Resident Evil: Understanding Residential IP Proxy as a Dark Service |
40th IEEE Symposium on Security and Privacy
|
PatternListener: Cracking Android Pattern Lock Using Acoustic Signals |
ACM CCS 2018
|
Revery: from Proof-of-Concept to Exploitable (One Step towards Automatic Exploit Generation) |
ACM CCS 2018
|
None of My Pixel is Your Business: Active Watermarking Cancellation Against Video Streaming Service |
Black Hat USA 2018
|
Hacking Intranet from Outside: Security Problems of Cross Origin Resource Sharing (CORS) |
DEF CON China 1
|
Don't Let One Rotten Apple Spoil the Whole Barrel: Towards Automated Detection of Shadowed Domains |
ACM CCS 2017
|
Vulnerable Implicit Service: A Revisit |
ACM CCS 2017
|
Sonic Gun to Smart Devices: Your Devices Lose Control Under Ultrasound/Sound |
Black Hat USA 2017
|
How to Learn Klingon Without Dictionary: Detection and Measurement of Black Keywords Used by Underground Economy |
38th IEEE Symposium on Security and Privacy
|
Staying Secure and Unprepared: Understanding and Mitigating the Security Risks of Apple ZeroConf |
37th IEEE Symposium on Security and Privacy
|