 0.34 | 2020 |
Exploring Abstraction Functions in Fuzzing | 0 | 0.34 | 2020 |
HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems | 5 | 0.46 | 2020 |
SmokeBomb: effective mitigation against cache side-channel attacks on the ARM architecture | 0 | 0.34 | 2020 |
Karonte: Detecting Insecure Multi-binary Interactions in Embedded Firmware | 5 | 0.44 | 2020 |
BootKeeper - Validating Software Integrity Properties on Boot Firmware Images. | 0 | 0.34 | 2019 |
Matched and Mismatched SOCs: A Qualitative Study on Security Operations Center Issues | 4 | 0.45 | 2019 |
Sleak: automating address space layout derandomization | 1 | 0.38 | 2019 |
Mechanical Phish: Resilient Autonomous Hacking. | 2 | 0.39 | 2018 |
AIM-SDN: Attacking Information Mismanagement in SDN-datastores. | 1 | 0.35 | 2018 |
CacheLight: Defeating the CacheKit Attack. | 0 | 0.34 | 2018 |
HeapHopper: Bringing Bounded Model Checking to Heap Implementation Security. | 0 | 0.34 | 2018 |
A Binary Analysis Approach to Retrofit Security in Input Parsing Routines | 1 | 0.36 | 2018 |
Challenges and Preparedness of SDN-based Firewalls. | 0 | 0.34 | 2018 |
T-Fuzz: Fuzzing by Program Transformation | 20 | 0.68 | 2018 |
FEAST'18 - 2018 Workshop on Forming an Ecosystem around Software Transformation. | 0 | 0.34 | 2018 |
How Shall We Play a Game?: A Game-theoretical Model for Cyber-warfare Games | 0 | 0.34 | 2017 |
Piston: Uncooperative Remote Runtime Patching. | 1 | 0.39 | 2017 |
Ramblr: Making Reassembly Great Again. | 9 | 0.49 | 2017 |
Bootstomp: On The Security Of Bootloaders In Mobile Devices | 4 | 0.51 | 2017 |
DIFUZE: Interface Aware Fuzzing for Kernel Drivers. | 5 | 0.43 | 2017 |
Angr - The Next Generation of Binary Analysis. | 0 | 0.34 | 2017 |
Rise of the HaCRS: Augmenting Autonomous Cyber Reasoning Systems with Human Assistance. | 20 | 0.90 | 2017 |
Your Exploit is Mine: Automatic Shellcode Transplant for Remote Exploits | 8 | 0.76 | 2017 |
SOK: (State of) The Art of War: Offensive Techniques in Binary Analysis. | 64 | 1.82 | 2016 |
Driller: Augmenting Fuzzing Through Selective Symbolic Execution. | 93 | 2.70 | 2016 |
Portrait of a Privacy Invasion | 3 | 0.39 | 2015 |
Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware. | 52 | 3.33 | 2015 |
How the ELF Ruined Christmas | 4 | 0.40 | 2015 |
Protecting Web-Based Single Sign-on Protocols against Relying Party Impersonation Attacks through a Dedicated Bi-directional Authenticated Secure Channel. | 3 | 0.41 | 2014 |
Ten Years of iCTF: The Good, The Bad, and The Ugly. | 15 | 1.39 | 2014 |
Pexy: The Other Side Of Exploit Kits | 7 | 0.46 | 2014 |
Do you feel lucky?: a large-scale analysis of risk-rewards trade-offs in cyber security | 4 | 0.72 | 2014 |
Steal this movie - automatically bypassing DRM protection in streaming media services | 9 | 0.57 | 2013 |
Blacksheep: detecting compromised hosts in homogeneous crowds | 14 | 0.63 | 2012 |