Title/Authors | Title | Research Artifacts
[?] A research
artifact is any by-product of a research project that is not
directly included in the published research paper. In Computer
Science research this is often source code and data sets, but
it could also be media, documentation, inputs to proof
assistants, shell-scripts to run experiments, etc.
|
Details |
---|
A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses Xiang Cai, Rishab Nithyanand, Tao Wang, Rob Johnson, Ian Goldberg |
A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Wen Zhang, You Chen, Thaddeus Cybulski, Daniel Fabbri, Carl A. Gunter, Patrick Lawlor, David M. Liebovitz, Bradley A. Malin |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
POSTER: Fingerprinting the Publicly Available Sandboxes Ke Liu, Shuai Lu, Chaoge Liu |
POSTER: Fingerprinting the Publicly Available Sandboxes Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Founding Digital Currency on Secure Computation Karim El Defrawy, Joshua Lampkins |
Founding Digital Currency on Secure Computation Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Detection of On-Road Vehicles Emanating GPS Interference Gorkem Kar, Hossen A. Mustafa, Yan Wang, Yingying Chen, Wenyuan Xu, Marco Gruteser, Tam Vu |
Detection of On-Road Vehicles Emanating GPS Interference Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices Markus Miettinen, N. Asokan, Thien Duc Nguyen, Ahmad-Reza Sadeghi, Majid Sobhani |
Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Private-by-Design Advertising Meets the Real World Alexey Reznichenko, Paul Francis |
Private-by-Design Advertising Meets the Real World Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
PixelVault: Using GPUs for Securing Cryptographic Operations Giorgos Vasiliadis, Elias Athanasopoulos, Michalis Polychronakis, Sotiris Ioannidis |
PixelVault: Using GPUs for Securing Cryptographic Operations Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
POSTER: Protecting Against Data Exfiltration Insider Attacks Through Application Programs Asmaa Sallam, Elisa Bertino |
POSTER: Protecting Against Data Exfiltration Insider Attacks Through Application Programs Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Watching the Watchers: Automatically Inferring TV Content From Outdoor Light Effusions Yi Xu, Jan-Michael Frahm, Fabian Monrose |
Watching the Watchers: Automatically Inferring TV Content From Outdoor Light Effusions Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Optimal Average-Complexity Ideal-Security Order-Preserving Encryption Florian Kerschbaum, Axel Schröpfer |
Optimal Average-Complexity Ideal-Security Order-Preserving Encryption Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Mechanized Network Origin and Path Authenticity Proofs Fuyuan Zhang, Limin Jia, Cristina Basescu, Tiffany Hyun-Jin Kim, Yih-Chun Hu, Adrian Perrig |
Mechanized Network Origin and Path Authenticity Proofs Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
SCORAM: Oblivious RAM for Secure Computation Xiao Shaun Wang, Yan Huang, T.-H. Hubert Chan, Abhi Shelat, Elaine Shi |
SCORAM: Oblivious RAM for Secure Computation Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
POSTER: Proactive Blacklist Update for Anti-Phishing Lung-Hao Lee, Kuei-Ching Lee, Hsin-Hsi Chen, Yuen-Hsien Tseng |
POSTER: Proactive Blacklist Update for Anti-Phishing Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
An Epidemiological Study of Malware Encounters in a Large Enterprise Ting-Fang Yen, Victor Heorhiadi, Alina Oprea, Michael K. Reiter, Ari Juels |
An Epidemiological Study of Malware Encounters in a Large Enterprise Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Deanonymisation of Clients in Bitcoin P2P Network Alex Biryukov, Dmitry Khovratovich, Ivan Pustogarov |
Deanonymisation of Clients in Bitcoin P2P Network Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
S3: A Symbolic String Solver for Vulnerability Detection in Web Applications Minh-Thai Trinh, Duc-Hiep Chu, Joxan Jaffar |
S3: A Symbolic String Solver for Vulnerability Detection in Web Applications Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Petar Tsankov, Srdjan Marinovic, Mohammad Torabi Dashti, David A. Basin |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
The Last Mile: An Empirical Study of Timing Channels on seL4 David Cock, Qian Ge, Toby C. Murray, Gernot Heiser |
The Last Mile: An Empirical Study of Timing Channels on seL4 Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Code Injection Attacks on HTML5-based Mobile Apps: Characterization, Detection and Mitigation Xing Jin, Xuchao Hu, Kailiang Ying, Wenliang Du, Heng Yin, Gautam Nagesh Peri |
Code Injection Attacks on HTML5-based Mobile Apps: Characterization, Detection and Mitigation Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Privacy Beyond Confidentiality Christopher W. Clifton |
Privacy Beyond Confidentiality Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
