Papers

Search results

    ConferenceTitleAuthor(s)
    WOOT '20When Oblivious is Not: Attacks against OPAMNirjhar Roy, Nikhil Bansal, Gourav Takhar, Nikhil Mittal, Pramod Subramanyan
    WOOT '20BLESA: Spoofing Attacks against Reconnections in Bluetooth Low EnergyJianliang Wu, Yuhong Nan, Vireshwar Kumar, Dave (Jing) Tian, Antonio Bianchi, Mathias Payer, Dongyan Xu
    WOOT '20Unearthing the TrustedCore: A Critical Review on Huawei’s Trusted Execution EnvironmentMarcel Busch, Johannes Westphal, Tilo Mueller
    WOOT '20Firmware Insider: Bluetooth Randomness is Mostly RandomJörn Tillmanns, Jiska Classen, Felix Rohrbach, Matthias Hollick
    WOOT '20AFL++ : Combining Incremental Steps of Fuzzing ResearchAndrea Fioraldi, Dominik Maier, Heiko Eißfeldt, Marc Heuse
    CSET '20On Design and Enhancement of Smart Grid Honeypot System for Practical Collection of Threat IntelligenceDaisuke Mashima, Derek Kok, Wei Lin, Muhammad Hazwan, Alvin Cheng
    CSET '20Bridging Missing Gaps in Evaluating DDoS ResearchLumin Shi, Samuel Mergendahl, Devkishen Sisodia, Jun Li
    CSET '20Historical Analysis of Exploit Availability TimelinesAllen D. Householder, Jeff Chrabaszcz, Trent Novelly, David Warren, Jonathan M. Spring
    CSET '20Expansion of ICS Testbed for Security Validation based on MITRE ATT&CK TechniquesSeungoh Choi, Jongwon Choi, Jeong-Han Yun, Byung-Gil Min, HyoungChun Kim
    CSET '20UBCIS: Ultimate Benchmark for Container Image ScanningShay Berkovich, Jeffrey Kam, Glenn Wurster
    CSET '20HAI 1.0: HIL-based Augmented ICS Security DatasetHyeok-Ki Shin, Woomyo Lee, Jeong-Han Yun, HyoungChun Kim
    CSET '20Towards Adversarial Phishing DetectionThomas Kobber Panum, Kaspar Hageman, René Rydhof Hansen, Jens Myrup Pedersen
    CSET '20Representativeness in the Benchmark for Vulnerability Analysis Tools (B-VAT)Kayla Afanador, Cynthia Irvine
    CSET '20Toward Orchestration of Complex Networking ExperimentsAlefiya Hussain, Prateek Jaipuria, Geoff Lawler, Stephen Schwab, Terry Benzel
    CSET '20APTGen: An Approach towards Generating Practical Dataset Labelled with Targeted Attack SequencesYusuke Takahashi, Shigeyoshi Shima, Rui Tanabe, Katsunari Yoshioka
    CSET '20ICS Testbed Tetris: Practical Building Blocks Towards a Cyber Security ResourceBenjamin Green, Richard Derbyshire, William Knowles, James Boorman, Pierre Ciholas, Daniel Prince, David Hutchison
    SOUPS 2020Innovation Inaction or In Action? The Role of User Experience in the Security and Privacy Design of Smart Home CamerasGeorge Chalhoub, Ivan Flechais, Norbert Nthala, Ruba Abu-Salma
    SOUPS 2020An Empirical Study of Wireless Carrier Authentication for SIM SwapsKevin Lee, Benjamin Kaiser, Jonathan Mayer, Arvind Narayanan
    SOUPS 2020“You still use the password after all” – Exploring FIDO2 Security Keys in a Small CompanyFlorian M. Farke, Lennart Lorenz, Theodor Schnitzler, Philipp Markert, Markus Dürmuth
    SOUPS 2020Blind and Human: Exploring More Usable Audio CAPTCHA DesignsValerie Fanelle, Sepideh Karimi, Aditi Shah, Bharath Subramanian, Sauvik Das
    SOUPS 2020Passworld: A Serious Game to Promote Password Awareness and Diversity in an EnterpriseGokul Chettoor Jayakrishnan, Gangadhara Reddy Sirigireddy, Sukanya Vaddepalli, Vijayanand Banahatti, Sachin Premsukh Lodha, Sankalp Suneel Pandit
    SOUPS 2020User Mental Models of Cryptocurrency Systems - A Grounded Theory ApproachAlexandra Mai, Katharina Pfeffer, Matthias Gusenbauer, Edgar Weippl, Katharina Krombholz
    SOUPS 2020Knock, Knock. Who’s There? On the Security of LG’s Knock CodesRaina Samuel, Philipp Markert, Adam J. Aviv, Iulian Neamtiu
    SOUPS 2020Security, Availability, and Multiple Information Sources: Exploring Update Behavior of System AdministratorsChristian Tiefenau, Maximilian Häring, Katharina Krombholz, Emanuel von Zezschwitz
    SOUPS 2020Lessons Learnt from Comparing WhatsApp Privacy Concerns Across Saudi and Indian PopulationsJayati Dev, Pablo Moriano, L. Jean Camp

Pages