Title/Authors | Title | Research Artifacts
[?] A research
artifact is any by-product of a research project that is not
directly included in the published research paper. In Computer
Science research this is often source code and data sets, but
it could also be media, documentation, inputs to proof
assistants, shell-scripts to run experiments, etc.
|
Details |
---|
The Cut-and-Choose Game and Its Application to Cryptographic Protocols Ruiyu Zhu, Yan Huang, Jonathan Katz, Abhi Shelat |
The Cut-and-Choose Game and Its Application to Cryptographic Protocols Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Verifying Constant-Time Implementations José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, François Dupressoir, Michael Emmi |
Verifying Constant-Time Implementations Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Brendan Saltaformaggio, Rohit Bhatia, Xiangyu Zhang, Dongyan Xu, Golden G. Richard III |
Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
One Bit Flips, One Cloud Flops: Cross-VM Row Hammer Attacks and Privilege Escalation Yuan Xiao, Xiaokuan Zhang, Yinqian Zhang, Radu Teodorescu |
One Bit Flips, One Cloud Flops: Cross-VM Row Hammer Attacks and Privilege Escalation Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Michael Backes, Sven Bugiel, Erik Derr, Patrick D. McDaniel, Damien Octeau, Sebastian Weisgerber |
Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Amit Vasudevan, Sagar Chaki, Petros Maniatis, Limin Jia, Anupam Datta |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Website-Targeted False Content Injection by Network Operators Gabi Nakibly, Jaime Schcolnik, Yossi Rubin |
Website-Targeted False Content Injection by Network Operators Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
APISan: Sanitizing API Usages through Semantic Cross-Checking Insu Yun, Changwoo Min, Xujie Si, Yeongjin Jang, Taesoo Kim, Mayur Naik |
APISan: Sanitizing API Usages through Semantic Cross-Checking Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Post-quantum Key Exchange - A New Hope Erdem Alkim, Léo Ducas, Thomas Pöppelmann, Peter Schwabe |
Post-quantum Key Exchange - A New Hope Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Virtual U: Defeating Face Liveness Detection by Building Virtual Models from Your Public Photos Yi Xu, True Price, Jan-Michael Frahm, Fabian Monrose |
Virtual U: Defeating Face Liveness Detection by Building Virtual Models from Your Public Photos Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Santiago Torres-Arias, Anil Kumar Ammula, Reza Curtmola, Justin Cappos |
Details |
Author Comments:
Some of the fixes proposed in our paper are in the production git codebase as of 2.9.0. [ You can find the release notes for git that mention the inclusion of some of our patches into git here: https://lwn.net/Articles/691223/ (Notice the first author's name in contributors list.) The discussion thread, etc. about the actual patch set and what it includes is here: https://public-inbox.org/git/20161007210721.20437-1-santiago@nyu.edu/ ]
We are working with to integrate other techniques from the paper now. While we recommend using our changes to the production git code to do any benchmarking or comparison, we would be happy to provide a copy of our prototype code to any researchers that request it.
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware Amin Kharraz, Sajjad Arshad, Collin Mulliner, William K. Robertson, Engin Kirda |
UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Making USB Great Again with USBFILTER Dave (Jing) Tian, Nolen Scaife, Adam Bates, Kevin R. B. Butler, Patrick Traynor |
Making USB Great Again with USBFILTER Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Stealing Machine Learning Models via Prediction APIs Florian Tramèr, Fan Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart |
Stealing Machine Learning Models via Prediction APIs Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks Peter Pessl, Daniel Gruss, Clémentine Maurice, Michael Schwarz, Stefan Mangard |
DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Off-Path TCP Exploits: Global Rate Limit Considered Dangerous Yue Cao, Zhiyun Qian, Zhongjie Wang, Tuan Dao, Srikanth V. Krishnamurthy, Lisa M. Marvel |
Off-Path TCP Exploits: Global Rate Limit Considered Dangerous Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Alex Biryukov, Dmitry Khovratovich |
Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Automatically Detecting Error Handling Bugs Using Error Specifications Suman Jana, Yuan Jochen Kang, Samuel Roth, Baishakhi Ray |
Automatically Detecting Error Handling Bugs Using Error Specifications Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
AuthLoop: End-to-End Cryptographic Authentication for Telephony over Voice Channels Bradley Reaves, Logan Blue, Patrick Traynor |
AuthLoop: End-to-End Cryptographic Authentication for Telephony over Voice Channels Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Not able to share produced artifacts
Verification:
Authors have
verified
information
|
The Million-Key Question - Investigating the Origins of RSA Public Keys Petr Svenda, Matús Nemec, Peter Sekan, Rudolf Kvasnovský, David Formánek, David Komárek, Vashek Matyás |
The Million-Key Question - Investigating the Origins of RSA Public Keys Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Protecting Privacy of BLE Device Users Kassem Fawaz, Kyu-Han Kim, Kang G. Shin |
Protecting Privacy of BLE Device Users Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Optimized Invariant Representation of Network Traffic for Detecting Unseen Malware Variants Karel Bartos, Michal Sofka, Vojtech Franc |
Optimized Invariant Representation of Network Traffic for Detecting Unseen Malware Variants Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Privacy in Epigenetics: Temporal Linkability of MicroRNA Expression Profiles Michael Backes, Pascal Berrang, Anna Hecksteden, Mathias Humbert, Andreas Keller, Tim Meyer |
Privacy in Epigenetics: Temporal Linkability of MicroRNA Expression Profiles Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Towards Measuring and Mitigating Social Engineering Software Download Attacks Terry Nelms, Roberto Perdisci, Manos Antonakakis, Mustaque Ahamad |
Towards Measuring and Mitigating Social Engineering Software Download Attacks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Undermining Information Hiding (and What to Do about It) Enes Göktas, Robert Gawlik, Benjamin Kollenda, Elias Athanasopoulos, Georgios Portokalidis, Cristiano Giuffrida, Herbert Bos |
Undermining Information Hiding (and What to Do about It) Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Identifying and Characterizing Sybils in the Tor Network Philipp Winter, Roya Ensafi, Karsten Loesing, Nick Feamster |
Identifying and Characterizing Sybils in the Tor Network Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Thoth: Comprehensive Policy Compliance in Data Retrieval Systems Eslam Elnikety, Aastha Mehta, Anjo Vahldiek-Oberwagner, Deepak Garg, Peter Druschel |
Thoth: Comprehensive Policy Compliance in Data Retrieval Systems Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Not able to share produced artifacts
Verification:
Authors have
verified
information
|
ZKBoo: Faster Zero-Knowledge for Boolean Circuits Irene Giacomelli, Jesper Madsen, Claudio Orlandi |
ZKBoo: Faster Zero-Knowledge for Boolean Circuits Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
k-fingerprinting: A Robust Scalable Website Fingerprinting Technique Jamie Hayes, George Danezis |
k-fingerprinting: A Robust Scalable Website Fingerprinting Technique Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Lock It and Still Lose It - on the (In)Security of Automotive Remote Keyless Entry Systems Flavio D. Garcia, David Oswald, Timo Kasper, Pierre Pavlidès |
Lock It and Still Lose It - on the (In)Security of Automotive Remote Keyless Entry Systems Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Micro-Virtualization Memory Tracing to Detect and Prevent Spraying Attacks Stefano Cristalli, Mattia Pagnozzi, Mariano Graziano, Andrea Lanzi, Davide Balzarotti |
Micro-Virtualization Memory Tracing to Detect and Prevent Spraying Attacks Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Trusted Browsers for Uncertain Times David Kohlbrenner, Hovav Shacham |
Trusted Browsers for Uncertain Times Details |
Author Comments:
Fuzzyfox is designed to test the feasibility of a subset of the defenses outlined in the paper. Feel free to use it in your research on timing side channels and defenses, we only ask that you be clear about the limitations of what it mitigates.
