Daniel Kahn Gillmor (ACLU)
Keynote: Armor for the back half of the camel: Why confidentiality matters for recursive DNS traffic
View More Papers
Exploring The Design Space of Sharing and Privacy Mechanisms...
Abdulmajeed Alqhatani, Heather R. Lipford (University of North Carolina at Charlotte)
Read MoreDetecting Tor Bridge from Sampled Traffic in Backbone Networks
Hua Wu (School of Cyber Science & Engineering and Key Laboratory of Computer Network and Information Integration Southeast University, Ministry of Education, Jiangsu Nanjing, Purple Mountain Laboratories for Network and Communication Security (Nanjing, Jiangsu)), Shuyi Guo, Guang Cheng, Xiaoyan Hu (School of Cyber Science & Engineering and Key Laboratory of Computer Network and Information Integration…
Read MoreBaseSpec: Comparative Analysis of Baseband Software and Cellular Specifications...
Eunsoo Kim (KAIST), Dongkwan Kim (KAIST), CheolJun Park (KAIST), Insu Yun (KAIST), Yongdae Kim (KAIST)
Read MoreWho's Hosting the Block Party? Studying Third-Party Blockage of...
Marius Steffens (CISPA Helmholtz Center for Information Security), Marius Musch (TU Braunschweig), Martin Johns (TU Braunschweig), Ben Stock (CISPA Helmholtz Center for Information Security)
Read More