Star 0
Month Quarter Year
#N/A #N/A #N/A
Title Event
Resident Evil: Understanding Residential IP Proxy as a Dark Service 40th IEEE Symposium on Security and Privacy
PatternListener: Cracking Android Pattern Lock Using Acoustic Signals ACM CCS 2018
Revery: from Proof-of-Concept to Exploitable (One Step towards Automatic Exploit Generation) ACM CCS 2018
None of My Pixel is Your Business: Active Watermarking Cancellation Against Video Streaming Service Black Hat USA 2018
Hacking Intranet from Outside: Security Problems of Cross Origin Resource Sharing (CORS) DEF CON China 1
Don't Let One Rotten Apple Spoil the Whole Barrel: Towards Automated Detection of Shadowed Domains ACM CCS 2017
Vulnerable Implicit Service: A Revisit ACM CCS 2017
Sonic Gun to Smart Devices: Your Devices Lose Control Under Ultrasound/Sound Black Hat USA 2017
How to Learn Klingon Without Dictionary: Detection and Measurement of Black Keywords Used by Underground Economy 38th IEEE Symposium on Security and Privacy
Staying Secure and Unprepared: Understanding and Mitigating the Security Risks of Apple ZeroConf 37th IEEE Symposium on Security and Privacy