Demystifying Limited Adversarial Transferability in Automatic Speech Recognition Systems | 0 | 0.34 | 2022 |
Beyond Lp Clipping - Equalization based Psychoacoustic Attacks against ASRs. | 0 | 0.34 | 2021 |
Credit Card Fraud Is a Computer Security Problem | 0 | 0.34 | 2021 |
Privacy-Preserving Localization using Enclaves | 0 | 0.34 | 2021 |
Hear "No Evil", See "Kenansville"*: Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems | 1 | 0.36 | 2021 |
On the Detection of Disinformation Campaign Activity with Network Analysis | 1 | 0.40 | 2020 |
Are You Going to Answer That? Measuring User Responses to Anti-Robocall Application Indicators | 0 | 0.34 | 2020 |
Enclave-based privacy-preserving localization: poster | 0 | 0.34 | 2019 |
Examining DES-based Cipher Suite Support within the TLS Ecosystem. | 0 | 0.34 | 2019 |
A Hybrid Approach to Secure Function Evaluation Using SGX | 0 | 0.34 | 2019 |
Toward Automated Firmware Analysis in the IoT Era. | 1 | 0.35 | 2019 |
Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems. | 1 | 0.35 | 2019 |
Kiss from a Rogue: Evaluating Detectability of Pay-at-the-Pump Card Skimmers | 0 | 0.34 | 2019 |
More Cowbell: Lessons Learned in Developing the Skim Reaper | 0 | 0.34 | 2019 |
Digital Healthcare-Associated Infection - A Case Study on the Security of a Major Multi-Campus Hospital System. | 0 | 0.34 | 2019 |
Characterizing security and privacy practices in emerging digital credit applications | 0 | 0.34 | 2019 |
Outsourcing computation for private function evaluation. | 0 | 0.34 | 2019 |
A Hybrid Approach To Secure Function Evaluation Using Sgx | 2 | 0.36 | 2019 |
A Practical Intel SGX Setting for Linux Containers in the Cloud. | 2 | 0.41 | 2019 |
The Cards Aren't Alright: Detecting Counterfeit Gift Cards Using Encoding Jitter | 1 | 0.37 | 2018 |
Mitigating Risk while Complying with Data Retention Laws. | 1 | 0.35 | 2018 |
Hello, Is It Me You're Looking For?: Differentiating Between Human and Electronic Speakers for Voice Interface Security. | 4 | 0.43 | 2018 |
2MA: Verifying Voice Commands via Two Microphone Authentication. | 7 | 0.46 | 2018 |
Sonar: Detecting SS7 Redirection Attacks with Audio-Based Distance Bounding | 1 | 0.35 | 2018 |
Characterizing the Security of the SMS Ecosystem with Public Gateways. | 0 | 0.34 | 2018 |
Authenticall: Efficient Identity And Content Authentication For Phone Calls | 3 | 0.38 | 2017 |
Phonion: Practical Protection of Metadata in Telephony Networks. | 1 | 0.35 | 2017 |
Privacy preserving localization using a distributed particle filtering protocol. | 0 | 0.34 | 2017 |
Detecting Mobile Malicious Webpages in Real Time. | 3 | 0.41 | 2017 |
Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications | 0 | 0.34 | 2017 |
FinTechSec: Addressing the Security Challenges of Digital Financial Services. | 0 | 0.34 | 2017 |
Regulators, Mount Up! Analysis of Privacy Policies for Mobile Money Services. | 1 | 0.63 | 2017 |
Sending Out an SMS: Characterizing the Security of the SMS Ecosystem with Public Gateways | 9 | 0.73 | 2016 |
CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data | 40 | 2.44 | 2016 |
*droid: Assessment and Evaluation of Android Application Analysis Tools | 8 | 0.50 | 2016 |
Making Usb Great Again With Usbfilter | 6 | 0.55 | 2016 |
OPFE: Outsourcing Computation for Private Function Evaluation. | 0 | 0.34 | 2016 |
Frigate: A Validated, Extensible, and Efficient Compiler and Interpreter for Secure Computation | 11 | 0.48 | 2016 |
AuthLoop: End-to-End Cryptographic Authentication for Telephony over Voice Channels. | 2 | 0.36 | 2016 |
Efficient and secure template blinding for biometric authentication. | 0 | 0.34 | 2016 |
Using Intel Software Guard Extensions for Efficient Two-Party Secure Function Evaluation. | 13 | 0.54 | 2016 |
Detecting SMS Spam in the Age of Legitimate Bulk Messaging. | 2 | 0.37 | 2016 |
Uncovering Use-After-Free Conditions in Compiled Code | 2 | 0.37 | 2015 |
More Guidelines Than Rules: CSRF Vulnerabilities from Noncompliant OAuth 2.0 Implementations | 13 | 0.75 | 2015 |
OnionDNS: A seizure-resistant top-level Domain | 4 | 0.50 | 2015 |
Mo(bile) money, mo(bile) problems: analysis of branchless banking applications in the developing world | 22 | 1.09 | 2015 |
Accountable wiretapping - or - I know they can hear you now. | 4 | 0.41 | 2015 |
Outsourcing Secure Two-Party Computation as a Black Box. | 8 | 0.44 | 2015 |
Boxed Out: Blocking Cellular Interconnect Bypass Fraud at the Network Edge | 6 | 0.59 | 2015 |
An Empirical Evaluation of Security Indicators in Mobile Web Browsers | 9 | 0.56 | 2015 |