Playing for K(H)eaps: Understanding and Improving Linux Kernel Exploit Reliability | 0 | 0.34 | 2022 |
CrawlPhish: Large-Scale Analysis of Client-Side Cloaking Techniques in Phishing | 0 | 0.34 | 2022 |
Improving Source-Code Representations to Enhance Search-based Software Repair | 0 | 0.34 | 2022 |
Context-Auditor: Context-sensitive Content Injection Mitigation. | 0 | 0.34 | 2022 |
Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs | 0 | 0.34 | 2022 |
Unleash the Simulacrum: Shifting Browser Realities for Robust Extension-Fingerprinting Prevention | 0 | 0.34 | 2022 |
CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing | 1 | 0.38 | 2021 |
Favocado: Fuzzing The Binding Code Of Javascript Engines Using Semantically Correct Test Cases | 1 | 0.35 | 2021 |
Everything You Ever Wanted to Know About Bitcoin Mixers (But Were Afraid to Ask) | 0 | 0.34 | 2021 |
Security Analysis on Practices of Certificate Authorities in the HTTPS Phishing Ecosystem | 0 | 0.34 | 2021 |
Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-Service | 0 | 0.34 | 2021 |
Scam Pandemic: How Attackers Exploit Public Fear through Phishing | 2 | 0.39 | 2020 |
Exploiting Uses of Uninitialized Stack Variables in Linux Kernels to Leak Kernel Pointers. | 0 | 0.34 | 2020 |
Exploring Abstraction Functions in Fuzzing | 0 | 0.34 | 2020 |
HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems | 5 | 0.46 | 2020 |
SmokeBomb: effective mitigation against cache side-channel attacks on the ARM architecture | 0 | 0.34 | 2020 |
You shall not pass: Mitigating SQL Injection Attacks on Legacy Web Applications | 0 | 0.34 | 2020 |
iCore - continuous and proactive extrospection on multi-core IoT devices. | 0 | 0.34 | 2019 |
Matched and Mismatched SOCs: A Qualitative Study on Security Operations Center Issues | 4 | 0.45 | 2019 |
History and Future of Automated Vulnerability Analysis | 0 | 0.34 | 2019 |
Understanding and Predicting Private Interactions in Underground Forums. | 1 | 0.35 | 2019 |
Everyone Is Different: Client-Side Diversification For Defending Against Extension Fingerprinting | 0 | 0.34 | 2019 |
Users Really Do Answer Telephone Scams | 0 | 0.34 | 2019 |
Session details: Session 8A: Web Security 1 | 0 | 0.34 | 2018 |
Measuring E-mail header injections on the world wide web. | 2 | 0.37 | 2018 |
Challenges, Opportunities and a Framework for Web Environment Forensics. | 0 | 0.34 | 2018 |
AIM-SDN: Attacking Information Mismanagement in SDN-datastores. | 1 | 0.35 | 2018 |
CacheLight: Defeating the CacheKit Attack. | 0 | 0.34 | 2018 |
SeCore: Continuous Extrospection with High Visibility on Multi-core ARM Platforms. | 0 | 0.34 | 2018 |
Challenges and Preparedness of SDN-based Firewalls. | 0 | 0.34 | 2018 |
Inside a phisher's mind: Understanding the anti-phishing ecosystem through phishing kit analysis | 0 | 0.34 | 2018 |
HoneyProxy: Design and implementation of next-generation honeynet via SDN. | 1 | 0.34 | 2017 |
Panel: Trustworthy Data Science. | 0 | 0.34 | 2017 |
Toward Standardization of Authenticated Caller ID Transmission. | 0 | 0.34 | 2017 |
Mutated Policies: Towards Proactive Attribute-based Defenses for Access Control. | 0 | 0.34 | 2017 |
A Game Theoretic Approach to Strategy Generation for Moving Target Defense in Web Applications. | 4 | 0.42 | 2017 |
Deep Android Malware Detection. | 38 | 1.12 | 2017 |
E-Mail Header Injection Vulnerabilities | 0 | 0.34 | 2017 |
Shell We Play A Game? CTF-as-a-service for Security Education. | 2 | 0.42 | 2017 |
HoneyMix: Toward SDN-based Intelligent Honeynet. | 7 | 0.56 | 2016 |
dbling: Identifying extensions installed on encrypted web thin clients | 0 | 0.34 | 2016 |
Towards Automated Threat Intelligence Fusion | 1 | 0.35 | 2016 |
Target Fragmentation in Android Apps | 12 | 0.56 | 2016 |
Going Native: Using a Large-Scale Analysis of Android Apps to Create a Practical Native-Code Sandboxing Policy. | 24 | 0.73 | 2016 |
Checking Intent-based Communication in Android with Intent Space Analysis. | 8 | 0.44 | 2016 |
SoK: Everyone Hates Robocalls: A Survey of Techniques Against Telephone Spam | 12 | 0.53 | 2016 |
dbling | 0 | 0.34 | 2016 |
Position Paper: Towards a Moving Target Defense Approach for Attribute-based Access Control. | 0 | 0.34 | 2016 |
Moving Target Defense for Web Applications using Bayesian Stackelberg Games: (Extended Abstract). | 1 | 0.35 | 2016 |
Moving Target Defense for Web Applications using Bayesian Stackelberg Games. | 5 | 0.54 | 2016 |