Mixnets on a Tightrope: Quantifying the Leakage of Mix Networks Using a Provably Optimal Heuristic Adversary
View More Papers
Cross-Origin Web Attacks via HTTP/2 Server Push and Signed...
Pinji Chen (Tsinghua University), Jianjun Chen (Tsinghua University & Zhongguancun Laboratory), Mingming Zhang (Zhongguancun Laboratory), Qi Wang (Tsinghua University), Yiming Zhang (Tsinghua University), Mingwei Xu (Tsinghua University), Haixin Duan (Tsinghua University)
Read MoreWhat’s Done Is Not What’s Claimed: Detecting and Interpreting...
Chang Yue, Kai Chen, Zhixiu Guo (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China), Jun Dai, Xiaoyan Sun (Department of Computer Science, Worcester Polytechnic Institute), Yi Yang (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China)
Read MoreERW-Radar: An Adaptive Detection System against Evasive Ransomware by...
Lingbo Zhao (Institute of Information Engineering,Chinese Academy of Sciences), Yuhui Zhang (Institute of Information Engineering,Chinese Academy of Sciences), Zhilu Wang (Institute of Information Engineering,Chinese Academy of Sciences), Fengkai Yuan (Institute of Information Engineering,CAS), Rui Hou (Institute of Information Engineering, Chinese Academy of Sciences)
Read MoreVictim-Centred Abuse Investigations and Defenses for Social Media Platforms
Zaid Hakami (Florida International University and Jazan University), Ashfaq Ali Shafin (Florida International University), Peter J. Clarke (Florida International University), Niki Pissinou (Florida International University), and Bogdan Carbunar (Florida International University)
Read More