Aurore Fass, Michael Backes, Ben Stock
HideNoSeek: Camouflaging Malicious JavaScript in Benign ASTs
View More Papers
Why do Internet Devices Remain Vulnerable? A Survey with...
Tamara Bondar, Hala Assal, AbdelRahman Abdou (Carleton University)
Read MoreAn Analysis of First-Party Cookie Exfiltration due to CNAME...
Tongwei Ren (Worcester Polytechnic Institute), Alexander Wittmany (University of Kansas), Lorenzo De Carli (Worcester Polytechnic Institute), Drew Davidsony (University of Kansas)
Read MoreWork-in-progress: Spurious Credentials in Breach Compilations
Lucas Stephens (Oregon State University), Jacob Porter (Oregon State University), Zane Ma (Oregon State University)
Read More