DECOMPERSON: How Humans Decompile and What We Can Learn From It | 0 | 0.34 | 2022 |
Journey to the Center of the Cookie Ecosystem: Unraveling Actors' Roles and Relationships | 0 | 0.34 | 2022 |
Regulator: Dynamic Analysis to Detect ReDoS | 0 | 0.34 | 2022 |
Toward a secure crowdsourced location tracking system | 1 | 0.40 | 2021 |
Glitching Demystified: Analyzing Control-flow-based Glitching Attacks and Defenses | 0 | 0.34 | 2021 |
One Size Does Not Fit All: A Longitudinal Analysis of Brazilian Financial Malware | 0 | 0.34 | 2021 |
Tracing and Analyzing Web Access Paths Based on User-Side Data Collection: How Do Users Reach Malicious URLs? | 0 | 0.34 | 2020 |
On the Security of Application Installers and Online Software Repositories. | 0 | 0.34 | 2020 |
When Malware is Packin' Heat; Limits of Machine Learning Classifiers Based on Static Analysis Features | 5 | 0.47 | 2020 |
SYMBION: Interleaving Symbolic with Concrete Execution | 0 | 0.34 | 2020 |
Exploring Abstraction Functions in Fuzzing | 0 | 0.34 | 2020 |
SPIDER: Enabling Fast Patch Propagation In Related Software Repositories | 1 | 0.35 | 2020 |
Lightning Talk - Think Outside the Dataset: Finding Fraudulent Reviews using Cross-Dataset Analysis | 0 | 0.34 | 2019 |
Toward The Analysis Of Embedded Firmware Through Automated Re-Hosting | 0 | 0.34 | 2019 |
BootKeeper - Validating Software Integrity Properties on Boot Firmware Images. | 0 | 0.34 | 2019 |
Mechanical Phish: Resilient Autonomous Hacking. | 2 | 0.39 | 2018 |
Measuring E-mail header injections on the world wide web. | 2 | 0.37 | 2018 |
MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense. | 14 | 0.91 | 2018 |
Enumerating Active IPv6 Hosts for Large-Scale Security Scans via DNSSEC-Signed Reverse Zones | 2 | 0.39 | 2018 |
Detecting Deceptive Reviews Using Generative Adversarial Networks | 4 | 0.38 | 2018 |
Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis. | 9 | 0.48 | 2017 |
Demystifying DDoS as a Service. | 0 | 0.34 | 2017 |
How Shall We Play a Game?: A Game-theoretical Model for Cyber-warfare Games | 0 | 0.34 | 2017 |
POISED: Spotting Twitter Spam Off the Beaten Paths. | 7 | 0.45 | 2017 |
Dr. Checker: A Soundy Analysis For Linux Kernel Drivers | 1 | 0.35 | 2017 |
Piston: Uncooperative Remote Runtime Patching. | 1 | 0.39 | 2017 |
SOK: (State of) The Art of War: Offensive Techniques in Binary Analysis. | 64 | 1.82 | 2016 |
Going Native: Using a Large-Scale Analysis of Android Apps to Create a Practical Native-Code Sandboxing Policy. | 24 | 0.73 | 2016 |
BareDroid: Large-Scale Analysis of Android Apps on Real Devices | 22 | 0.71 | 2015 |
Towards Detecting Compromised Accounts on Social Networks. | 24 | 0.81 | 2015 |
On the Security and Engineering Implications of Finer-Grained Access Controls for Android Developers and Users | 6 | 0.41 | 2015 |
Meerkat: detecting website defacements through image-based object recognition | 7 | 0.60 | 2015 |
NJAS: Sandboxing Unmodified Applications in non-rooted Devices Running stock Android | 14 | 0.58 | 2015 |
Framing Dependencies Introduced by Underground Commoditization. | 1 | 0.35 | 2015 |
What the App is That? Deception and Countermeasures in the Android User Interface | 44 | 1.40 | 2015 |
Relevant change detection: a framework for the precise extraction of modified and novel web-based content as a filtering technique for analysis engines | 6 | 0.44 | 2014 |
Protecting Web-Based Single Sign-on Protocols against Relying Party Impersonation Attacks through a Dedicated Bi-directional Authenticated Secure Channel. | 3 | 0.41 | 2014 |
Ten Years of iCTF: The Good, The Bad, and The Ugly. | 15 | 1.39 | 2014 |
Extracting probable command and control signatures for detecting botnets | 12 | 0.70 | 2014 |
Rippler: Delay injection for service dependency detection | 8 | 0.52 | 2014 |
Eyes of a Human, Eyes of a Program: Leveraging Different Views of the Web for Analysis and Detection. | 3 | 0.38 | 2014 |
Stranger danger: exploring the ecosystem of ad-based URL shortening services | 16 | 0.83 | 2014 |
Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting | 112 | 4.53 | 2013 |
Formulating Cyber-Security as Convex Optimization Problems | 2 | 0.65 | 2013 |
Two years of short URLs internet measurement: security threats and countermeasures | 23 | 1.11 | 2013 |
Message in a bottle: sailing past censorship | 15 | 0.66 | 2013 |
COMPA: Detecting Compromised Accounts on Social Networks. | 23 | 1.00 | 2013 |
Shady paths: leveraging surfing crowds to detect malicious web pages | 43 | 1.31 | 2013 |
Steal this movie - automatically bypassing DRM protection in streaming media services | 9 | 0.57 | 2013 |
PUBCRAWL: protecting users and businesses from CRAWLers | 13 | 0.66 | 2012 |