Florian Quinkert, Eduard Leonhardt, Thorsten Holz
DorkPot: A Honeypot-based Analysis of Google Dorks
View More Papers
Why do Internet Devices Remain Vulnerable? A Survey with...
Tamara Bondar, Hala Assal, AbdelRahman Abdou (Carleton University)
Read MoreHideNoSeek: Camouflaging Malicious JavaScript in Benign ASTs
Aurore Fass, Michael Backes, Ben Stock
Read MoreLog4shell: Redefining the Web Attack Surface
Douglas Everson (Clemson University), Long Cheng (Clemson University), and Zhenkai Zhang (Clemson University)
Read MoreWhat Remains Uncaught?: Characterizing Sparsely Detected Malicious URLs on...
Sayak Saha Roy, Unique Karanjit, Shirin Nilizadeh (The University of Texas at Arlington)
Read More