Florian Quinkert, Eduard Leonhardt, Thorsten Holz
DorkPot: A Honeypot-based Analysis of Google Dorks
View More Papers
insecure:// Vulnerability Analysis of URI Scheme Handling in Android...
Abdulla Aldoseri (University of Birmingham) and David Oswald (University of Birmingham)
Read MoreAnalysis of the Effect of the Difference between Japanese...
Rei Yamagishi, Shinya Sasa, and Shota Fujii (Hitachi, Ltd.)
Read MoreTag of the Dead: How Terminated SaaS Tags Become...
Takahito Sakamoto, Takuya Murozono (DataSign Inc)
Read MoreWhat the Fork? Finding and Analyzing Malware in GitHub...
Alan Cao (New York University) and Brendan Dolan-Gavitt (New York University)
Read More