TBA
View More Papers
Awakening the Web's Sleeper Agents: Misusing Service Workers for...
Soroush Karami (University of Illinois at Chicago), Panagiotis Ilia (University of Illinois at Chicago), Jason Polakis (University of Illinois at Chicago)
Read MoreDetecting Tor Bridge from Sampled Traffic in Backbone Networks
Hua Wu (School of Cyber Science & Engineering and Key Laboratory of Computer Network and Information Integration Southeast University, Ministry of Education, Jiangsu Nanjing, Purple Mountain Laboratories for Network and Communication Security (Nanjing, Jiangsu)), Shuyi Guo, Guang Cheng, Xiaoyan Hu (School of Cyber Science & Engineering and Key Laboratory of Computer Network and Information Integration…
Read MoreEvaluating Personal Data Control In Mobile Applications Using Heuristics
Alain Giboin (UCA, INRIA, CNRS, I3S), Karima Boudaoud (UCA, CNRS, I3S), Patrice Pena (Userthink), Yoann Bertrand (UCA, CNRS, I3S), Fabien Gandon (UCA, INRIA, CNRS, I3S)
Read MoreicLibFuzzer: Isolated-context libFuzzer for Improving Fuzzer Comparability
Yu-Chuan Liang, Hsu-Chun Hsiao (National Taiwan University)
Read More