A Computationally Complete Symbolic Attacker for Equivalence Properties Gergei Bana, Hubert Comon-Lundh |
A Computationally Complete Symbolic Attacker for Equivalence Properties Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response Úlfar Erlingsson, Vasyl Pihur, Aleksandra Korolova |
RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
On The Security of Mobile Cockpit Information Systems Devin Lundberg, Brown Farinholt, Edward Sullivan, Ryan Mast, Stephen Checkoway, Stefan Savage, Alex C. Snoeren, Kirill Levchenko |
On The Security of Mobile Cockpit Information Systems Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
PoliCert: Secure and Flexible TLS Certificate Management Pawel Szalachowski, Stephanos Matsumoto, Adrian Perrig |
PoliCert: Secure and Flexible TLS Certificate Management Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Lei Jin, Balaji Palanisamy, James B. D. Joshi |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Bhaswati Deka, Ryan M. Gerdes, Ming Li, Kevin Heaslip |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
POSTER: Efficient Ciphertext Policy Attribute Based Encryption Under Decisional Linear Assumption Tran Viet Xuan Phuong, Guomin Yang, Willy Susilo |
POSTER: Efficient Ciphertext Policy Attribute Based Encryption Under Decisional Linear Assumption Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Security Vulnerability in Processor-Interconnect Router Design WonJun Song, John Kim, Jae W. Lee, Dennis Abts |
Security Vulnerability in Processor-Interconnect Router Design Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Mitsuhiro Hatada, Masato Terada, Tatsuya Mori |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
AutoCog: Measuring the Description-to-permission Fidelity in Android Applications Zhengyang Qu, Vaibhav Rastogi, Xinyi Zhang, Yan Chen, Tiantian Zhu, Zhong Chen |
AutoCog: Measuring the Description-to-permission Fidelity in Android Applications Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Location Privacy Protection for Smartphone Users Kassem Fawaz, Kang G. Shin |
Location Privacy Protection for Smartphone Users Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Abhinav Narain, Nick Feamster, Alex C. Snoeren |
Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Integrity, Consistency, and Verification of Remote Computation Christian Cachin |
Integrity, Consistency, and Verification of Remote Computation Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Toward Robust Hidden Volumes Using Write-Only Oblivious RAM Erik-Oliver Blass, Travis Mayberry, Guevara Noubir, Kaan Onarlioglu |
Toward Robust Hidden Volumes Using Write-Only Oblivious RAM Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Uncovering Large Groups of Active Malicious Accounts in Online Social Networks Qiang Cao, Xiaowei Yang, Jieqi Yu, Christopher Palow |
Uncovering Large Groups of Active Malicious Accounts in Online Social Networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Moving Targets: Security and Rapid-Release in Firefox Sandy Clark, Michael Collis, Matt Blaze, Jonathan M. Smith |
Moving Targets: Security and Rapid-Release in Firefox Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
System-level Non-interference for Constant-time Cryptography Gilles Barthe, Gustavo Betarte, Juan Diego Campo, Carlos Daniel Luna, David Pichardie |
System-level Non-interference for Constant-time Cryptography Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
POSTER: Study of Software Plugin-based Malware Yu Liang, Zhiqiao Li, Xiang Cui |
POSTER: Study of Software Plugin-based Malware Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
POSTER: Abusing URL Shortening Services for Stealthy and Resilient Message Transmitting Dong Li, Fangjiao Zhang, Chaoge Liu |
POSTER: Abusing URL Shortening Services for Stealthy and Resilient Message Transmitting Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
POSTER: AdHoneyDroid - Capture Malicious Android Advertisements Dongqi Wang, Shuaifu Dai, Yu Ding, Tongxin Li, Xinhui Han |
POSTER: AdHoneyDroid - Capture Malicious Android Advertisements Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
PrivEx: Private Collection of Traffic Statistics for Anonymous Communication Networks Tariq Elahi, George Danezis, Ian Goldberg |
PrivEx: Private Collection of Traffic Statistics for Anonymous Communication Networks Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
The UNIX Process Identity Crisis: A Standards-Driven Approach to Setuid Mark S. Dittmer, Mahesh V. Tripunitara |
The UNIX Process Identity Crisis: A Standards-Driven Approach to Setuid Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
POSTER: Recommendation-based Third-Party Tracking Monitor to Balance Privacy with Personalization Qixu Liu, Qianru Wu, Yuqing Zhang, Xiali Wang |
