One Engine to Fuzz ’em All: Generic Language Processor Testing with Semantic Validation | 2 | 0.36 | 2021 |
Validating the Integrity of Audit Logs Against Execution Repartitioning Attacks | 1 | 0.35 | 2021 |
SEPAL: Towards a Large-scale Analysis of SEAndroid Policy Customization | 0 | 0.34 | 2021 |
Stopping Memory Disclosures via Diversification and Replicated Execution | 1 | 0.35 | 2021 |
DeepReflect: Discovering Malicious Functionality through Binary Reconstruction | 0 | 0.34 | 2021 |
Quickest Detection of Advanced Persistent Threats: A Semi-Markov Game Approach | 0 | 0.34 | 2020 |
Machine Learning and Security: The Good, The Bad, and The Ugly | 0 | 0.34 | 2020 |
A Game-Theoretic Approach for Dynamic Information Flow Tracking to Detect Multistage Advanced Persistent Threats | 0 | 0.34 | 2020 |
SQUIRREL: Testing Database Management Systems with Language Validity and Coverage Feedback | 7 | 0.47 | 2020 |
Stochastic Dynamic Information Flow Tracking Game With Reinforcement Learning | 0 | 0.34 | 2019 |
Razor: A Framework For Post-Deployment Software Debloating | 1 | 0.35 | 2019 |
Enforcing Unique Code Target Property for Control-Flow Integrity. | 6 | 0.41 | 2018 |
Efficient Protection Of Path-Sensitive Control Security | 5 | 0.40 | 2017 |
Cloaker Catcher: A Client-based Cloaking Detection System. | 0 | 0.34 | 2017 |
Identifying Open-Source License Violation and 1-day Security Risk at Large Scale. | 7 | 0.42 | 2017 |
RecProv: Towards Provenance-Aware User Space Record and Replay. | 3 | 0.38 | 2016 |
From Physical to Cyber: Escalating Protection for Personalized Auto Insurance. | 3 | 0.40 | 2016 |
Financial Lower Bounds of Online Advertising Abuse - A Four Year Case Study of the TDSS/TDL4 Botnet. | 1 | 0.34 | 2016 |
UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages. | 16 | 0.91 | 2016 |
ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks | 40 | 0.93 | 2015 |
Preventing Use-after-free with Dangling Pointers Nullification. | 24 | 0.81 | 2015 |
Exploiting and Protecting Dynamic Code Generation. | 18 | 0.67 | 2015 |
Type casting verification: stopping an emerging attack vector | 15 | 0.67 | 2015 |
Your Online Interests: Pwned! A Pollution Attack Against Targeted Advertising | 4 | 0.41 | 2014 |
Mimesis aegis: a mimicry privacy shield a system's approach to data privacy on public cloud | 12 | 0.66 | 2014 |
On the feasibility of large-scale infections of iOS devices | 7 | 0.82 | 2014 |
Diagnosis And Emergency Patch Generation For Integer Overflow Exploits | 2 | 0.37 | 2014 |
A11y Attacks: Exploiting Accessibility in Operating Systems | 19 | 1.11 | 2014 |
Beheading hydras: performing effective botnet takedowns | 21 | 0.86 | 2013 |
Jekyll on iOS: when benign apps become evil | 52 | 1.96 | 2013 |
Intention and Origination: An Inside Look at Large-Scale Bot Queries. | 4 | 0.52 | 2013 |
Connected Colors: Unveiling The Structure Of Criminal Networks | 11 | 0.54 | 2013 |
Tappan Zee (north) bridge: mining memory accesses for introspection | 29 | 0.99 | 2013 |
Take this personally: pollution attacks on personalized services | 7 | 0.57 | 2013 |
An Empirical Study of Spam and Prevention Mechanisms in Online Video Chat Services | 0 | 0.34 | 2012 |
Secure and robust monitoring of virtual machines through guest-assisted introspection | 28 | 0.81 | 2012 |
Detecting and Tracking the Rise of DGA-Based Malware. | 0 | 0.34 | 2012 |
Impeding automated malware analysis with environment-sensitive malware | 9 | 0.57 | 2012 |
Practical end-to-end web content integrity | 5 | 0.57 | 2012 |
Exposing invisible timing-based traffic watermarks with BACKLIT | 20 | 0.82 | 2011 |
Detecting stealthy P2P botnets using statistical traffic fingerprints | 47 | 1.68 | 2011 |
SURF: detecting and measuring search poisoning | 31 | 1.28 | 2011 |
HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows. | 52 | 1.87 | 2011 |
ARROW: GenerAting SignatuRes to Detect DRive-By DOWnloads | 38 | 1.47 | 2011 |
PEASOUP: preventing exploits against software of uncertain provenance (position paper) | 4 | 0.44 | 2011 |
A centralized monitoring infrastructure for improving DNS security | 19 | 1.26 | 2010 |
On the secrecy of spread-spectrum flow watermarks | 16 | 0.64 | 2010 |
Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009 | 26 | 2.33 | 2009 |
K-Tracer: A System for Extracting Kernel Malware Behavior | 56 | 2.29 | 2009 |
Automatic Reverse Engineering of Malware Emulators | 87 | 2.95 | 2009 |