Parent directory/ | - | - |
PCF A Portable Circuit Format for Scalable Two-Party Secure Computation Slides - Ben Kreuter, Benjamin Mood, Abhi Shelat, Kevin Butler.pdf | 164.5 KiB | 2020 Apr 11 03:05 |
Control Flow Integrity for COTS Binaries Slides - Mingwei Zhang, R. Sekar.pdf | 535.6 KiB | 2020 Apr 11 03:06 |
ZMap Fast Internet-wide Scanning and Its Security Applications - Zakir Durumeric, Eric Wustrow, J. Alex Halderman.pdf | 558.2 KiB | 2020 Apr 11 03:27 |
Sancus Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base Slides - Job Noorman, Pieter Agten, Wilfried Daniels, Raoul Str.pdf | 592.8 KiB | 2020 Apr 11 03:15 |
ZMap Fast Internet-wide Scanning and Its Security Applications Slides - Zakir Durumeric, Eric Wustrow, J. Alex Halderman.pdf | 607.2 KiB | 2020 Apr 11 03:27 |
Impression Fraud in On-line Advertising via Pay-Per-View Networks Slides - Kevin Springborn, Paul Barford.pdf | 807.8 KiB | 2020 Apr 11 02:55 |
Eradicating DNS Rebinding with the Extended Same-origin Policy Slides - Martin Johns, Sebastian Lekies, Ben Stock.pdf | 816.6 KiB | 2020 Apr 11 03:35 |
Dowsing for Overflows A Guided Fuzzer to Find Buffer Boundary Violations Slides - Istvan Haller, Asia Slowinska, Matthias Neugschwandtner, Herbert Bos.pdf | 945.0 KiB | 2020 Apr 11 02:41 |
Secure Outsourced Garbled Circuit Evaluation for Mobile Devices Slides - Henry Carter, Benjamin Mood, Patrick Traynor, Kevin Butler.pdf | 1.3 MiB | 2020 Apr 11 03:03 |
FIE on Firmware Finding Vulnerabilities in Embedded Systems Using Symbolic Execution Slides - Drew Davidson, Benjamin Moench, Somesh Jha, Thomas Ristenpart.pdf | 1.3 MiB | 2020 Apr 11 03:18 |
Alice in Warningland A Large-Scale Field Study of Browser Security Warning Effectiveness Slides - Devdatta Akhawe, Adrienne Porter Felt.pdf | 1.4 MiB | 2020 Apr 11 03:01 |
DupLESS Server-Aided Encryption for Deduplicated Storage Slides - Mihir Bellare, Sriram Keelveedhi, Thomas Ristenpart.pdf | 1.4 MiB | 2020 Apr 11 02:53 |
Language-based Defenses Against Untrusted Browser Origins Slides - Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Sergio Maffeis.pdf | 1.5 MiB | 2020 Apr 11 03:37 |
An Empirical Study of Vulnerability Rewards Programs Slides Slides - Matthew Finifter, Devdatta Akhawe, David Wagner.pdf | 1.7 MiB | 2020 Apr 11 03:02 |
Practical Comprehensive Bounds on Surreptitious Communication over DNS Slides - Rao, Reiner Sailer, Douglas Lee Schales, Marc Ph. Stoecklin, Kurt Thomas, Wietse Ven.pdf | 1.8 MiB | 2020 Apr 11 02:19 |
MetaSymploit Day-One Defense against Script-based Attacks with Security-Enhanced Symbolic Analysis Slides - Ruowen Wang, Peng Ning, Tao Xie, Quan Chen.pdf | 1.9 MiB | 2020 Apr 11 02:45 |
On the Security of Picture Gesture Authentication Slides - Ziming Zhao, Gail-Joon Ahn, Jeong-Jin Seo, Hongxin Hu.pdf | 1.9 MiB | 2020 Apr 11 03:10 |
Steal This Movie Automatically Bypassing DRM Protection in Streaming Media Services - Ruoyu Wang, Santa Barbara, Yan Shoshitaishvili, Christopher Kruegel, Giovanni .pdf | 1.9 MiB | 2020 Apr 11 03:39 |
PCF A Portable Circuit Format for Scalable Two-Party Secure Computation - Ben Kreuter, Benjamin Mood, Abhi Shelat, Kevin Butler.pdf | 2.0 MiB | 2020 Apr 11 03:05 |
