Title |
Conference |
Tags |
KRATOS: Multi-User Multi-Device-Aware Access Control System for the Smart Home |
ACMConference-2020 - Virtual, Virtual |
|
Speculator: A Tool to Analyze Speculative Execution Attacks and Mitigations |
ACSAC2019-2019 - San Juan, Puerto Rico |
|
USBESAFE: An End-Point Solution to Protect Against USB-Based Attacks |
RAID2019-2019 - Beijing, China |
|
Using AI to Detect Advanced Threats – Done Right |
CODASPY2019-2019 - Dallas, United States |
|
Using AI to Detect Advanced Threats – Done Right |
CODASPY2019-2019 - Dallas, United States |
|
ERASER: Your Data Won’t Be Back |
IEEEEuropeanSymposiumS&P-2018 - London, United Kingdom |
|
Thou Shalt Not Depend on Me: Analysing the Use of Outdated JavaScript Libraries on the Web |
NDSS-2017 - california,usa |
|
UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware |
USENIX-2016 - austin,usa |
|
KEYNOTE 1: |
Dimva-2016 - Donostia-San Sebastián, Spain |
|
CrossFire: An Analysis of Firefox Extension-Reuse Vulnterabilities |
NDSS-2016 - california,usa |
|
ZigZag: Automatically Hardening Web Applications Against Client-side Validation Vulnerabilities |
SecuritySymposium-2015 - washington,USA |
|
MOST RANSOMWARE ISNT AS COMPLEX AS YOU MIGHT THINK |
BlackhatUS-2015 - Las vegas,usa |
|
Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks, |
Dimva-2015 - Milan,Italy |
|
On the Security and Engineering Implications of Finer-Grained Access Controls for Android Developers and Users, |
Dimva-2015 - Milan,Italy |
|
TrueClick: Automatically Distinguishing Trick Banners from Genuine Download Links |
ACSAC-2014 - new orleans,usa |
|
A Look at Targeted Attacks Through the Lense of an NGO |
usenix-2014 - san diego,usa |
|
VirtualSwindle: An Automated Attack Against In-App Billing on Android |
asiaccs-2014 - kyoto,japan |
|
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterprise Networks |
ACSAC-2013 - New Orleans, USA |
|
PatchDroid: Scalable Third-Party Security Patches for Android Devices |
ACSAC-2013 - New Orleans, USA |
|
PUBCRAWL: Protecting Users and Businesses from CRAWLers |
USENIX-2012 - Washington, D.C. |
|
Reverse Social Engineering Attacks in Online Social Networks |
9th Conference on Detection of Intrusions and Malware & Vulnerability Assessment-2012 - Heraklion, Crete, Greece |
|
Opening Remarks |
5th USENIX Workshop on Large-Scale Exploits and Emergent Threats-2012 - San Francisco, USA |
Security
|
The Power of Procrastination: Detection and Mitigation of Execution-Stalling Malicious Code |
Confrence-on-computer-communications-security-2011 - Chicago, USA |
|
Reverse Social Engineering Attacks in Online Social Networks |
dimva-2011 - Amsterdam,Netherkands |
|
Effective And Efficient Malware Detection At The End Host |
18th USENIX Security Symposium-2009 - Montreal, Canada |
Security
Malware
|
A View On Current Malware Behaviors |
2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats-2009 - Boston, USA |
Security
Malware
|
Behavior-Based Spyware Detection |
15th USENIX Security Symposium-2006 - Vancouver, Canada |
Security
|
Automating Mimicry Attacks Using Static Binary Analysis |
14th USENIX Security Symposium-2005 - Baltimore, USA |
Security
Analysis
|