N.P. Hoang, I. Lin, S. Ghavamnia, M. Polychronakis
K-resolver: Towards Decentralizing Encrypted DNS Resolution
View More Papers
Lessons Learned from SunDEW: A Self Defense Environment for...
M. Sahin, C. Hebert, A. De Oliveira
Read MoreDetecting Tor Bridge from Sampled Traffic in Backbone Networks
Hua Wu (School of Cyber Science & Engineering and Key Laboratory of Computer Network and Information Integration Southeast University, Ministry of Education, Jiangsu Nanjing, Purple Mountain Laboratories for Network and Communication Security (Nanjing, Jiangsu)), Shuyi Guo, Guang Cheng, Xiaoyan Hu (School of Cyber Science & Engineering and Key Laboratory of Computer Network and Information Integration…
Read MoreWork-in-Progress: Detecting Browser-in-the-Browser Attacks from Their Behaviors and DOM...
Ryusei Ishikawa, Soramichi Akiyama, and Tetsutaro Uehara (Ritsumeikan University)
Read MoreThe Fault in Our Stars: An Analysis of GitHub...
Simon Koch, David Klein, and Martin Johns (TU Braunschweig)
Read More