POSTER: Recommendation-based Third-Party Tracking Monitor to Balance Privacy with Personalization Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Demo Overview: Privacy-Enhancing Features of IdentiDroid Daniele Midi, Oyindamola Oluwatimi, Bilal Shebaro, Elisa Bertino |
Demo Overview: Privacy-Enhancing Features of IdentiDroid Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Structural Data De-anonymization: Quantification, Practice, and Implications Shouling Ji, Weiqing Li, Mudhakar Srivatsa, Raheem A. Beyah |
Structural Data De-anonymization: Quantification, Practice, and Implications Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
WISCS 2014: The First ACM Workshop on Information Sharing & Collaborative Security Tomas Sander |
WISCS 2014: The First ACM Workshop on Information Sharing & Collaborative Security Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Fengguo Wei, Sankardas Roy, Xinming Ou, Robby |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Serge Egelman, Sakshi Jain, Rebecca S. Portnoff, Kerwell Liao, Sunny Consolvo, David A. Wagner |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
ALITHEIA: Towards Practical Verifiable Graph Processing Yupeng Zhang, Charalampos Papamanthou, Jonathan Katz |
ALITHEIA: Towards Practical Verifiable Graph Processing Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Tongxin Li, Xiao-yong Zhou, Luyi Xing, Yeonjoon Lee, Muhammad Naveed, XiaoFeng Wang, Xinhui Han |
Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Hesham Mekky, Aziz Mohaisen, Zhi-Li Zhang |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A Tale of Two Kernels: Towards Ending Kernel Hardening Wars with Split Kernel Anil Kurmus, Robby Zippel |
A Tale of Two Kernels: Towards Ending Kernel Hardening Wars with Split Kernel Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
POSTER: Password Entering and Transmission Security Gamze Canova, Melanie Volkamer, Simon Weiler |
POSTER: Password Entering and Transmission Security Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
POSTER: Positioning Attack on Proximity-Based People Discovery Huan Feng, Kang G. Shin |
POSTER: Positioning Attack on Proximity-Based People Discovery Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Collaborative Verification of Information Flow for a High-Assurance App Store Michael D. Ernst, René Just, Suzanne Millstein, Werner Dietl, Stuart Pernsteiner, Franziska Roesner, Karl Koscher, Paulo Barros, Ravi Bhoraskar, Seungyeop Han, Paul Vines, Edward XueJun Wu |
Collaborative Verification of Information Flow for a High-Assurance App Store Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
You Can Run but You Can't Read: Preventing Disclosure Exploits in Executable Code Michael Backes, Thorsten Holz, Benjamin Kollenda, Philipp Koppe, Stefan Nürnberger, Jannik Pewny |
You Can Run but You Can't Read: Preventing Disclosure Exploits in Executable Code Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Exciting Security Research Opportunity: Next-generation Internet Adrian Perrig |
Exciting Security Research Opportunity: Next-generation Internet Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
POSTER: LocMask: A Location Privacy Protection Framework in Android System Qiuyu Xiao, Jiayi Chen, Le Yu, Huaxin Li, Haojin Zhu, Muyuan Li, Kui Ren |
POSTER: LocMask: A Location Privacy Protection Framework in Android System Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Securing SSL Certificate Verification through Dynamic Linking Adam Bates, Joe Pletcher, Tyler Nichols, Braden Hollembaek, Dave Tian, Kevin R. B. Butler, Abdulrahman Alkhelaifi |
Securing SSL Certificate Verification through Dynamic Linking Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
POSTER: Arranging the Layout of Alphanumeric Buttons-the Role of Passwords Xiangxue Li, Yu Yu, Qiang Li, Haifeng Qian, Yuan Zhou, Jian Weng |
POSTER: Arranging the Layout of Alphanumeric Buttons-the Role of Passwords Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication Iasonas Polakis, Panagiotis Ilia, Federico Maggi, Marco Lancini, Georgios Kontaxis, Stefano Zanero, Sotiris Ioannidis, Angelos D. Keromytis |
Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Efficiently Verifiable Computation on Encrypted Data Dario Fiore, Rosario Gennaro, Valerio Pastro |
Efficiently Verifiable Computation on Encrypted Data Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
POSTER: Using Chinese Characters for Authentication-Algorithmic Framework and Empirical Results Xiangxue Li, Yu Yu, Qiang Li, Haifeng Qian, Yuan Zhou, Jian Weng |
POSTER: Using Chinese Characters for Authentication-Algorithmic Framework and Empirical Results Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Hey, NSA: Stay Away from my Market! Future Proofing App Markets against Powerful Attackers Sascha Fahl, Sergej Dechand, Henning Perl, Felix Fischer, Jaromir Smrcek, Matthew Smith |
Hey, NSA: Stay Away from my Market! Future Proofing App Markets against Powerful Attackers Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
