Perils and Mitigation of Security Risks of Cooperation in Mobile-as-a-Gateway IoT | 0 | 0.34 | 2022 |
Demystifying the Dependency Challenge in Kernel Fuzzing | 0 | 0.34 | 2022 |
Annotating, Tracking, and Protecting Cryptographic Secrets with CryptoMPK | 0 | 0.34 | 2022 |
Who Moves My App Promotion Investment? A Systematic Study About App Distribution Fraud | 0 | 0.34 | 2022 |
SyzScope: Revealing High-Risk Security Impacts of Fuzzer-Exposed Bugs in Linux kernel | 0 | 0.34 | 2022 |
LinKRID: Vetting Imbalance Reference Counting in Linux kernel with Symbolic Execution | 0 | 0.34 | 2022 |
DNS Poisoning of Operating System Caches: Attacks and Mitigations | 0 | 0.34 | 2022 |
SyzGen: Automated Generation of Syscall Specification of Closed-Source macOS Drivers | 1 | 0.36 | 2021 |
An Empirical Analysis of Hazardous Uses of Android Shared Storage | 0 | 0.34 | 2021 |
Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison | 0 | 0.34 | 2021 |
An Investigation of the Android Kernel Patch Ecosystem | 0 | 0.34 | 2021 |
SYZVEGAS: Beating Kernel Fuzzing Odds with Reinforcement Learning | 0 | 0.34 | 2021 |
Statically Discovering High-Order Taint Style Vulnerabilities in OS Kernels | 0 | 0.34 | 2021 |
Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison | 0 | 0.34 | 2021 |
PolyScope: Multi-Policy Access Control Analysis to Compute Authorized Attack Operations in Android Systems | 0 | 0.34 | 2021 |
Side Channel Attacks on GPUs | 0 | 0.34 | 2021 |
A nationwide census on wifi security threats: prevalence, riskiness, and the economics | 0 | 0.34 | 2021 |
Eluding ML-based Adblockers With Actionable Adversarial Examples. | 0 | 0.34 | 2021 |
Undo Workarounds for Kernel Bugs | 0 | 0.34 | 2021 |
DNS Cache Poisoning Attack: Resurrections with Side Channels | 0 | 0.34 | 2021 |
Resilient User-Side Android Application Repackaging and Tampering Detection Using Cryptographically Obfuscated Logic Bombs | 2 | 0.37 | 2021 |
SymTCP: Eluding Stateful Deep Packet Inspection with Automated Discrepancy Discovery | 1 | 0.40 | 2020 |
Packet Header Obfuscation Using MIMO | 0 | 0.34 | 2020 |
DNS Cache Poisoning Attack Reloaded: Revolutions with Side Channels | 5 | 0.49 | 2020 |
Experiences of landing machine learning onto market-scale mobile malware detection | 2 | 0.37 | 2020 |
UBITect: a precise and scalable method to detect use-before-initialization bugs in Linux kernel | 0 | 0.34 | 2020 |
You Do (Not) Belong Here: Detecting DPI Evasion Attacks with Context Learning | 1 | 0.36 | 2020 |
Unveiling your keystrokes - A Cache-based Side-channel Attack on Graphics Libraries. | 1 | 0.34 | 2019 |
Collaborative Client-Side DNS Cache Poisoning Attack | 2 | 0.39 | 2019 |
Employing attack graphs for intrusion detection. | 2 | 0.38 | 2019 |
PAPP: Prefetcher-Aware Prime and Probe Side-channel Attack | 1 | 0.35 | 2019 |
ForeSee: A Cross-Layer Vulnerability Detection Framework for the Internet of Things | 0 | 0.34 | 2019 |
Principled Unearthing of TCP Side Channel Vulnerabilities | 1 | 0.37 | 2019 |
Application Level Attacks On Connected Vehicle Protocols | 0 | 0.34 | 2019 |
App in the Middle: Demystify Application Virtualization in Android and its Security Threats | 1 | 0.37 | 2019 |
Figment: Fine-grained Permission Management for Mobile Apps | 0 | 0.34 | 2019 |
ShadowBlock: A Lightweight and Stealthy Adblocking Browser | 1 | 0.35 | 2019 |
Catch Me if You Can: A Closer Look at Malicious Co-Residency on the Cloud | 1 | 0.38 | 2019 |
Off-Path TCP Exploits of the Challenge ACK Global Rate Limit. | 1 | 0.40 | 2018 |
Resilient decentralized Android application repackaging detection using logic bombs. | 1 | 0.35 | 2018 |
Accurate and Efficient Wireless Device Fingerprinting Using Channel State Information. | 0 | 0.34 | 2018 |
Measuring and Disrupting Anti-Adblockers Using Differential Execution Analysis. | 2 | 0.36 | 2018 |
A Framework for MIMO-based Packet Header Obfuscation. | 0 | 0.34 | 2018 |
Static Evaluation of Noninterference Using Approximate Model Counting | 0 | 0.34 | 2018 |
Rendered Insecure: GPU Side Channel Attacks are Practical. | 20 | 0.66 | 2018 |
AdGraph: A Machine Learning Approach to Automatic and Effective Adblocking. | 1 | 0.35 | 2018 |
Invetter: Locating Insecure Input Validations in Android Services. | 4 | 0.43 | 2018 |
Droid M+: Developer Support for Imbibing Android's New Permission Model. | 2 | 0.36 | 2018 |
How You Get Shot in the Back: A Systematical Study about Cryptojacking in the Real World. | 6 | 0.58 | 2018 |
IotSan: fortifying the safety of IoT systems | 15 | 0.69 | 2018 |