Sancus Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base - Job Noorman, Pieter Agten, Wilfried Daniels, Raoul Strackx, A.pdf | 2.0 MiB | 2020 Apr 11 03:15 |
Control Flow Integrity for COTS Binaries - Mingwei Zhang, R. Sekar.pdf | 2.0 MiB | 2020 Apr 11 03:06 |
Eradicating DNS Rebinding with the Extended Same-origin Policy - Martin Johns, Sebastian Lekies, Ben Stock.pdf | 2.0 MiB | 2020 Apr 11 03:35 |
DupLESS Server-Aided Encryption for Deduplicated Storage - Mihir Bellare, Sriram Keelveedhi, Thomas Ristenpart.pdf | 2.0 MiB | 2020 Apr 11 02:53 |
CacheAudit A Tool for the Static Analysis of Cache Side Channels - Goran Doychev, Dominik Feld, Boris Kopf, Laurent Mauborgne, Jan Reineke.pdf | 2.0 MiB | 2020 Apr 11 03:13 |
Strato A Retargetable Framework for Low-Level Inlined-Reference Monitors - Bin Zeng, Gang Tan, Ulfar Erlingsson.pdf | 2.0 MiB | 2020 Apr 11 03:07 |
FIE on Firmware Finding Vulnerabilities in Embedded Systems Using Symbolic Execution - Drew Davidson, Benjamin Moench, Somesh Jha, Thomas Ristenpart.pdf | 2.0 MiB | 2020 Apr 11 03:18 |
MetaSymploit Day-One Defense against Script-based Attacks with Security-Enhanced Symbolic Analysis - Ruowen Wang, Peng Ning, Tao Xie, Quan Chen.pdf | 2.0 MiB | 2020 Apr 11 02:45 |
ZQL A Compiler for Privacy-Preserving Data Processing - Cedric Fournet, Markulf Kohlweiss, George Danezis.pdf | 2.0 MiB | 2020 Apr 11 02:52 |
Trafficking Fraudulent Accounts The Role of the Underground Market in Twitter Spam and ***** - Kurt Thomas, Damon McCoy, Chris Grier, Alek Kolcz, Vern Paxson.pdf | 2.1 MiB | 2020 Apr 11 02:54 |
An Empirical Study of Vulnerability Rewards Programs - Matthew Finifter, Devdatta Akhawe, David Wagner.pdf | 2.1 MiB | 2020 Apr 11 03:02 |
WHYPER Towards Automating Risk Assessment of Mobile Applications - Rahul Pandita, Xusheng Xiao, Wei Yang, William Enck, Tao Xie.pdf | 2.1 MiB | 2020 Apr 11 03:22 |
Steal This Movie Automatically Bypassing DRM Protection in Streaming Media Services Slides - Ruoyu Wang, Santa Barbara, Yan Shoshitaishvili, Christopher Kruegel, Gi.pdf | 2.1 MiB | 2020 Apr 11 03:39 |
On the Security of RC4 in TLS - Nadhem AlFardan, Royal Holloway, Daniel J. Bernstein, Kenneth G. Paterson, Bertram Poettering, Jacob C.N. Schuldt.pdf | 2.1 MiB | 2020 Apr 11 03:04 |
Strato A Retargetable Framework for Low-Level Inlined-Reference Monitors Slides - Bin Zeng, Gang Tan, Ulfar Erlingsson.pdf | 2.1 MiB | 2020 Apr 11 03:08 |
Native x86 Decompilation Using Semantics-Preserving Structural Analysis and Iterative Control-Flow Structuring - Edward J. Schwartz, JongHyup Lee, Maverick Woo, Dav.pdf | 2.1 MiB | 2020 Apr 11 03:07 |
ExecScent Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates Slides - Terry Nelms, Roberto Perdisci, Mustaque Ahamad.pdf | 2.1 MiB | 2020 Apr 11 03:26 |
Towards Automatic Software Lineage Inference - Jiyong Jang, Maverick Woo, David Brumley.pdf | 2.1 MiB | 2020 Apr 11 02:47 |
Effective Inter-Component Communication Mapping in Android An Essential Step Towards Holistic Security Analysis - Damien Octeau, Patrick McDaniel, Somesh Jha, Alexa.pdf | 2.2 MiB | 2020 Apr 11 03:23 |