POSTER: T-IP: A Self-Trustworthy and Secure Internet Protocol with Full Compliance to TCP/IP Xiaofeng Wang, Huan Zhou, Jinshu Su, Bofeng Zhang, Fan Yang |
POSTER: T-IP: A Self-Trustworthy and Secure Internet Protocol with Full Compliance to TCP/IP Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
POSTER: Enhancing Security and Privacy with Google Glass Johannes Krupp, Dominique Schröder, Mark Simkin |
POSTER: Enhancing Security and Privacy with Google Glass Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Information Leaks Without Memory Disclosures: Remote Side Channel Attacks on Diversified Code Jeff Seibert, Hamed Okkhravi, Eric Söderström |
Information Leaks Without Memory Disclosures: Remote Side Channel Attacks on Diversified Code Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Formatted Encryption Beyond Regular Languages Daniel Luchaup, Thomas Shrimpton, Thomas Ristenpart, Somesh Jha |
Formatted Encryption Beyond Regular Languages Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
POSTER: Efficient Method for Disjunctive and Conjunctive Keyword Search over Encrypted Data Yu Zhang, Songfeng Lu |
POSTER: Efficient Method for Disjunctive and Conjunctive Keyword Search over Encrypted Data Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Consequences of Connectivity: Characterizing Account Hijacking on Twitter Kurt Thomas, Frank Li, Chris Grier, Vern Paxson |
Consequences of Connectivity: Characterizing Account Hijacking on Twitter Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Code Reuse Attacks in PHP: Automated POP Chain Generation Johannes Dahse, Nikolai Krein, Thorsten Holz |
Code Reuse Attacks in PHP: Automated POP Chain Generation Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Not able to share produced artifacts
Verification:
Authors have
verified
information
|
Yu-Fang Chen, Chang-Hong Hsu, Hsin-Hung Lin, Peter Schwabe, Ming-Hsien Tsai, Bow-Yaw Wang, Bo-Yin Yang, Shang-Yi Yang |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Second Smart Energy Grid Security Workshop (SEGS 2014) Klaus Kursawe, Benessa Defend |
Second Smart Energy Grid Security Workshop (SEGS 2014) Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Clubbing Seals: Exploring the Ecosystem of Third-party Security Seals Tom van Goethem, Frank Piessens, Wouter Joosen, Nick Nikiforakis |
Clubbing Seals: Exploring the Ecosystem of Third-party Security Seals Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
POSTER: Euclidean Distance Based Encryption: How to Embed Fuzziness in Biometric Based Encryption Fuchun Guo, Willy Susilo, Yi Mu |
POSTER: Euclidean Distance Based Encryption: How to Embed Fuzziness in Biometric Based Encryption Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A New Additive Homomorphic Encryption based on the co-ACD Problem Jung Hee Cheon, Hyung Tae Lee, Jae Hong Seo |
A New Additive Homomorphic Encryption based on the co-ACD Problem Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Fully Secure and Fast Signing from Obfuscation Kim Ramchen, Brent Waters |
Fully Secure and Fast Signing from Obfuscation Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
DeTrust: Defeating Hardware Trust Verification with Stealthy Implicitly-Triggered Hardware Trojans Jie Zhang, Feng Yuan, Qiang Xu |
DeTrust: Defeating Hardware Trust Verification with Stealthy Implicitly-Triggered Hardware Trojans Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
WPES 2014: 13th Workshop on Privacy in the Electronic Society Gail-Joon Ahn, Anupam Datta |
WPES 2014: 13th Workshop on Privacy in the Electronic Society Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
RevCast: Fast, Private Certificate Revocation over FM Radio Aaron Schulman, Dave Levin, Neil Spring |
RevCast: Fast, Private Certificate Revocation over FM Radio Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Practical UC security with a Global Random Oracle Ran Canetti, Abhishek Jain, Alessandra Scafuro |
Practical UC security with a Global Random Oracle Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Security Analysis of the Estonian Internet Voting System Drew Springall, Travis Finkenauer, Zakir Durumeric, Jason Kitcat, Harri Hursti, Margaret MacAlpine, J. Alex Halderman |
Security Analysis of the Estonian Internet Voting System Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Rosemary: A Robust, Secure, and High-performance Network Operating System Seungwon Shin, YongJoo Song, Taekyung Lee, Sangho Lee, Jaewoong Chung, Phillip A. Porras, Vinod Yegneswaran, Jiseong Noh, Brent ByungHoon Kang |
Rosemary: A Robust, Secure, and High-performance Network Operating System Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Tutorial: Text Analytics for Security William Enck, Tao Xie |
Tutorial: Text Analytics for Security Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
VoIP Fraud: Identifying a Wolf in Sheep's Clothing Hemant Sengar |
VoIP Fraud: Identifying a Wolf in Sheep's Clothing Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
