B. Kaleli, G. Stringhini, M. Egele
Studying the Privacy Issues of the Incorrect Use of the Feature Policy
View More Papers
HideNoSeek: Camouflaging Malicious JavaScript in Benign ASTs
Aurore Fass, Michael Backes, Ben Stock
Read MoreLog4shell: Redefining the Web Attack Surface
Douglas Everson (Clemson University), Long Cheng (Clemson University), and Zhenkai Zhang (Clemson University)
Read MoreCan You Tell Me the Time? Security Implications of...
Vik Vanderlinden, Wouter Joosen, Mathy Vanhoef (imec-DistriNet, KU Leuven)
Read MoreSNITCH: Leveraging IP Geolocation for Active VPN Detection
Tomer Schwartz (Data and Security Laboratory Fujitsu Research of Europe Ltd), Ofir Manor (Data and Security Laboratory Fujitsu Research of Europe Ltd), Andikan Otung (Data and Security Laboratory Fujitsu Research of Europe Ltd)
Read More