Backporting Security Patches of Web Applications: A Prototype Design and Implementation on Injection Vulnerability Patches | 0 | 0.34 | 2022 |
GraphTrack: A Graph-based Cross-Device Tracking Framework. | 0 | 0.34 | 2022 |
Mining Node.js Vulnerabilities via Object Dependence Graph and Query | 0 | 0.34 | 2022 |
Detecting Node.js prototype pollution vulnerabilities via object lookup analysis | 0 | 0.34 | 2021 |
Practical Blind Membership Inference Attack Via Differential Comparisons | 1 | 0.35 | 2021 |
Runtime Recovery of Web Applications under Zero-Day ReDoS Attacks | 1 | 0.34 | 2021 |
TKPERM: Cross-platform Permission Knowledge Transfer to Detect Overprivileged Third-party Applications | 0 | 0.34 | 2020 |
TextExerciser: Feedback-driven Text Input Exercising for Android Applications | 0 | 0.34 | 2020 |
Enhancing State-of-the-art Classifiers with API Semantics to Detect Evolved Android Malware | 5 | 0.43 | 2020 |
JSKernel: Fortifying JavaScript against Web Concurrency Attacks via a Kernel-Like Structure | 0 | 0.34 | 2020 |
Who Touched My Browser Fingerprint?: A Large-scale Measurement Study and Classification of Fingerprint Dynamics | 0 | 0.34 | 2020 |
Rendered Private: Making Glsl Execution Uniform To Prevent Webgl-Based Browser Fingerprinting | 0 | 0.34 | 2019 |
Bringing Engineering Rigor to Deep Learning | 0 | 0.34 | 2019 |
Session details: Session 8C: Information Flow | 0 | 0.34 | 2018 |
Efficient Repair of Polluted Machine Learning Systems via Causal Unlearning. | 0 | 0.34 | 2018 |
Efficient Repair of Polluted Machine Learning Systems via Causal Unlearning. | 2 | 0.48 | 2018 |
Deterministic Browser. | 1 | 0.35 | 2017 |
DeepXplore: Automated Whitebox Testing of Deep Learning Systems. | 89 | 2.06 | 2017 |
Towards Practical Verification of Machine Learning: The Case of Computer Vision Systems. | 5 | 0.46 | 2017 |
(Cross-)Browser Fingerprinting via OS and Hardware Level Features. | 13 | 0.64 | 2017 |
CSPAutoGen: Black-box Enforcement of Content Security Policy upon Real-world Websites. | 8 | 0.50 | 2016 |
SafePay: Protecting against credit card forgery with existing magnetic card readers | 1 | 0.35 | 2015 |
Towards Making Systems Forget with Machine Unlearning | 17 | 0.66 | 2015 |
Vetting SSL Usage in Applications with SSLINT | 12 | 0.56 | 2015 |
I Do Not Know What You Visited Last Summer: Protecting users from stateful third-party web tracking with TrackingFree browser. | 1 | 0.35 | 2015 |
EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework. | 58 | 1.34 | 2015 |
Uranine: Real-time Privacy Leakage Monitoring without System Modification for Android. | 9 | 0.48 | 2015 |
Protecting Web-Based Single Sign-on Protocols against Relying Party Impersonation Attacks through a Dedicated Bi-directional Authenticated Secure Channel. | 3 | 0.41 | 2014 |
Abusing Browser Address Bar for Fun and Profit - An Empirical Investigation of Add-On Cross Site Scripting Attacks. | 0 | 0.34 | 2014 |
JShield: towards real-time and vulnerability-based detection of polluted drive-by download attacks. | 10 | 0.51 | 2014 |
De-obfuscation and Detection of Malicious PDF Files with High Accuracy | 11 | 0.56 | 2013 |
Redefining web browser principals with a Configurable Origin Policy | 7 | 0.53 | 2013 |
Virtual browser: a virtualized browser to sandbox third-party JavaScripts with enhanced security | 7 | 0.47 | 2012 |
PathCutter: Severing the Self-Propagation Path of XSS JavaScript Worms in Social Web Networks. | 21 | 0.79 | 2012 |
Rake: Semantics assisted network-based tracing framework | 2 | 0.40 | 2011 |
Poster: a path-cutting approach to blocking XSS worms in social web networks | 0 | 0.34 | 2011 |
WebShield: Enabling Various Web Defense Techniques without Client Side Modifications. | 11 | 0.58 | 2011 |
Virtual browser: a web-level sandbox to secure third-party JavaScript without sacrificing functionality | 2 | 0.38 | 2010 |