AUTOPROBE: Towards Automatic Active Malicious Server Probing Using Dynamic Binary Analysis Zhaoyan Xu, Antonio Nappa, Robert Baykov, Guangliang Yang, Juan Caballero, Guofei Gu |
AUTOPROBE: Towards Automatic Active Malicious Server Probing Using Dynamic Binary Analysis Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
POSTER: How Distributed Are Today's DDoS Attacks? An Wang, Wentao Chang, Aziz Mohaisen, Songqing Chen |
POSTER: How Distributed Are Today's DDoS Attacks? Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
POSTER: Mining Elephant Applications in Unknown Traffic by Service Clustering Hongliang Yu, Yong Zhao, Gang Xiong, Li Guo, Zhen Li, Yong Wang |
POSTER: Mining Elephant Applications in Unknown Traffic by Service Clustering Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Client-Controlled Cloud Encryption Florian Kerschbaum |
Client-Controlled Cloud Encryption Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Your Online Interests: Pwned! A Pollution Attack Against Targeted Advertising Wei Meng, Xinyu Xing, Anmol Sheth, Udi Weinsberg, Wenke Lee |
Your Online Interests: Pwned! A Pollution Attack Against Targeted Advertising Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
POSTER: TLS Proxies: Friend or Foe? Mark O'Neill, Scott Ruoti, Kent E. Seamons, Daniel Zappala |
POSTER: TLS Proxies: Friend or Foe? Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Do You Hear What I Hear?: Fingerprinting Smart Devices Through Embedded Acoustic Components Anupam Das, Nikita Borisov, Matthew Caesar |
Do You Hear What I Hear?: Fingerprinting Smart Devices Through Embedded Acoustic Components Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Yutaka Juba, Hung-Hsuan Huang, Kyoji Kawagoe |
Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Semantics-Aware Android Malware Classification Using Weighted Contextual API Dependency Graphs Mu Zhang, Yue Duan, Heng Yin, Zhiruo Zhao |
Semantics-Aware Android Malware Classification Using Weighted Contextual API Dependency Graphs Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
POSTER: On the Capability of DNS Cache Poisoning Attacks Zheng Wang |
POSTER: On the Capability of DNS Cache Poisoning Attacks Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Hypervision Across Worlds: Real-time Kernel Protection from the ARM TrustZone Secure World Ahmed M. Azab, Peng Ning, Jitesh Shah, Quan Chen, Rohan Bhutkar, Guruprasad Ganesh, Jia Ma, Wenbo Shen |
Hypervision Across Worlds: Real-time Kernel Protection from the ARM TrustZone Secure World Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Workshop Summary of AISec'14: 2014 Workshop on Artificial Intelligent and Security Christos Dimitrakakis, Aikaterini Mitrokotsa, Benjamin I. P. Rubinstein |
Workshop Summary of AISec'14: 2014 Workshop on Artificial Intelligent and Security Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Optimal Geo-Indistinguishable Mechanisms for Location Privacy Nicolás Emilio Bordenabe, Konstantinos Chatzikokolakis, Catuscia Palamidessi |
Optimal Geo-Indistinguishable Mechanisms for Location Privacy Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
World-Driven Access Control for Continuous Sensing Franziska Roesner, David Molnar, Alexander Moshchuk, Tadayoshi Kohno, Helen J. Wang |
World-Driven Access Control for Continuous Sensing Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Multi-Ciphersuite Security of the Secure Shell (SSH) Protocol Florian Bergsma, Benjamin Dowling, Florian Kohlar, Jörg Schwenk, Douglas Stebila |
Multi-Ciphersuite Security of the Secure Shell (SSH) Protocol Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Outsourced Proofs of Retrievability Frederik Armknecht, Jens-Matthias Bohli, Ghassan O. Karame, Zongren Liu, Christian A. Reuter |
Outsourced Proofs of Retrievability Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Taking Authenticated Range Queries to Arbitrary Dimensions Dimitrios Papadopoulos, Stavros Papadopoulos, Nikos Triandopoulos |
Taking Authenticated Range Queries to Arbitrary Dimensions Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A Nearly Four-Year Longitudinal Study of Search-Engine Poisoning Nektarios Leontiadis, Tyler Moore, Nicolas Christin |
A Nearly Four-Year Longitudinal Study of Search-Engine Poisoning Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Increasing Security Sensitivity With Social Proof: A Large-Scale Experimental Confirmation Sauvik Das, Adam D. I. Kramer, Laura A. Dabbish, Jason I. Hong |
Increasing Security Sensitivity With Social Proof: A Large-Scale Experimental Confirmation Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Community-Enhanced De-anonymization of Online Social Networks Shirin Nilizadeh, Apu Kapadia, Yong-Yeol Ahn |
