S. Almasi, W. J.Knottenbelt
Protecting Users from Compromised Browsers and Form Grabbers
View More Papers
CROW: Code Diversification for WebAssembly
Javier Cabrera Arteaga, Orestis Floros, Benoit Baudry, Martin Monperrus (KTH Royal Institute of Technology), Oscar Vera Perez (Univ Rennes, Inria, CNRS, IRISA)
Read MoreDetecting Tor Bridge from Sampled Traffic in Backbone Networks
Hua Wu (School of Cyber Science & Engineering and Key Laboratory of Computer Network and Information Integration Southeast University, Ministry of Education, Jiangsu Nanjing, Purple Mountain Laboratories for Network and Communication Security (Nanjing, Jiangsu)), Shuyi Guo, Guang Cheng, Xiaoyan Hu (School of Cyber Science & Engineering and Key Laboratory of Computer Network and Information Integration…
Read MoreFrom Reports to Insights: Challenges and Opportunities in Citizen-Driven...
Daan Vansteenhuyse (DistriNet, KU Leuven), Hadji Musaev (DistriNet, KU Leuven), Lieven Desmet (DistriNet, KU Leuven)
Read More