Florian Quinkert, Eduard Leonhardt, Thorsten Holz
DorkPot: A Honeypot-based Analysis of Google Dorks
View More Papers
Tag of the Dead: How Terminated SaaS Tags Become...
Takahito Sakamoto, Takuya Murozono (DataSign Inc)
Read Moreinsecure:// Vulnerability Analysis of URI Scheme Handling in Android...
Abdulla Aldoseri (University of Birmingham) and David Oswald (University of Birmingham)
Read MoreHideNoSeek: Camouflaging Malicious JavaScript in Benign ASTs
Aurore Fass, Michael Backes, Ben Stock
Read More