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Faster Malicious 2-Party Secure Computation with Online/Offline Dual Execution Peter Rindal, Mike Rosulek |
Faster Malicious 2-Party Secure Computation with Online/Offline Dual Execution Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Ariadne: A Minimal Approach to State Continuity Raoul Strackx, Frank Piessens |
Ariadne: A Minimal Approach to State Continuity Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Predicting, Decrypting, and Abusing WPA2/802.11 Group Keys Mathy Vanhoef, Frank Piessens |
Predicting, Decrypting, and Abusing WPA2/802.11 Group Keys Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Nicholas Carlini, Pratyush Mishra, Tavish Vaidya, Yuankai Zhang, Micah Sherr, Clay Shields, David A. Wagner, Wenchao Zhou |
Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Tracing Information Flows Between Ad Exchanges Using Retargeted Ads Muhammad Ahmad Bashir, Sajjad Arshad, William K. Robertson, Christo Wilson |
Tracing Information Flows Between Ad Exchanges Using Retargeted Ads Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Defending against Malicious Peripherals with Cinch Sebastian Angel, Riad S. Wahby, Max Howald, Joshua B. Leners, Michael Spilo, Zhen Sun, Andrew J. Blumberg, Michael Walfish |
Defending against Malicious Peripherals with Cinch Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Investigating Commercial Pay-Per-Install and the Distribution of Unwanted Software Kurt Thomas, Juan A. Elices Crespo, Ryan Rasti, Jean Michel Picod, Cait Phillips, Marc-André Decoste, Chris Sharp, Fabio Tirelo, Ali Tofigh, Marc-Antoine Courteau, Lucas Ballard, Robert Shield, Nav Jagpal, Moheeb Abu Rajab, Panayiotis Mavrommatis, Niels Provos, Elie Bursztein, Damon McCoy |
Investigating Commercial Pay-Per-Install and the Distribution of Unwanted Software Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A Comprehensive Measurement Study of Domain Generating Malware Daniel Plohmann, Khaled Yakdan, Michael Klatt, Johannes Bader, Elmar Gerhards-Padilla |
A Comprehensive Measurement Study of Domain Generating Malware Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Request and Conquer: Exposing Cross-Origin Resource Size Tom van Goethem, Mathy Vanhoef, Frank Piessens, Wouter Joosen |
Request and Conquer: Exposing Cross-Origin Resource Size Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Measuring PUP Prevalence and PUP Distribution through Pay-Per-Install Services Platon Kotzias, Leyla Bilge, Juan Caballero |
Measuring PUP Prevalence and PUP Distribution through Pay-Per-Install Services Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
You've Got Vulnerability: Exploring Effective Vulnerability Notifications Frank Li, Zakir Durumeric, Jakub Czyz, Mohammad Karami, Michael Bailey, Damon McCoy, Stefan Savage, Vern Paxson |
You've Got Vulnerability: Exploring Effective Vulnerability Notifications Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Specification Mining for Intrusion Detection in Networked Control Systems Marco Caselli, Emmanuele Zambon, Johanna Amann, Robin Sommer, Frank Kargl |
Specification Mining for Intrusion Detection in Networked Control Systems Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
An In-Depth Analysis of Disassembly on Full-Scale x86/x64 Binaries Dennis Andriesse, Xi Chen, Victor van der Veen, Asia Slowinska, Herbert Bos |
An In-Depth Analysis of Disassembly on Full-Scale x86/x64 Binaries Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability Notification Ben Stock, Giancarlo Pellegrino, Christian Rossow, Martin Johns, Michael Backes |
Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability Notification Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced no artifacts
Verification:
Authors have
verified
information
|
The Ever-Changing Labyrinth: A Large-Scale Analysis of Wildcard DNS Powered Blackhat SEO Kun Du, Hao Yang, Zhou Li, Hai-Xin Duan, Kehuan Zhang |
The Ever-Changing Labyrinth: A Large-Scale Analysis of Wildcard DNS Powered Blackhat SEO Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Adam Lerner, Anna Kornfeld Simpson, Tadayoshi Kohno, Franziska Roesner |
Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
PIkit: A New Kernel-Independent Processor-Interconnect Rootkit WonJun Song, Hyunwoo Choi, Junhong Kim, Eunsoo Kim, Yongdae Kim, John Kim |
PIkit: A New Kernel-Independent Processor-Interconnect Rootkit Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
What Cannot Be Read, Cannot Be Leveraged? Revisiting Assumptions of JIT-ROP Defenses Giorgi Maisuradze, Michael Backes, Christian Rossow |
What Cannot Be Read, Cannot Be Leveraged? Revisiting Assumptions of JIT-ROP Defenses Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Authenticated Network Time Synchronization Benjamin Dowling, Douglas Stebila, Greg Zaverucha |
Authenticated Network Time Synchronization Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Flip Feng Shui: Hammering a Needle in the Software Stack Kaveh Razavi, Ben Gras, Erik Bosman, Bart Preneel, Cristiano Giuffrida, Herbert Bos |