Community-Enhanced De-anonymization of Online Social Networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Martin Emms, Budi Arief, Leo Freitas, Joseph Hannon, Aad P. A. van Moorsel |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Controlled Functional Encryption Muhammad Naveed, Shashank Agrawal, Manoj Prabhakaran, XiaoFeng Wang, Erman Ayday, Jean-Pierre Hubaux, Carl A. Gunter |
Controlled Functional Encryption Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
From Patches to Honey-Patches: Lightweight Attacker Misdirection, Deception, and Disinformation Frederico Araujo, Kevin W. Hamlen, Sebastian Biedermann, Stefan Katzenbeisser |
From Patches to Honey-Patches: Lightweight Attacker Misdirection, Deception, and Disinformation Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Beware, Your Hands Reveal Your Secrets! Diksha Shukla, Rajesh Kumar, Abdul Serwadda, Vir V. Phoha |
Beware, Your Hands Reveal Your Secrets! Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
POSTER: An E2E Trusted Cloud Infrastructure Juan Wang, Bo Zhao, Huanguo Zhang, Fei Yan, Fajiang Yu, Liqiang Zhang, Hongxin Hu |
POSTER: An E2E Trusted Cloud Infrastructure Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
The Web Never Forgets: Persistent Tracking Mechanisms in the Wild Gunes Acar, Christian Eubank, Steven Englehardt, Marc Juárez, Arvind Narayanan, Claudia Díaz |
The Web Never Forgets: Persistent Tracking Mechanisms in the Wild Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Ehab Al-Shaer, Krishna Kant |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Breaking Integrated Circuit Device Security through Test Mode Silicon Reverse Engineering Markus Kammerstetter, Markus Muellner, Daniel Burian, Christian Platzer, Wolfgang Kastner |
Breaking Integrated Circuit Device Security through Test Mode Silicon Reverse Engineering Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A Threat for Tablet PCs in Public Space: Remote Visualization of Screen Images Using EM Emanation Yu-ichi Hayashi, Naofumi Homma, Mamoru Miura, Takafumi Aoki, Hideaki Sone |
A Threat for Tablet PCs in Public Space: Remote Visualization of Screen Images Using EM Emanation Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Beyond Pattern Matching: A Concurrency Model for Stateful Deep Packet Inspection Lorenzo De Carli, Robin Sommer, Somesh Jha |
Beyond Pattern Matching: A Concurrency Model for Stateful Deep Packet Inspection Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Context-free Attacks Using Keyboard Acoustic Emanations Tong Zhu, Qiang Ma, Shanfeng Zhang, Yunhao Liu |
Context-free Attacks Using Keyboard Acoustic Emanations Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
ShadowCrypt: Encrypted Web Applications for Everyone Warren He, Devdatta Akhawe, Sumeet Jain, Elaine Shi, Dawn Xiaodong Song |
ShadowCrypt: Encrypted Web Applications for Everyone Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Synthesis of Fault Attacks on Cryptographic Implementations Gilles Barthe, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Jean-Christophe Zapalowicz |
Synthesis of Fault Attacks on Cryptographic Implementations Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Cross-Tenant Side-Channel Attacks in PaaS Clouds Yinqian Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart |
Cross-Tenant Side-Channel Attacks in PaaS Clouds Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
(Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection Michael Backes, Aniket Kate, Sebastian Meiser, Esfandiar Mohammadi |
(Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
POSTER: When and How to Implicitly Authenticate Smartphone Users Aaron Atwater, Hassan Khan, Urs Hengartner |
POSTER: When and How to Implicitly Authenticate Smartphone Users Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
POSTER: UAFChecker: Scalable Static Detection of Use-After-Free Vulnerabilities Jiayi Ye, Chao Zhang, Xinhui Han |
POSTER: UAFChecker: Scalable Static Detection of Use-After-Free Vulnerabilities Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
MACE: Detecting Privilege Escalation Vulnerabilities in Web Applications Maliheh Monshizadeh, Prasad Naldurg, V. N. Venkatakrishnan |
MACE: Detecting Privilege Escalation Vulnerabilities in Web Applications Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
POSTER: Analyzing Access Control Policies with SMT Fatih Turkmen, Jerry den Hartog, Nicola Zannone |
POSTER: Analyzing Access Control Policies with SMT Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Algebraic MACs and Keyed-Verification Anonymous Credentials Melissa Chase, Sarah Meiklejohn, Greg Zaverucha |
Algebraic MACs and Keyed-Verification Anonymous Credentials Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Real Threats to Your Data Bills: Security Loopholes and Defenses in Mobile Data Charging Chunyi Peng, Chi-Yu Li, Hongyi Wang, Guan-Hua Tu, Songwu Lu |
Real Threats to Your Data Bills: Security Loopholes and Defenses in Mobile Data Charging Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Characterizing Large-Scale Click Fraud in ZeroAccess Paul Pearce, Vacha Dave, Chris Grier, Kirill Levchenko, Saikat Guha, Damon McCoy, Vern Paxson, Stefan Savage, Geoffrey M. Voelker |
