MPKAlloc: Efficient Heap Meta-data Integrity Through Hardware Memory Protection Keys | 0 | 0.34 | 2022 |
HotFuzz: Discovering Temporal and Spatial Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing | 0 | 0.34 | 2022 |
DICE - Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis. | 0 | 0.34 | 2021 |
Clustering and the Weekend Effect - Recommendations for the Use of Top Domain Lists in Security Research. | 0 | 0.34 | 2019 |
A Longitudinal Analysis of the ads.txt Standard | 0 | 0.34 | 2019 |
Thou Shalt Not Depend on Me: Analysing the Use of Outdated JavaScript Libraries on the Web. | 22 | 0.78 | 2018 |
How Tracking Companies Circumvented Ad Blockers Using WebSockets. | 0 | 0.34 | 2018 |
Include Me Out: In-Browser Detection of Malicious Third-Party Content Inclusions. | 2 | 0.36 | 2018 |
Eraser: Your Data Won't Be Back | 0 | 0.34 | 2018 |
From Deletion to Re-Registration in Zero Seconds: Domain Registrar Behaviour During the Drop. | 0 | 0.34 | 2018 |
Surveylance: Automatically Detecting Online Survey Scams | 3 | 0.40 | 2018 |
Protecting against Ransomware: A New Line of Research or Restating Classic Ideas? | 1 | 0.36 | 2018 |
Large-Scale Analysis of Style Injection by Relative Path Overwrite. | 0 | 0.34 | 2018 |
Tracing Information Flows Between Ad Exchanges Using Retargeted Ads | 13 | 0.71 | 2018 |
On The Misuse Of Graphical User Interface Elements To Implement Security Controls | 0 | 0.34 | 2017 |
Semi-automated discovery of server-based information oversharing vulnerabilities in Android applications. | 2 | 0.37 | 2017 |
Game Of Registrars: An Empirical Analysis Of Post-Expiration Domain Name Takeovers | 2 | 0.36 | 2017 |
Ex-Ray: Detection of History-Leaking Browser Extensions. | 7 | 0.47 | 2017 |
WHOIS Lost in Translation: (Mis)Understanding Domain Name Expiration and Re-Registration. | 6 | 0.41 | 2016 |
Unveil: A Large-Scale, Automated Approach To Detecting Ransomware | 32 | 1.81 | 2016 |
Runtime Integrity Checking for Exploit Mitigation on Lightweight Embedded Devices. | 1 | 0.37 | 2016 |
CuriousDroid: Automated User Interface Interaction for Android Application Analysis Sandboxes. | 0 | 0.34 | 2016 |
Overhaul: Input-Driven Access Control for Better Privacy on Traditional Operating Systems | 2 | 0.37 | 2016 |
EmailProfiler: Spearphishing Filtering with Header and Stylometric Features of Emails | 2 | 0.36 | 2016 |
CrossFire: An Analysis of Firefox Extension-Reuse Vulnerabilities. | 3 | 0.40 | 2016 |
TriggerScope: Towards Detecting Logic Bombs in Android Applications | 29 | 0.80 | 2016 |
LAVA: Large-Scale Automated Vulnerability Addition | 35 | 1.20 | 2016 |
On the Security and Engineering Implications of Finer-Grained Access Controls for Android Developers and Users | 6 | 0.41 | 2015 |
Cutting the gordian knot: A look under the hood of ransomware attacks | 57 | 3.02 | 2015 |
SLA-Based Time-Aware Provisioning Mechanisms in Shared Mesh Protected Optical Networks. | 0 | 0.34 | 2015 |
SENTINEL: Securing Legacy Firefox Extensions. | 3 | 0.42 | 2015 |
ZigZag: Automatically Hardening Web Applications Against Client-side Validation Vulnerabilities | 7 | 0.54 | 2015 |
BabelCrypt: The Universal Encryption Layer for Mobile Messaging Applications. | 1 | 0.36 | 2015 |
Zeqos: A New Energy And Qos-Aware Routing Protocol For Communication Of Sensor Devices In Healthcare System | 10 | 0.49 | 2014 |
VirtualSwindle: an automated attack against in-app billing on android | 13 | 0.68 | 2014 |
Hidden GEMs: Automated Discovery of Access Control Vulnerabilities in Graphical User Interfaces | 3 | 0.39 | 2014 |
TrueClick: automatically distinguishing trick banners from genuine download links. | 5 | 0.42 | 2014 |
Optical Delusions: A Study of Malicious QR Codes in the Wild | 9 | 0.68 | 2014 |
Why Is CSP Failing? Trends and Challenges in CSP Adoption. | 22 | 1.14 | 2014 |
Scalable Approach To Dynamic Sla Negotiation Mechanism In Protected Shared Mesh Optical Networks | 2 | 0.40 | 2013 |
Enhanced Adaptive SLA-aware Algorithms for Provisioning Shared Mesh Optical Networks. | 0 | 0.34 | 2013 |
Securing legacy firefox extensions with SENTINEL | 7 | 0.47 | 2013 |
Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks | 51 | 2.41 | 2013 |
PatchDroid: scalable third-party security patches for Android devices | 22 | 0.71 | 2013 |
A Practical, Targeted, and Stealthy Attack Against WPA Enterprise Authentication. | 16 | 0.86 | 2013 |
A dual-mode energy efficient encryption protocol for wireless sensor networks | 0 | 0.34 | 2013 |
PrivExec: Private Execution as an Operating System Service | 17 | 0.64 | 2013 |
SN-SEC: a secure wireless sensor platform with hardware cryptographic primitives | 2 | 0.39 | 2013 |
Holiday Pictures Or Blockbuster Movies? Insights Into Copyright Infringement In User Uploads To One-Click File Hosters | 4 | 0.46 | 2013 |
Disclosure: detecting botnet command and control servers through large-scale NetFlow analysis | 77 | 2.68 | 2012 |