When Sally Met Trackers: Web Tracking From the Users' Perspective | 0 | 0.34 | 2022 |
Journey to the Center of the Cookie Ecosystem: Unraveling Actors' Roles and Relationships | 0 | 0.34 | 2022 |
How Machine Learning Is Solving the Binary Function Similarity Problem | 0 | 0.34 | 2022 |
Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs | 0 | 0.34 | 2022 |
In the Land of MMUs: Multiarchitecture OS-Agnostic Virtual Memory Forensics | 0 | 0.34 | 2022 |
LibAFL: A Framework to Build Modular and Reusable Fuzzers | 0 | 0.34 | 2022 |
RE-Mind: a First Look Inside the Mind of a Reverse Engineer | 0 | 0.34 | 2022 |
Does Every Second Count? Time-Based Evolution Of Malware Behavior In Sandboxes | 1 | 0.35 | 2021 |
Trust, But Verify: A Longitudinal Analysis Of Android OEM Compliance and Customization | 0 | 0.34 | 2021 |
When Malware Changed Its Mind - An Empirical Study of Variable Program Behaviors in the Real World. | 0 | 0.34 | 2021 |
Lost in the Loader - The Many Faces of the Windows PE File Format. | 1 | 0.35 | 2021 |
The evidence beyond the wall: Memory forensics in SGX environments | 0 | 0.34 | 2021 |
Prevalence and Impact of Low-Entropy Packing Schemes in the Malware Ecosystem | 2 | 0.37 | 2020 |
When Malware is Packin' Heat; Limits of Machine Learning Classifiers Based on Static Analysis Features | 5 | 0.47 | 2020 |
SoK: Cyber Insurance – Technical Challenges and a System Security Roadmap | 1 | 0.35 | 2020 |
Dirty Clicks: A Study of the Usability and Security Implications of Click-related Behaviors on the Web | 0 | 0.34 | 2020 |
The Tangled Genealogy of IoT Malware. | 3 | 0.39 | 2020 |
Introducing the Temporal Dimension to Memory Forensics. | 0 | 0.34 | 2019 |
Back To The Whiteboard: A Principled Approach For The Assessment And Design Of Memory Forensic Techniques | 0 | 0.34 | 2019 |
Toward The Analysis Of Embedded Firmware Through Automated Re-Hosting | 0 | 0.34 | 2019 |
BakingTimer: privacy analysis of server-side request processing time | 0 | 0.34 | 2019 |
Can I Opt Out Yet? - GDPR and the Global Illusion of Cookie Control. | 5 | 0.42 | 2019 |
Understanding Linux Malware | 5 | 0.45 | 2018 |
A Close Look at a Daily Dataset of Malware Samples. | 0 | 0.34 | 2018 |
What You Corrupt Is Not What You Crash: Challenges in Fuzzing Embedded Devices. | 2 | 0.35 | 2018 |
Clock Around the Clock: Time-Based Device Fingerprinting. | 4 | 0.40 | 2018 |
Deception Techniques in Computer Security: A Research Perspective. | 2 | 0.39 | 2018 |
Beyond Precision and Recall: Understanding Uses (and Misuses) of Similarity Hashes in Binary Analysis. | 1 | 0.36 | 2018 |
A Lustrum of Malware Network Communication: Evolution and Insights | 12 | 0.59 | 2017 |
Attacks landscape in the dark side of the web. | 3 | 0.43 | 2017 |
Extension Breakdown: Security Analysis Of Browsers Extension Resources Control Policies | 7 | 0.51 | 2017 |
The Onions Have Eyes: A Comprehensive Structure and Privacy Analysis of Tor Hidden Services. | 5 | 0.56 | 2017 |
Evaluation of Deception-Based Web Attacks Detection. | 0 | 0.34 | 2017 |
Micro-Virtualization Memory Tracing To Detect And Prevent Spraying Attacks | 0 | 0.34 | 2016 |
Google Dorks: Analysis, Creation, and New Defenses. | 3 | 0.42 | 2016 |
PhishEye: Live Monitoring of Sandboxed Phishing Kits. | 21 | 0.69 | 2016 |
Measuring the Role of Greylisting and Nolisting in Fighting Spam | 1 | 0.37 | 2016 |
Subverting Operating System Properties Through Evolutionary DKOM Attacks. | 5 | 0.47 | 2016 |
ROPMEMU: A Framework for the Analysis of Complex Code-Reuse Attacks. | 4 | 0.47 | 2016 |
Automatic Extraction of Indicators of Compromise for Web Applications. | 11 | 0.58 | 2016 |
RAMBO: Run-Time Packer Analysis with Multiple Branch Observation. | 1 | 0.35 | 2016 |
Needles in a Haystack: Mining Information from Public Dynamic Analysis Sandboxes for Malware Intelligence | 12 | 0.55 | 2015 |
Cutting the gordian knot: A look under the hood of ransomware attacks | 57 | 3.02 | 2015 |
PIE: Parser identification in embedded systems | 7 | 0.47 | 2015 |
The role of cloud services in malicious software: Trends and insights | 2 | 0.37 | 2015 |
SoK: Deep Packer Inspection: A Longitudinal Study of the Complexity of Run-Time Packers | 30 | 0.90 | 2015 |
The impact of GPU-assisted malware on memory forensics | 1 | 0.37 | 2015 |
On the effectiveness of risk prediction based on users browsing behavior | 13 | 0.77 | 2014 |
On the feasibility of software attacks on commodity virtual machine monitors via direct device assignment | 9 | 0.53 | 2014 |
Optical Delusions: A Study of Malicious QR Codes in the Wild | 9 | 0.68 | 2014 |