S. Almasi, W. J.Knottenbelt
Protecting Users from Compromised Browsers and Form Grabbers
View More Papers
Lightnion: seamless anonymous communication from any web browser
Wouter Lueks, Matthieu Daumas, Carmela Troncoso
Read MoreAn Analysis of First-Party Cookie Exfiltration due to CNAME...
Tongwei Ren (Worcester Polytechnic Institute), Alexander Wittmany (University of Kansas), Lorenzo De Carli (Worcester Polytechnic Institute), Drew Davidsony (University of Kansas)
Read MoreWhat Remains Uncaught?: Characterizing Sparsely Detected Malicious URLs on...
Sayak Saha Roy, Unique Karanjit, Shirin Nilizadeh (The University of Texas at Arlington)
Read MoreDetecting Tor Bridge from Sampled Traffic in Backbone Networks
Hua Wu (School of Cyber Science & Engineering and Key Laboratory of Computer Network and Information Integration Southeast University, Ministry of Education, Jiangsu Nanjing, Purple Mountain Laboratories for Network and Communication Security (Nanjing, Jiangsu)), Shuyi Guo, Guang Cheng, Xiaoyan Hu (School of Cyber Science & Engineering and Key Laboratory of Computer Network and Information Integration…
Read More