The Velocity of Censorship High-Fidelity Detection of Microblog Post Deletions - Tao Zhu, David Phipps, Adam Pridgen, Jedidiah R. Crandall.pdf | 2.2 MiB | 2020 Apr 11 02:56 |
Explicating SDKs Uncovering Assumptions Underlying Secure Authentication and Authorization Slides - Rui Wang, Yuchen Zhou, Shuo Chen, Shaz Qadeer, David Evans, Yuri.pdf | 2.2 MiB | 2020 Apr 11 03:11 |
Proactively Accountable Anonymous Messaging in Verdict - Henry Corrigan-Gibbs, David Isaac Wolinsky, Bryan Ford.pdf | 2.2 MiB | 2020 Apr 11 02:51 |
Measuring the Practical Impact of DNSSEC Deployment - Wilson Lian, Eric Rescorla, Hovav Shacham, Stefan Savage.pdf | 2.2 MiB | 2020 Apr 11 03:25 |
Flexible and Fine-grained Mandatory Access Control on Android for Diverse Security and Privacy Policies - Sven Bugiel, Stephan Heuser, Ahmad-Reza Sadeghi.pdf | 2.2 MiB | 2020 Apr 11 02:50 |
ExecScent Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates - Terry Nelms, Roberto Perdisci, Mustaque Ahamad.pdf | 2.2 MiB | 2020 Apr 11 03:26 |
Revolver An Automated Approach to the Detection of Evasive Web-based Malware - Alexandros Kapravelos, Yan Shoshitaishvili, Marco Cova, Christopher Kruegel, Giovanni.pdf | 2.2 MiB | 2020 Apr 11 03:35 |
KI-Mon A Hardware-assisted Event-triggered Monitoring Platform for Mutable Kernel Object - Hojoon Lee, HyunGon Moon, DaeHee Jang, Kihwan Kim, Jihoon Lee, Yunheung P.pdf | 2.2 MiB | 2020 Apr 11 03:17 |
You Are How You Click Clickstream Analysis for Sybil Detection - Gang Wang, Tristan Konolige, Christo Wilson, Xiao Wang, Haitao Zheng, Ben Y. Zhao.pdf | 2.2 MiB | 2020 Apr 11 02:59 |
Alice in Warningland A Large-Scale Field Study of Browser Security Warning Effectiveness - Devdatta Akhawe, Adrienne Porter Felt.pdf | 2.2 MiB | 2020 Apr 11 03:00 |
Explicating SDKs Uncovering Assumptions Underlying Secure Authentication and Authorization - Rui Wang, Yuchen Zhou, Shuo Chen, Shaz Qadeer, David Evans, Yuri Gurevi.pdf | 2.3 MiB | 2020 Apr 11 03:11 |
Dowsing for Overflows A Guided Fuzzer to Find Buffer Boundary Violations - Istvan Haller, Asia Slowinska, Matthias Neugschwandtner, Herbert Bos.pdf | 2.3 MiB | 2020 Apr 11 02:41 |
Secure Outsourced Garbled Circuit Evaluation for Mobile Devices - Henry Carter, Benjamin Mood, Patrick Traynor, Kevin Butler.pdf | 2.4 MiB | 2020 Apr 11 03:03 |
Language-based Defenses Against Untrusted Browser Origins - Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Sergio Maffeisn.pdf | 2.4 MiB | 2020 Apr 11 03:37 |
Automatic Mediation of Privacy-Sensitive Resource Access in Smartphone Applications - Benjamin Livshits, Jaeyeon Jung.pdf | 2.4 MiB | 2020 Apr 11 02:49 |
Impression Fraud in On-line Advertising via Pay-Per-View Networks - Kevin Springborn, Paul Barford.pdf | 2.4 MiB | 2020 Apr 11 02:55 |
Transparent ROP Exploit Mitigation Using Indirect Branch Tracing - Vasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis.pdf | 2.4 MiB | 2020 Apr 11 03:13 |
Securing Embedded User Interfaces Android and Beyond - Franziska Roesner, Tadayoshi Kohno.pdf | 2.6 MiB | 2020 Apr 11 02:48 |
Jekyll on iOS When Benign Apps Become Evil - Tielei Wang, Kangjie Lu, Long Lu, Simon Chung, Wenke Lee.pdf | 2.6 MiB | 2020 Apr 11 03:24 |
