TBA
View More Papers
A Formal Analysis of the FIDO UAF Protocol
Haonan Feng (Beijing University of Posts and Telecommunications), Hui Li (Beijing University of Posts and Telecommunications), Xuesong Pan (Beijing University...
Read MoreThe Nuts and Bolts of Building FlowLens
Diogo Barradas (Instituto Superior Técnico, Universidade de Lisboa)
Read MoreDetecting Tor Bridge from Sampled Traffic in Backbone Networks
Hua Wu (School of Cyber Science & Engineering and Key Laboratory of Computer Network and Information Integration Southeast University, Ministry...
Read MoreDoes Every Second Count? Time-based Evolution of Malware Behavior...
Alexander Küchler (Fraunhofer AISEC), Alessandro Mantovani (EURECOM), Yufei Han (NortonLifeLock Research Group), Leyla Bilge (NortonLifeLock Research Group), Davide Balzarotti (EURECOM)
Read More