Flip Feng Shui: Hammering a Needle in the Software Stack Details |
|
Author Comments:
The two exploits developed as part of this paper are withheld in order to protect the affected parties. The video demos of the exploits can be found here: https://www.vusec.net/projects/flip-feng-shui
Discussion Comments:
0
Sharing:
Not able to share produced artifacts
Verification:
Authors have
verified
information
|
ARMageddon: Cache Attacks on Mobile Devices Moritz Lipp, Daniel Gruss, Raphael Spreitzer, Clémentine Maurice, Stefan Mangard |
ARMageddon: Cache Attacks on Mobile Devices Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Practical DIFC Enforcement on Android Adwait Nadkarni, Benjamin Andow, William Enck, Somesh Jha |
Practical DIFC Enforcement on Android Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
DROWN: Breaking TLS Using SSLv2 Nimrod Aviram, Sebastian Schinzel, Juraj Somorovsky, Nadia Heninger, Maik Dankel, Jens Steube, Luke Valenta, David Adrian, J. Alex Halderman, Viktor Dukhovni, Emilia Käsper, Shaanan Cohney, Susanne Engels, Christof Paar, Yuval Shavitt |
DROWN: Breaking TLS Using SSLv2 Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Not able to share produced artifacts
Verification:
Authors have
verified
information
|
OblivP2P: An Oblivious Peer-to-Peer Content Sharing System Yaoqi Jia, Tarik Moataz, Shruti Tople, Prateek Saxena |
OblivP2P: An Oblivious Peer-to-Peer Content Sharing System Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
fTPM: A Software-Only Implementation of a TPM Chip Himanshu Raj, Stefan Saroiu, Alec Wolman, Ronald Aigner, Jeremiah Cox, Paul England, Chris Fenner, Kinshuman Kinshumann, Jork Löser, Dennis Mattoon, Magnus Nyström, David Robinson, Rob Spiger, Stefan Thom, David Wooten |
fTPM: A Software-Only Implementation of a TPM Chip Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Poking Holes in Information Hiding Angelos Oikonomopoulos, Elias Athanasopoulos, Herbert Bos, Cristiano Giuffrida |
Poking Holes in Information Hiding Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Secure, Precise, and Fast Floating-Point Operations on x86 Processors Ashay Rane, Calvin Lin, Mohit Tiwari |
Secure, Precise, and Fast Floating-Point Operations on x86 Processors Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
FlowFence: Practical Data Protection for Emerging IoT Application Frameworks Earlence Fernandes, Justin Paupore, Amir Rahmati, Daniel Simionato, Mauro Conti, Atul Prakash |
FlowFence: Practical Data Protection for Emerging IoT Application Frameworks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Sanctum: Minimal Hardware Extensions for Strong Software Isolation Victor Costan, Ilia A. Lebedev, Srinivas Devadas |
Sanctum: Minimal Hardware Extensions for Strong Software Isolation Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Fingerprinting Electronic Control Units for Vehicle Intrusion Detection Kyong-Tak Cho, Kang G. Shin |
Fingerprinting Electronic Control Units for Vehicle Intrusion Detection Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption Yupeng Zhang, Jonathan Katz, Charalampos Papamanthou |
All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
An Empirical Study of Textual Key-Fingerprint Representations Sergej Dechand, Dominik Schürmann, Karoline Busse, Yasemin Acar, Sascha Fahl, Matthew Smith |
An Empirical Study of Textual Key-Fingerprint Representations Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Neil Zhenqiang Gong, Bin Liu |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks William Melicher, Blase Ur, Sean M. Segreti, Saranga Komanduri, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor |
Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing Eleftherios Kokoris-Kogias, Philipp Jovanovic, Nicolas Gailly, Ismail Khoffi, Linus Gasser, Bryan Ford |
Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage Christina Garman, Matthew Green, Gabriel Kaptchuk, Ian Miers, Michael Rushanan |
Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Oblivious Multi-Party Machine Learning on Trusted Processors Olga Ohrimenko, Felix Schuster, Cédric Fournet, Aastha Mehta, Sebastian Nowozin, Kapil Vaswani, Manuel Costa |
Oblivious Multi-Party Machine Learning on Trusted Processors Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Mirror: Enabling Proofs of Data Replication and Retrievability in the Cloud Frederik Armknecht, Ludovic Barman, Jens-Matthias Bohli, Ghassan O. Karame |
Mirror: Enabling Proofs of Data Replication and Retrievability in the Cloud Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
zxcvbn: Low-Budget Password Strength Estimation Daniel Lowe Wheeler |
zxcvbn: Low-Budget Password Strength Estimation Details |
Discussion Comments:
0
Verification:
Author has
not verified
information
|
|
Harvesting Inconsistent Security Configurations in Custom Android ROMs via Differential Analysis Yousra Aafer, Xiao Zhang, Wenliang Du |
Harvesting Inconsistent Security Configurations in Custom Android ROMs via Differential Analysis Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|