Title |
Conference |
Tags |
Speculator: A Tool to Analyze Speculative Execution Attacks and Mitigations |
ACSAC2019-2019 - San Juan, Puerto Rico |
|
USBESAFE: An End-Point Solution to Protect Against USB-Based Attacks |
RAID2019-2019 - Beijing, China |
|
ERASER: Your Data Won’t Be Back |
IEEEEuropeanSymposiumS&P-2018 - London, United Kingdom |
|
Game of Registrars: An Empirical Analysis of Post-Expiration Domain Name Takeovers |
usenixsecurity-2017 - vancouver,canada |
|
Thou Shalt Not Depend on Me: Analysing the Use of Outdated JavaScript Libraries on the Web |
NDSS-2017 - california,usa |
|
Tracing Information Flows Between Ad Exchanges Using Retargeted Ads |
USENIX-2016 - austin,usa |
|
UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware |
USENIX-2016 - austin,usa |
|
AUTOMATED DETECTION OF FIREFOX EXTENSION-REUSE VULNERABILITIES |
BlackHatAsia-2016 - marina bay,singapore |
|
CrossFire: An Analysis of Firefox Extension-Reuse Vulnterabilities |
NDSS-2016 - california,usa |
|
Access Control |
ACSAC-2015 - los angeles,usa |
|
ZigZag: Automatically Hardening Web Applications Against Client-side Validation Vulnerabilities |
SecuritySymposium-2015 - washington,USA |
|
Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks, |
Dimva-2015 - Milan,Italy |
|
On the Security and Engineering Implications of Finer-Grained Access Controls for Android Developers and Users, |
Dimva-2015 - Milan,Italy |
|
TrueClick: Automatically Distinguishing Trick Banners from Genuine Download Links |
ACSAC-2014 - new orleans,usa |
|
Why is CSP Failing? Trends and Challenges in CSP Adoption |
Raid-2014 - gottenburg,sweden |
|
VirtualSwindle: An Automated Attack Against In-App Billing on Android |
asiaccs-2014 - kyoto,japan |
|
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterprise Networks |
ACSAC-2013 - New Orleans, USA |
|
PatchDroid: Scalable Third-Party Security Patches for Android Devices |
ACSAC-2013 - New Orleans, USA |
|
Static Enforcement Of Web Application Integrity Through Strong Typing |
18th USENIX Security Symposium-2009 - Montreal, Canada |
Security
Web
|
Automating Mimicry Attacks Using Static Binary Analysis |
14th USENIX Security Symposium-2005 - Baltimore, USA |
Security
Analysis
|
Static Disassembly Of Obfuscated Binaries |
13th USENIX Security Symposium-2004 - San Diego, USA |
Security
|