Characterizing Large-Scale Click Fraud in ZeroAccess Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
POSTER: A Proactive Cloud-Based Cross-Reference Forensic Framework Zhenbang Liu, Hengming Zou |
POSTER: A Proactive Cloud-Based Cross-Reference Forensic Framework Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Searchable Encryption with Secure and Efficient Updates Florian Hahn, Florian Kerschbaum |
Searchable Encryption with Secure and Efficient Updates Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Vulnerability and Protection of Channel State Information in Multiuser MIMO Networks Yu-Chih Tung, Sihui Han, Dongyao Chen, Kang G. Shin |
Vulnerability and Protection of Channel State Information in Multiuser MIMO Networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
POSTER: A Measurement Framework to Quantify Software Protections Paolo Tonella, Mariano Ceccato, Bjorn De Sutter, Bart Coppens |
POSTER: A Measurement Framework to Quantify Software Protections Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Other
Verification:
Authors have
verified
information
|
POSTER: A Lightweight Unknown HTTP Botnets Detecting and Characterizing System Ke Li, Chaoge Liu, Xiang Cui |
POSTER: A Lightweight Unknown HTTP Botnets Detecting and Characterizing System Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
ATRA: Address Translation Redirection Attack against Hardware-based External Monitors DaeHee Jang, Hojoon Lee, Minsu Kim, Daehyeok Kim, Daegyeong Kim, Brent ByungHoon Kang |
ATRA: Address Translation Redirection Attack against Hardware-based External Monitors Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Automating Information Flow Analysis of Low Level Code Musard Balliu, Mads Dam, Roberto Guanciale |
Automating Information Flow Analysis of Low Level Code Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Quantifying Web-Search Privacy Arthur Gervais, Reza Shokri, Adish Singla, Srdjan Capkun, Vincent Lenders |
Quantifying Web-Search Privacy Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
OAuth Demystified for Mobile Application Developers Eric Y. Chen, Yutong Pei, Shuo Chen, Yuan Tian, Robert Kotcher, Patrick Tague |
OAuth Demystified for Mobile Application Developers Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
MTD 2014: First ACM Workshop on Moving Target Defense Sushil Jajodia, Kun Sun |
MTD 2014: First ACM Workshop on Moving Target Defense Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
POSTER: Quasi-ID: In fact, I am a human Milivoj Simeonovski |
POSTER: Quasi-ID: In fact, I am a human Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
POSTER: On the Resilience of DNS Infrastructure Haya Shulman, Shiran Ezra |
POSTER: On the Resilience of DNS Infrastructure Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A11y Attacks: Exploiting Accessibility in Operating Systems Yeongjin Jang, Chengyu Song, Simon P. Chung, Tielei Wang, Wenke Lee |
A11y Attacks: Exploiting Accessibility in Operating Systems Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
ClickMiner: Towards Forensic Reconstruction of User-Browser Interactions from Network Traces Christopher Neasbitt, Roberto Perdisci, Kang Li, Terry Nelms |
ClickMiner: Towards Forensic Reconstruction of User-Browser Interactions from Network Traces Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Multi-Stage Key Exchange and the Case of Google's QUIC Protocol Marc Fischlin, Felix Günther |
Multi-Stage Key Exchange and the Case of Google's QUIC Protocol Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Fourth International Workshop on Trustworthy Embedded Devices (TrustED 2014) Frederik Armknecht, Jorge Guajardo |
Fourth International Workshop on Trustworthy Embedded Devices (TrustED 2014) Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
POSTER: A Hybrid Botnet Ecological Environment Dai Yumei, Liang Yu, Li Ke |
POSTER: A Hybrid Botnet Ecological Environment Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Security Analyses of Click-based Graphical Passwords via Image Point Memorability Bin B. Zhu, Jeff Yan, Dongchen Wei, Maowei Yang |
Security Analyses of Click-based Graphical Passwords via Image Point Memorability Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Reuse It Or Lose It: More Efficient Secure Computation Through Reuse of Encrypted Values Benjamin Mood, Debayan Gupta, Kevin R. B. Butler, Joan Feigenbaum |
Reuse It Or Lose It: More Efficient Secure Computation Through Reuse of Encrypted Values Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
ARPKI: Attack Resilient Public-Key Infrastructure David A. Basin, Cas J. F. Cremers, Tiffany Hyun-Jin Kim, Adrian Perrig, Ralf Sasse, Pawel Szalachowski |
ARPKI: Attack Resilient Public-Key Infrastructure Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
