Florian Quinkert, Eduard Leonhardt, Thorsten Holz
DorkPot: A Honeypot-based Analysis of Google Dorks
View More Papers
HideNoSeek: Camouflaging Malicious JavaScript in Benign ASTs
Aurore Fass, Michael Backes, Ben Stock
Read MoreTag of the Dead: How Terminated SaaS Tags Become...
Takahito Sakamoto, Takuya Murozono (DataSign Inc)
Read MoreWhy do Internet Devices Remain Vulnerable? A Survey with...
Tamara Bondar, Hala Assal, AbdelRahman Abdou (Carleton University)
Read MoreWork-in-Progress: Uncovering Dark Patterns: A Longitudinal Study of Cookie...
Zihan Qu (Johns Hopkins University), Xinyi Qu (University College London), Xin Shen, Zhen Liang, and Jianjia Yu (Johns Hopkins University)
Read More