Title |
Conference |
Tags |
Peek-a-Boo: I see your smart home activities, even encrypted! |
ACMConference-2020 - Virtual, Virtual |
|
ScaRR: Scalable Runtime Remote Attestation for Complex Systems |
RAID2019-2019 - Beijing, China |
|
Blockchain Trilemma Solver Algorand has Dilemma over Undecidable Messages |
ARES-2019 - Canterbury, UK |
|
Mitch: A Machine Learning Approach to the Black-Box Detection of CSRF Vulnerabilities |
IEEEEuroS&P-2019 - Stockholm, Sweden |
|
No Free Charge Theorem 2.0: How to Steal Private Information from a Mobile Device Using a Powerbank |
blackhatEurope-2018 - London, United Kingdom |
|
The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX |
27thUsenixSecuritySymposium-2018 - Vancouver, Canada |
|
The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX |
27thUsenixSecuritySymposium-2018 - Vancouver, Canada |
|
Back To The Epilogue: Evading Control Flow Guard via Unaligned Targets. |
NDSS-2018 - san diego,usa |
|
SKYPE and TYPE: KEYSTROKE LEAKAGE OVER VOIP |
blackhat-2017 - las vegas,usa |
|
FlowFence: Practical Data Protection for Emerging IoT Application Frameworks |
USENIX-2016 - austin,usa |
|
Selfrando: Securing the Tor Browser against De-anonymization Exploits |
PETS-2016 - darmstadt,germany |
|
Toward a Secure and Scalable Attestation |
WiSec-2016 - darmstadt,germany |
|
Can’t you hear me knocking: Identification of user actions on Android apps via traffic analysis |
codapspy-2015 - San Antonio,USA |
|
VirtualFriendship: Hiding interactions on Online Social Networks |
CNS-2014 - san francisco,usa |
|
Evaluation of Android Anti-malware Techniques against Dalvik Bytecode Obfuscation |
TrustCOM-2014 - bejing,china |
|
SocialSpy: Browsing (Supposedly) Hidden Information in Online Social Networks |
CRiSIS-2014 - trento,italy |
|
I Sensed It Was You: Authenticating Mobile Users with Sensor-enhanced Keystroke Dynamics |
Dimva-2014 - London,UK |
|
Covert Ephemeral Communication in Named Data Networking |
asiaccs-2014 - kyoto,japan |
|