AVRS - emulating AVR microcontrollers for reverse engineering and security testing. | 0 | 0.34 | 2020 |
Actively Probing Routes for Tor AS-Level Adversaries with RIPE Atlas. | 0 | 0.34 | 2020 |
From Hack to Elaborate Technique—A Survey on Binary Rewriting | 3 | 0.45 | 2019 |
Measuring Cookies and Web Privacy in a Post-GDPR World. | 4 | 0.40 | 2019 |
ISaFe - Injecting Security Features into Constrained Embedded Firmware. | 0 | 0.34 | 2019 |
AutoHoney(I)IoT - Automated Device Independent Honeypot Generation of IoT and Industrial IoT Devices. | 0 | 0.34 | 2019 |
Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools | 20 | 0.91 | 2017 |
Lightweight Address Hopping for Defending the IPv6 IoT | 1 | 0.37 | 2017 |
A Performance Assessment Of Network Address Shuffling In Iot Systems | 0 | 0.34 | 2017 |
u'smile - Secure Mobile Environments. | 0 | 0.34 | 2017 |
Whom You Gonna Trust? A Longitudinal Study on TLS Notary Services. | 1 | 0.37 | 2016 |
Pin it! Improving Android network security at runtime | 1 | 0.36 | 2016 |
Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis? | 33 | 1.03 | 2016 |
Browser History Stealing with Captive Wi-Fi Portals | 2 | 0.38 | 2016 |
Notary-Assisted Certificate Pinning for Improved Security of Android Apps | 0 | 0.34 | 2016 |
Network Security Challenges in Android Applications | 3 | 0.50 | 2015 |
Towards Practical Methods to Protect the Privacy of Location Information with Mobile Devices | 1 | 0.35 | 2014 |
AES-SEC: Improving Software Obfuscation through Hardware-Assistance | 2 | 0.39 | 2014 |
Plugin in the Middle - Minimising Security Risks in Mobile Middleware Implementations | 0 | 0.34 | 2014 |