Title |
Conference |
Tags |
Analysis of Privacy Protections in Fitness Tracking Social Networks -or- You can run, but can you hide? |
27thUsenixSecuritySymposium-2018 - Vancouver, Canada |
|
Analysis of Privacy Protections in Fitness Tracking Social Networks -or- You can run, but can you hide? |
27thUsenixSecuritySymposium-2018 - Vancouver, Canada |
|
Fear and Logging in the Internet of Things |
NDSS-2018 - san diego,usa |
|
Towards Scalable Cluster Auditing through Grammatical Inference over Provenance Graphs. |
NDSS-2018 - san diego,usa |
|
Provenance Tracing in the Internet of Things |
TaPP-2017 - seattle,usa |
|
Deduplicating Container Provenance with Graph Grammars |
TaPP-2017 - seattle,usa |
|
Making USB Great Again with USBFILTER |
USENIX-2016 - austin,usa |
|
Web Security |
ACSAC-2015 - los angeles,usa |
|
Defending Against Malicious USB Firmware with GoodUSB |
ACSAC-2015 - los angeles,usa |
|
Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications in the Developing World |
SecuritySymposium-2015 - washington,USA |
|
Trustworthy Whole-System Provenance for the Linux Kernel |
SecuritySymposium-2015 - washington,USA |
|
Boxed Out: Blocking Cellular Interconnect Bypass Fraud at the Network Edge |
SecuritySymposium-2015 - washington,USA |
|
Securing SSL Certificate Verification through Dynamic Linking |
CCS-2014 - Scottsdale,USA |
|
Leveraging USB to Establish Host Identity Using Commodity Devices |
NDSS-2014 - San Diego,USA |
|
An Infrastructure for Provenance-Based Access Control in Cloud Environments |
Third ACM Conference on Data and Application Security and Privacy-2013 - San Antonio,USA |
|
Detecting Co-Residency with Active Traffic Analysis Techniques. |
CCSW-2012 - Raleigh,USA |
|