Studying the Privacy Issues of the Incorrect Use of the Feature Policy
B. Kaleli, G. Stringhini, M. Egele
View More Papers
Browser-Based Deep Behavioral Detection of Web Cryptomining with CoinSpy
C. Kelton, A. Balasubramanian, R. Raghavendra, M. Srivatsa
Read MoreK-resolver: Towards Decentralizing Encrypted DNS Resolution
N.P. Hoang, I. Lin, S. Ghavamnia, M. Polychronakis
Read MoreWhat the Fork? Finding and Analyzing Malware in GitHub...
Alan Cao (New York University) and Brendan Dolan-Gavitt (New York University)
Read MoreCharacterizing the Adoption of Security.txt Files and their Applications...
William Findlay (Carleton University) and AbdelRahman Abdou (Carleton University)
Read More