TBA
View More Papers
The Abuser Inside Apps: Finding the Culprit Committing Mobile...
Joongyum Kim (KAIST), Jung-hwan Park (KAIST), Sooel Son (KAIST)
Read MoreScenario-Driven Assessment of Cyber Risk Perception at the Security...
Simon Parkin (TU Delft), Kristen Kuhn, Siraj Ahmed Shaikh (Coventry University)
Read MoreTales of Favicons and Caches: Persistent Tracking in Modern...
Konstantinos Solomos (University of Illinois at Chicago), John Kristoff (University of Illinois at Chicago), Chris Kanich (University of Illinois at Chicago), Jason Polakis (University of Illinois at Chicago)
Read MoreWINNIE : Fuzzing Windows Applications with Harness Synthesis and...
Jinho Jung (Georgia Institute of Technology), Stephen Tong (Georgia Institute of Technology), Hong Hu (Pennsylvania State University), Jungwon Lim (Georgia Institute of Technology), Yonghwi Jin (Georgia Institute of Technology), Taesoo Kim (Georgia Institute of Technology)
Read More