Florian Quinkert, Eduard Leonhardt, Thorsten Holz
DorkPot: A Honeypot-based Analysis of Google Dorks
View More Papers
insecure:// Vulnerability Analysis of URI Scheme Handling in Android...
Abdulla Aldoseri (University of Birmingham) and David Oswald (University of Birmingham)
Read MoreDeFiIntel: A Dataset Bridging On-Chain and Off-Chain Data for...
Iori Suzuki (Graduate School of Environment and Information Sciences, Yokohama National University), Yin Minn Pa Pa (Institute of Advanced Sciences, Yokohama National University), Nguyen Thi Van Anh (Institute of Advanced Sciences, Yokohama National University), Katsunari Yoshioka (Graduate School of Environment and Information Sciences, Yokohama National University)
Read MoreLog4shell: Redefining the Web Attack Surface
Douglas Everson (Clemson University), Long Cheng (Clemson University), and Zhenkai Zhang (Clemson University)
Read MoreFree Proxies Unmasked: A Vulnerability and Longitudinal Analysis of...
Naif Mehanna (Univ. Lille / Inria / CNRS), Walter Rudametkin (IRISA / Univ Rennes), Pierre Laperdrix (CNRS, Univ Lille, Inria Lille), and Antoine Vastel (Datadome)
Read More