SFuzz: Slice-based Fuzzing for Real-Time Operating Systems | 0 | 0.34 | 2022 |
Analyzing Ground-Truth Data of Mobile Gambling Scams | 0 | 0.34 | 2022 |
Exploit the Last Straw That Breaks Android Systems | 0 | 0.34 | 2022 |
A Large-scale and Longitudinal Measurement Study of DKIM Deployment | 0 | 0.34 | 2022 |
Timing-Based Browsing Privacy Vulnerabilities Via Site Isolation | 0 | 0.34 | 2022 |
Building an Open, Robust, and Stable Voting-Based Domain Top List | 0 | 0.34 | 2022 |
Invoke-Deobfuscation: AST-Based and Semantics-Preserving Deobfuscation for PowerShell Scripts | 0 | 0.34 | 2022 |
Measuring the Practical Effect of DNS Root Server Instances: A China-Wide Case Study | 0 | 0.34 | 2022 |
ValCAT: Variable-Length Contextualized Adversarial Transformations Using Encoder-Decoder Language Model | 0 | 0.34 | 2022 |
Measuring the Deployment of 5G Security Enhancement | 0 | 0.34 | 2022 |
An Extensive Study of Residential Proxies in China | 0 | 0.34 | 2022 |
HDiff: A Semi-automatic Framework for Discovering Semantic Gap Attack in HTTP Implementations | 0 | 0.34 | 2022 |
Fast IPv6 Network Periphery Discovery and Security Implications | 1 | 0.36 | 2021 |
Mingling of Clear and Muddy Water: Understanding and Detecting Semantic Confusion in Blackhat SEO | 0 | 0.34 | 2021 |
Sharing More and Checking Less: Leveraging Common Input Keywords to Detect Bugs in Embedded Systems | 0 | 0.34 | 2021 |
Weak Links in Authentication Chains: A Large-scale Analysis of Email Sender Spoofing Attacks | 0 | 0.34 | 2021 |
Rusted Anchors: A National Client-Side View of Hidden Root CAs in the Web PKI Ecosystem | 0 | 0.34 | 2021 |
On Evaluating Delegated Digital Signing of Broadcasting Messages in 5G | 0 | 0.34 | 2021 |
TextExerciser: Feedback-driven Text Input Exercising for Android Applications | 0 | 0.34 | 2020 |
Understanding Promotion-as-a-Service on GitHub. | 0 | 0.34 | 2020 |
DNS Cache Poisoning Attack Reloaded: Revolutions with Side Channels | 5 | 0.49 | 2020 |
Argot: Generating Adversarial Readable Chinese Texts | 0 | 0.34 | 2020 |
Lies in the Air: Characterizing Fake-base-station Spam Ecosystem in China | 0 | 0.34 | 2020 |
CDN Backfired: Amplification Attacks Based on HTTP Range Requests | 1 | 0.35 | 2020 |
CDN Judo: Breaking the CDN DoS Protection with Itself | 3 | 0.40 | 2020 |
Talking with Familiar Strangers: An Empirical Study on HTTPS Context Confusion Attacks | 2 | 0.37 | 2020 |
Finding the best answer: measuring the optimization of public and authoritative DNS | 0 | 0.34 | 2019 |
NETHCF: Enabling Line-rate and Adaptive Spoofed IP Traffic Filtering | 1 | 0.41 | 2019 |
Fuzzing IPC with Knowledge Inference | 0 | 0.34 | 2019 |
Casino royale: a deep exploration of illegal online gambling | 1 | 0.35 | 2019 |
TraffickStop: Detecting and Measuring Illicit Traffic Monetization Through Large-Scale DNS Analysis | 1 | 0.35 | 2019 |
An End-to-End, Large-Scale Measurement of DNS-over-Encryption: How Far Have We Come? | 4 | 0.43 | 2019 |
Tl;Dr Hazard: A Comprehensive Study Of Levelsquatting Scams | 0 | 0.34 | 2019 |
Icufuzzer: Fuzzing Icu Library For Exploitable Bugs In Multiple Software | 0 | 0.34 | 2018 |
A Reexamination of Internationalized Domain Names: The Good, the Bad and the Ugly | 2 | 0.37 | 2018 |
Measuring Privacy Threats in China-Wide Mobile Networks. | 0 | 0.34 | 2018 |
Abusing CDNs for Fun and Profit: Security Issues in CDNs' Origin Validation | 1 | 0.36 | 2018 |
How You Get Shot in the Back: A Systematical Study about Cryptojacking in the Real World. | 6 | 0.58 | 2018 |
How to Notify a Vulnerability to the Right Person? Case Study: In an ISP Scope. | 0 | 0.34 | 2017 |
How to Learn Klingon without a Dictionary: Detection and Measurement of Black Keywords Used by the Underground Economy | 2 | 0.64 | 2017 |
Don't Let One Rotten Apple Spoil the Whole Barrel: Towards Automated Detection of Shadowed Domains. | 10 | 0.57 | 2017 |
An accurate distributed scheme for detection of prefix interception. | 0 | 0.34 | 2016 |
Reexamining DNS From a Global Recursive Resolver Perspective | 10 | 0.65 | 2016 |
What You See Isn't Always What You Get: A Measurement Study of Usage Fraud on Android Apps. | 1 | 0.35 | 2016 |
Seeking Nonsense, Looking for Trouble: Efficient Promotional-Infection Detection through Semantic Inconsistency Search | 8 | 0.51 | 2016 |
Host of Troubles: Multiple Host Ambiguities in HTTP Implementations. | 6 | 0.49 | 2016 |
MAF-SAM: An effective method to perceive data plane threats of inter domain routing system. | 1 | 0.34 | 2016 |
Forwarding-Loop Attacks in Content Delivery Networks. | 7 | 0.49 | 2016 |
The Ever-Changing Labyrinth: A Large-Scale Analysis Of Wildcard Dns Powered Blackhat Seo | 5 | 0.44 | 2016 |
Cookies Lack Integrity: Real-World Implications | 12 | 0.61 | 2015 |