Stealthy Porn: Understanding Real-World Adversarial Images for Illicit Online Promotion |
40th IEEE Symposium on Security and Privacy
|
Resident Evil: Understanding Residential IP Proxy as a Dark Service |
40th IEEE Symposium on Security and Privacy
|
SemFuzz: Semantics-based Automatic Generation of Proof-of-Concept?Exploits |
ACM CCS 2017
|
Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence |
ACM CCS 2016
|
Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository as a Malicious Service |
ACM CCS 2016
|
Seeking Nonsense, Looking for Trouble: Efficient Promotional-Infection Detection through Semantic Inconsistency Search |
37th IEEE Symposium on Security and Privacy
|