Star 0
Month Quarter Year
#95 #N/A #N/A
Title Event
Demystifying Hidden Privacy Settings in Mobile Apps 40th IEEE Symposium on Security and Privacy
ProFuzzer: On-the-fly Input Type Probing for Better Zero-day Vulnerability Discovery 40th IEEE Symposium on Security and Privacy
Stealthy Porn: Understanding Real-World Adversarial Images for Illicit Online Promotion 40th IEEE Symposium on Security and Privacy
Resident Evil: Understanding Residential IP Proxy as a Dark Service 40th IEEE Symposium on Security and Privacy
Detecting User Experience Issues of the Tor Browser In The Wild ACM CCS 2018
Two-Factor Authentication, Usable or Not? A Two-Phase Usability Study of the FIDO U2F Security Key Black Hat USA 2018
Upgrading Your Android, Elevating My Malware: Privilege Escalation Through Mobile OS Updating 35th IEEE Symposium on Security and Privacy