CCSW 2014: Sixth ACM Cloud Computing Security Workshop Alina Oprea, Reihaneh Safavi-Naini |
CCSW 2014: Sixth ACM Cloud Computing Security Workshop Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Characterization of Real-Life PRNGs under Partial State Corruption Mario Cornejo, Sylvain Ruhault |
Characterization of Real-Life PRNGs under Partial State Corruption Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
POSTER: Android System Broadcast Actions Broadcasts Your Privacy Fadi Mohsen, Mohamed Shehab, Emmanuel Bello-Ogunu, Abeer Al Jarrah |
POSTER: Android System Broadcast Actions Broadcasts Your Privacy Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Optimizing Obfuscation: Avoiding Barrington's Theorem Prabhanjan Vijendra Ananth, Divya Gupta, Yuval Ishai, Amit Sahai |
Optimizing Obfuscation: Avoiding Barrington's Theorem Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
POSTER: Misuseablity Analysis for IT Infrastructure Asaf Shabtai, Yuval Elovici |
POSTER: Misuseablity Analysis for IT Infrastructure Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
SIW 2014: First Workshop on Security Information Workers Emerson R. Murphy-Hill, Heather Richter Lipford, Bill Chu, Robert Biddle |
SIW 2014: First Workshop on Security Information Workers Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
POSTER: TraceVirt: A Framework for Detecting the Non-tampering Attacks in the Virtual Machine Jie Lin, Chuanyi Liu, Binxing Fang |
POSTER: TraceVirt: A Framework for Detecting the Non-tampering Attacks in the Virtual Machine Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
CCS'14 Co-Located Workshop Summary for SPSM 2014 Kapil Singh, Zhenkai Liang |
CCS'14 Co-Located Workshop Summary for SPSM 2014 Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
VerSum: Verifiable Computations over Large Public Logs Jelle van den Hooff, M. Frans Kaashoek, Nickolai Zeldovich |
VerSum: Verifiable Computations over Large Public Logs Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
How to Use Bitcoin to Incentivize Correct Computations Ranjit Kumaresan, Iddo Bentov |
How to Use Bitcoin to Incentivize Correct Computations Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
ALETHEIA: Improving the Usability of Static Security Analysis Omer Tripp, Salvatore Guarnieri, Marco Pistoia, Aleksandr Y. Aravkin |
ALETHEIA: Improving the Usability of Static Security Analysis Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Blind Recognition of Touched Keys on Mobile Devices Qinggang Yue, Zhen Ling, Xinwen Fu, Benyuan Liu, Kui Ren, Wei Zhao |
Blind Recognition of Touched Keys on Mobile Devices Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
RockJIT: Securing Just-In-Time Compilation Using Modular Control-Flow Integrity Ben Niu, Gang Tan |
RockJIT: Securing Just-In-Time Compilation Using Modular Control-Flow Integrity Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
ARMlock: Hardware-based Fault Isolation for ARM Yajin Zhou, Xiaoguang Wang, Yue Chen, Zhi Wang |
ARMlock: Hardware-based Fault Isolation for ARM Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Wiretapping via Mimicry: Short Voice Imitation Man-in-the-Middle Attacks on Crypto Phones Maliheh Shirvanian, Nitesh Saxena |
Wiretapping via Mimicry: Short Voice Imitation Man-in-the-Middle Attacks on Crypto Phones Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A Critical Evaluation of Website Fingerprinting Attacks Marc Juárez, Sadia Afroz, Gunes Acar, Claudia Díaz, Rachel Greenstadt |
A Critical Evaluation of Website Fingerprinting Attacks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Blind Transmitter Authentication for Spectrum Security and Enforcement Vireshwar Kumar, Jung-Min Park, Kaigui Bian |
Blind Transmitter Authentication for Spectrum Security and Enforcement Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Not able to share produced artifacts
Verification:
Authors have
verified
information
|
Acoustic Fingerprinting Revisited: Generate Stable Device ID Stealthily with Inaudible Sound Zhe Zhou, Wenrui Diao, Xiangyu Liu, Kehuan Zhang |
Acoustic Fingerprinting Revisited: Generate Stable Device ID Stealthily with Inaudible Sound Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Routing Bottlenecks in the Internet: Causes, Exploits, and Countermeasures Min Suk Kang, Virgil D. Gligor |
Routing Bottlenecks in the Internet: Causes, Exploits, and Countermeasures Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Xiao Shaun Wang, Kartik Nayak, Chang Liu, T.-H. Hubert Chan, Elaine Shi, Emil Stefanov, Yan Huang |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Jyun-Yu Jiang, Chun-Liang Li, Chun-Pai Yang, Chung-Tsai Su |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Dialing Back Abuse on Phone Verified Accounts Kurt Thomas, Dmytro Iatskiv, Elie Bursztein, Tadek Pietraszek, Chris Grier, Damon McCoy |
Dialing Back Abuse on Phone Verified Accounts Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|