Demystifying Hidden Privacy Settings in Mobile Apps |
40th IEEE Symposium on Security and Privacy
|
ProFuzzer: On-the-fly Input Type Probing for Better Zero-day Vulnerability Discovery |
40th IEEE Symposium on Security and Privacy
|
Stealthy Porn: Understanding Real-World Adversarial Images for Illicit Online Promotion |
40th IEEE Symposium on Security and Privacy
|
Resident Evil: Understanding Residential IP Proxy as a Dark Service |
40th IEEE Symposium on Security and Privacy
|
Detecting User Experience Issues of the Tor Browser In The Wild |
ACM CCS 2018
|
Two-Factor Authentication, Usable or Not? A Two-Phase Usability Study of the FIDO U2F Security Key |
Black Hat USA 2018
|
Upgrading Your Android, Elevating My Malware: Privilege Escalation Through Mobile OS Updating |
35th IEEE Symposium on Security and Privacy
|