Vijay k. Gurbani and Cynthia Hood ( Illinois Institute of Technology), Anita Nikolich (University of Illinois), Henning Schulzrinne (Columbia University) and Radu State (University of Luxembourg)
When DNS Goes Dark: Understanding Privacy and Shaping Policy of an Evolving Protocol
View More Papers
Obfuscated Access and Search Patterns in Searchable Encryption
Zhiwei Shang (University of Waterloo), Simon Oya (University of Waterloo), Andreas Peter (University of Twente), Florian Kerschbaum (University of Waterloo)
Read MoreTales of Favicons and Caches: Persistent Tracking in Modern...
Konstantinos Solomos (University of Illinois at Chicago), John Kristoff (University of Illinois at Chicago), Chris Kanich (University of Illinois at Chicago), Jason Polakis (University of Illinois at Chicago)
Read MorePreventing and Detecting State Inference Attacks on Android
Andrea Possemato (IDEMIA and EURECOM), Dario Nisi (EURECOM), Yanick Fratantonio (EURECOM and Cisco Talos)
Read MoreDemo #3: Detecting Illicit Drone Video Filming Using Cryptanalysis
Ben Nassi, Raz Ben-Netanel (Ben-Gurion University of the Negev), Adi Shamir (Weizmann Institute of Science), and Yuval Elovic (Ben-Gurion University of the Negev)
Read More