Publications

Filter by type:

What's in a Name? Understanding Profile Name Reuse on Twitter

Details PDF

PayBreak: Defense against Cryptographic Ransomware

Details PDF

CRiOS : Toward Large-Scale iOS Application Analysis

Details PDF

EmailProfiler: Spearphishing Filtering with Header and Stylometric Features of Emails

Details PDF

Why Allowing Profile Name Reuse Is A Bad Idea

Details PDF

Towards Automated Dynamic Analysis for Linux-Based Embedded Firmware

Details PDF

Drops for Stuff: An Analysis of Reshipping Mule Scams

Details PDF

Towards Detecting Compromised Accounts on Social Networks

Details PDF

EvilCohort: Detecting Communities of Malicious Accounts on Online Services

Details PDF

On the Security and Engineering Implications of Finer-Grained Access Controls for Android Developers and Users

Details PDF

EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework

Details PDF

Blanket Execution: Dynamic Similarity Testing for Program Binaries and Components

Details PDF

An Empirical Study of Cryptographic Misuse in Android Applications

Details PDF

Follow the Green: Growth and Dynamics in Twitter Follower Markets

Details PDF

Compa: Detecting Compromised Accounts on Social Networks.

Details PDF

Poultry Markets: On the Underground Economy of Twitter Followers

Details PDF

Poultry Markets: On the Underground Economy of Twitter Followers

Details PDF

B@bel: Leveraging Email Delivery for Spam Mitigation.

Details PDF

PoX: Protecting Users from Malicious Facebook Applications

Details PDF

A Survey on Automated Dynamic Malware-Analysis Techniques and Tools

Details PDF

MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones.

Details PDF

Hit'em Where It Hurts: A Live Security Exercise on Cyber Situational Awareness

Details PDF

CFI Goes Mobile: Control-Flow Integrity for Smartphones

Details

Challenges for Dynamic Analysis of iOS Applications

Details PDF

PoX: Protecting Users from Malicious Facebook Applications

Details PDF

Removing Web Spam Links from Search Engine Results

Details PDF

PiOS: Detecting Privacy Leaks in iOS Applications.

Details PDF

Organizing Large Scale Hacking Competitions

Details PDF

A Solution for the Automated Detection of Clickjacking Attacks

Details PDF

Captcha Smuggling: Hijacking Web Browsing Sessions to Create Captcha Farms

Details PDF

Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks

Details PDF

Removing Web Spam Links from Search Engine Results

Details PDF

Mitigating Drive-by Download Attacks: Challenges and Open Problems

Details PDF

Panorama: Capturing System-Wide Information Flow for Malware Detection and Analysis

Details PDF

Dynamic Spyware Analysis.

Details PDF

Using Static Program Analysis to Aid Intrusion Detection

Details PDF

{EdgeMiner}: Automatically Detecting Implicit Control Flow Transitions through the Android Framework

Details

WordPress Appliance - Powered by TurnKey Linux