Take This Personally Pollution Attacks on Personalized Services - Xinyu Xing, Wei Meng, Dan Doozan, Alex C. Snoeren, Nick Feamster, Wenke Lee.pdf | 2.7 MiB | 2020 Apr 11 03:39 |
Trafficking Fraudulent Accounts The Role of the Underground Market in Twitter Spam and ***** Slides - Kurt Thomas, Damon McCoy, Chris Grier, Alek Kolcz, Vern Paxson.pdf | 2.8 MiB | 2020 Apr 11 02:55 |
Let Me Answer That for You Exploiting Broadcast Information in Cellular Networks - Nico Golde, Kévin Redon, and Jean-Pierre Seifert.pdf | 2.9 MiB | 2020 Apr 11 02:39 |
On the Security of RC4 in TLS Slides - Nadhem AlFardan, Royal Holloway, Daniel J. Bernstein, Kenneth G. Paterson, Bertram Poettering, Jacob C.N. Schuldt.pdf | 3.1 MiB | 2020 Apr 11 03:04 |
Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers Slides - Suman Jana, David Molnar, Alexander Moshchuk, Alan Dunn, Benjamin Liv.pdf | 3.2 MiB | 2020 Apr 11 03:12 |
Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation Slides - Frank Imeson, Ariq Emtenan, Siddharth Garg.pdf | 3.3 MiB | 2020 Apr 11 03:16 |
The Velocity of Censorship High-Fidelity Detection of Microblog Post Deletions Slides - Tao Zhu, David Phipps, Adam Pridgen, Jedidiah R. Crandall.pdf | 3.5 MiB | 2020 Apr 11 02:57 |
Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers - Suman Jana, David Molnar, Alexander Moshchuk, Alan Dunn, Benjamin Livshits, .pdf | 3.6 MiB | 2020 Apr 11 03:12 |
Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation - Frank Imeson, Ariq Emtenan, Siddharth Garg, and Mah.pdf | 3.9 MiB | 2020 Apr 11 03:16 |
On the Security of Picture Gesture Authentication - Ziming Zhao, Gail-Joon Ahn, Jeong-Jin Seo, Hongxin Hu.pdf | 4.4 MiB | 2020 Apr 11 03:10 |
Practical Comprehensive Bounds on Surreptitious Communication over DNS - Rao, Reiner Sailer, Douglas Lee Schales, Marc Ph. Stoecklin, Kurt Thomas, Wietse Venema.pdf | 4.7 MiB | 2020 Apr 11 02:19 |
Securing Embedded User Interfaces Android and Beyond Slides - Franziska Roesner, Tadayoshi Kohnos.pdf | 5.1 MiB | 2020 Apr 11 02:48 |
Greystar Fast and Accurate Detection of SMS Spam Numbers in Large Cellular Networks Using Gray Phone Space - Nan Jiang, Yu Jin, Ann Skudlark, Zhi-Li Zhang.pdf | 5.6 MiB | 2020 Apr 11 02:12 |
Flexible and Fine-grained Mandatory Access Control on Android for Diverse Security and Privacy Policies Slides - Sven Bugiel, Stephan Heuser, Ahmad-Reza Sadeghi.pdf | 5.6 MiB | 2020 Apr 11 02:50 |
You Are How You Click Clickstream Analysis for Sybil Detection Slides - Gang Wang, Tristan Konolige, Christo Wilson, Xiao Wang, Haitao Zheng, Ben Y. Zhao.pdf | 5.9 MiB | 2020 Apr 11 02:59 |
Let Me Answer That for You Exploiting Broadcast Information in Cellular Networks Slides - Nico Golde, Kévin Redon, and Jean-Pierre Seifert.pdf | 6.4 MiB | 2020 Apr 11 02:40 |
Dismantling Megamos Crypto Wirelessly Lockpicking a Vehicle Immobilizer Slides - Roel Verdult, Flavio D. Garcia, Baris Ege.pdf | 11.1 MiB | 2020 Apr 11 03:40 |
Confessions of a Recovering Data Broker Responsible Innovation in the Age of Big Data, Big Brother, and the Coming Skynet Terminators Slides - Jim Adler.pdf | 27.4 MiB | 2020 Apr 11 03:08 |