A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web
|
|
Artifact
|
A Formal Analysis of IEEE 802.11's WPA2: Countering the Kracks Caused by Cracking the Counters
|
|
Artifact
|
A Longitudinal and Comprehensive Study of the DANE Ecosystem in Email
|
|
Artifact
|
A Spectral Analysis of Noise: A Comprehensive, Automated, Formal Analysis of Diffie-Hellman Protocols
|
|
Artifact
|
A Tale of Two Headers: A Formal Analysis of Inconsistent Click-Jacking Protection on the Web
|
|
Artifact
|
Achieving Keyless CDNs with Conclaves
|
|
Artifact
|
Adversarial Preprocessing: Understanding and Preventing Image-Scaling Attacks in Machine Learning
|
|
Artifact
|
Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints
|
|
Artifact
|
An Ever-evolving Game: Evaluation of Real-world Attacks and Defenses in Ethereum Ecosystem
|
|
Artifact
|
Analysis of DTLS Implementations Using Protocol State Fuzzing
|
|
Artifact
|
APEX: A Verified Architecture for Proofs of Execution on Remote Devices under Full Software Compromise
|
|
Artifact
|
Automatic Techniques to Systematically Discover New Heap Exploitation Primitives
|
|
Artifact
|
Automating the Development of Chosen Ciphertext Attacks
|
|
Artifact
|
Big Numbers - Big Troubles: Systematically Analyzing Nonce Leakage in (EC)DSA Implementations
|
|
Artifact
|
BlockSci: Design and applications of a blockchain analysis platform
|
|
Artifact
|
Certified Side Channels
|
|
Artifact
|
Chaperone: Real-time Locking and Loss Prevention for Smartphones
|
|
Artifact
|
Datalog Disassembly
|
|
Artifact
|
Donky: Domain Keys - Efficient In-Process Isolation for RISC-V and x86
|
|
Artifact
|
EcoFuzz: Adaptive Energy-Saving Greybox Fuzzing as a Variant of the Adversarial Multi-Armed Bandit
|
|
Artifact
|
FANS: Fuzzing Android Native System Services via Automated Interface Analysis
|
|
Artifact
|
Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation Targets
|
|
Artifact
|
From Needs to Actions to Secure Apps? The Effect of Requirements and Developer Practices on App Security
|
|
Artifact
|
HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation
|
|
Artifact
|
Hybrid Batch Attacks: Finding Black-box Adversarial Examples with Limited Queries
|
|
Artifact
|
McTiny: Fast High-Confidence Post-Quantum Key Erasure for Tiny Network Servers
|
|
Artifact
|
Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines
|
|
Artifact
|
Montage: A Neural Network Language Model-Guided JavaScript Engine Fuzzer
|
|
Artifact
|
PHMon: A Programmable Hardware Monitor and Its Security Use Cases
|
|
Artifact
|
RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks
|
|
Artifact
|
Retrofitting Fine Grain Isolation in the Firefox Renderer
|
|
Artifact
|
Scaling Verifiable Computation Using Efficient Set Accumulators
|
|
Artifact
|
SENG, the SGX-Enforcing Network Gateway: Authorizing Communication from Shielded Clients
|
|
Artifact
|
Silhouette: Efficient Protected Shadow Stacks for Embedded Systems
|
|
Artifact
|
Symbolic execution with SymCC: Don't interpret, compile!
|
|
Artifact
|
Temporal System Call Specialization for Attack Surface Reduction
|
|
Artifact
|
Towards HTTPS Everywhere on Android: We Are Not There Yet
|
|
|