FRAMESHIFTER: Security Implications of HTTP/2-to-HTTP/1 Conversion Anomalies | 0 | 0.34 | 2022 |
Who’s Controlling My Device? Multi-User Multi-Device-Aware Access Control System for Shared Smart Home Environment | 0 | 0.34 | 2022 |
GhostBuster: understanding and overcoming the pitfalls of transient execution vulnerability checkers | 0 | 0.34 | 2021 |
DICE - Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis. | 0 | 0.34 | 2021 |
You'Ve Got (A Reset) Mail: A Security Analysis Of Email-Based Password Reset Procedures | 0 | 0.34 | 2021 |
SoK: Cryptojacking Malware | 1 | 0.37 | 2021 |
Kratos: multi-user multi-device-aware access control system for the smart home | 0 | 0.34 | 2020 |
HotFuzz: Discovering Algorithmic Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing | 1 | 0.35 | 2020 |
Usbesafe: An End-Point Solution To Protect Against Usb-Based Attacks | 0 | 0.34 | 2019 |
Clustering and the Weekend Effect - Recommendations for the Use of Top Domain Lists in Security Research. | 0 | 0.34 | 2019 |
A Longitudinal Analysis of the ads.txt Standard | 0 | 0.34 | 2019 |
Thou Shalt Not Depend on Me: Analysing the Use of Outdated JavaScript Libraries on the Web. | 22 | 0.78 | 2018 |
How Tracking Companies Circumvented Ad Blockers Using WebSockets. | 0 | 0.34 | 2018 |
Eraser: Your Data Won't Be Back | 0 | 0.34 | 2018 |
From Deletion to Re-Registration in Zero Seconds: Domain Registrar Behaviour During the Drop. | 0 | 0.34 | 2018 |
Surveylance: Automatically Detecting Online Survey Scams | 3 | 0.40 | 2018 |
Protecting against Ransomware: A New Line of Research or Restating Classic Ideas? | 1 | 0.36 | 2018 |
Large-Scale Analysis of Style Injection by Relative Path Overwrite. | 0 | 0.34 | 2018 |
Traffic Measurements for Cyber Security. | 0 | 0.34 | 2017 |
UNVEIL: A large-scale, automated approach to detecting ransomware (keynote) | 3 | 0.43 | 2017 |
On The Misuse Of Graphical User Interface Elements To Implement Security Controls | 0 | 0.34 | 2017 |
WHOIS Lost in Translation: (Mis)Understanding Domain Name Expiration and Re-Registration. | 6 | 0.41 | 2016 |
Unveil: A Large-Scale, Automated Approach To Detecting Ransomware | 32 | 1.81 | 2016 |
Runtime Integrity Checking for Exploit Mitigation on Lightweight Embedded Devices. | 1 | 0.37 | 2016 |
On the Security and Engineering Implications of Finer-Grained Access Controls for Android Developers and Users | 6 | 0.41 | 2015 |
Cutting the gordian knot: A look under the hood of ransomware attacks | 57 | 3.02 | 2015 |
SENTINEL: Securing Legacy Firefox Extensions. | 3 | 0.42 | 2015 |
A look at targeted attacks through the lense of an NGO | 15 | 1.02 | 2014 |
VirtualSwindle: an automated attack against in-app billing on android | 13 | 0.68 | 2014 |
Hidden GEMs: Automated Discovery of Access Control Vulnerabilities in Graphical User Interfaces | 3 | 0.39 | 2014 |
TrueClick: automatically distinguishing trick banners from genuine download links. | 5 | 0.42 | 2014 |
Optical Delusions: A Study of Malicious QR Codes in the Wild | 9 | 0.68 | 2014 |
Exposure: A Passive DNS Analysis Service to Detect and Report Malicious Domains | 52 | 1.88 | 2014 |
Securing legacy firefox extensions with SENTINEL | 7 | 0.47 | 2013 |
Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks | 51 | 2.41 | 2013 |
PatchDroid: scalable third-party security patches for Android devices | 22 | 0.71 | 2013 |
A Practical, Targeted, and Stealthy Attack Against WPA Enterprise Authentication. | 16 | 0.86 | 2013 |
PUBCRAWL: protecting users and businesses from CRAWLers | 13 | 0.66 | 2012 |
Privacy risks in named data networking: what is the cost of performance? | 30 | 1.10 | 2012 |
Paying for piracy? an analysis of one-click hosters' controversial reward schemes | 4 | 0.47 | 2012 |
A survey on automated dynamic malware-analysis techniques and tools | 205 | 6.55 | 2012 |
NSDI '12 and LEET '12. | 0 | 0.34 | 2012 |
Disclosure: detecting botnet command and control servers through large-scale NetFlow analysis | 77 | 2.68 | 2012 |
Insights into User Behavior in Dealing with Internet Attacks. | 6 | 0.53 | 2012 |
A quantitative study of accuracy in system call-based malware detection | 53 | 1.50 | 2012 |
An empirical analysis of input validation mechanisms in web applications and languages | 6 | 0.49 | 2012 |
Quo vadis? a study of the evolution of input validation vulnerabilities in web applications | 19 | 1.30 | 2011 |
EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis. | 59 | 2.50 | 2011 |
PiOS: Detecting Privacy Leaks in iOS Applications. | 97 | 12.82 | 2011 |
Automated Discovery of Parameter Pollution Vulnerabilities in Web Applications. | 16 | 0.97 | 2011 |