B. Kaleli, G. Stringhini, M. Egele
Studying the Privacy Issues of the Incorrect Use of the Feature Policy
View More Papers
Work-in-Progress: Detecting Browser-in-the-Browser Attacks from Their Behaviors and DOM...
Ryusei Ishikawa, Soramichi Akiyama, and Tetsutaro Uehara (Ritsumeikan University)
Read MoreCan Public IP Blocklists Explain Internet Radiation?
Simone Cossaro (University of Trieste), Damiano Ravalico (University of Trieste), Rodolfo Vieira Valentim (University of Turin), Martino Trevisan (University of Trieste), Idilio Drago (University of Turin)
Read MoreChhoyhopper: A Moving Target Defense with IPv6
A S M Rizvi (University of Southern California/Information Sciences Institute) and John Heidemann (University of Southern California/Information Sciences Institute)
Read MoreCharacterizing the Adoption of Security.txt Files and their Applications...
William Findlay (Carleton University) and AbdelRahman Abdou (Carleton University)
Read More