Title |
Conference |
Tags |
How Risky Are Real Users' IFTTT Applets? |
SOUPS2020-2020 - Boston, United States |
|
Riding out DOMsday: Towards Detecting and Preventing DOM Cross-Site Scripting. |
NDSS-2018 - san diego,usa |
|
überSpark: Enforcing Verifiable Object Abstractions for Automated Compositional Security Analysis of a Hypervisor |
USENIX-2016 - austin,usa |
|
Run-time Monitoring and Formal Analysis of Information Flows in Chromium |
NDSS-2015 - san diego,usa |
|
Mechanized Network Origin and Path Authenticity Proofs |
CCS-2014 - Scottsdale,USA |
|
Analyzing the Dangers Posed by Chrome Extensions |
CNS-2014 - san francisco,usa |
|
Continuous Tamper-proof Logging using TPM 2.0 |
Trust-2014 - Crete,Greece |
|
Formal Models and Verification of Software Systems |
wicys-2014 - Nashville,USA |
|
Information Flow 2 |
CSF-2013 - Louisiana,USA |
Security
|
Policy Auditing over Incomplete Logs: Theory, Implementation and Applications |
Confrence-on-computer-communications-security-2011 - Chicago, USA |
|