| Scalable Private Set Intersection Based on OT Extension |
14 |
| MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version) |
11 |
| Amandroid: A Precise and General Inter-component Data Flow Analysis Framework for Security Vetting of Android Apps |
10 |
| A Close Look at a Daily Dataset of Malware Samples |
4 |
| VULCON: A System for Vulnerability Prioritization, Mitigation, and Management |
4 |
| The Password Life Cycle |
4 |
| Attribute Inference Attacks in Online Social Networks |
3 |
| A Video-based Attack for Android Pattern Lock |
3 |
| FOSSIL: A Resilient and Efficient System for Identifying FOSS Functions in Malware Binaries |
3 |
| Hybrid Private Record Linkage: Separating Differentially Private Synopses from Matching Records |
3 |
| A General Framework for Adversarial Examples with Objectives |
2 |
| Database Audit Workload Prioritization via Game Theory |
2 |
| Abstract Non-Interference: A Unifying Framework for Weakening Information-flow |
2 |
| Tractor Beam: Safe-hijacking of Consumer Drones with Adaptive GPS Spoofing |
2 |
| Introducing the Temporal Dimension to Memory Forensics |
2 |
| Server Location Verification (SLV) and Server Location Pinning: Augmenting TLS Authentication |
2 |
| Technological and Human Factors of Malware Attacks: A Computer Security Clinical Trial Approach |
2 |
| Security Evaluation of a Banking Fraud Analysis System |
1 |
| Verifiable Graph Processing |
1 |
| Enhancing Branch Monitoring for Security Purposes: From Control Flow Integrity to Malware Analysis and Debugging |
1 |
| Utilizing Performance Counters for Compromising Public Key Ciphers |
1 |
| ANCHOR: Logically Centralized Security for Software-Defined Networks |
1 |
| A Usability Study of Four Secure Email Tools Using Paired Participants |
1 |
| Analysis of Reflexive Eye Movements for Fast Replay-Resistant Biometric Authentication |
1 |
| KIST: Kernel-Informed Socket Transport for Tor |
1 |
| Alpha-Beta Privacy |
1 |
| Characterizing the Security of the SMS Ecosystem with Public Gateways |
0 |
| Kernel Protection Against Just-In-Time Code Reuse |
0 |
| ISOTOP: Auditing Virtual Networks Isolation Across Cloud Layers in OpenStack |
0 |
| Will They Use It or Not? Investigating Software Developers' Intention to Follow Privacy Engineering Methodologies |
0 |
| Skype & Type: Keyboard Eavesdropping in Voice-over-IP |
0 |
| Resilient Privacy Protection for Location-Based Services through Decentralization |
0 |
| Malicious Overtones: Hunting Data Theft in the Frequency Domain with One-class Learning |
0 |
| Analytical Models for the Scalability of Dynamic Group-key Agreement Protocols and Secure File Sharing Systems |
0 |
| GPLADD: Quantifying Trust in Government and Commercial Systems A Game-Theoretic Approach |
0 |
| DADS Decentralized Attestation for Device Swarms |
0 |
| Safe and Efficient Implementation of a Security System on ARM using Intra-level Privilege Separation |
0 |
| Using Episodic Memory for User Authentication |
0 |
| GyrosFinger: Fingerprinting Drones for Location Tracking Based on the Outputs of MEMS Gyroscopes |
0 |
| Implementing Support for Pointers to Private Data in a General-Purpose Secure Multi-Party Compiler |
0 |
| FIMCE: A Fully Isolated Micro-Computing Environment for Multicore Systems |
0 |
| Data Usage Control for Distributed Systems |
0 |
| Efficient Privacy-Preserving Matrix Factorization for Recommendation via Fully Homomorphic Encryption |
0 |
| Handling Anti-Virtual Machine Techniques in Malicious Software |
0 |