All Stories

  1. Behavior Nets: Context-Aware Behavior Modeling for Code Injection-Based Windows Malware
  2. SoK: Hardening Techniques in the Mobile Ecosystem — Are We There Yet?
  3. Toward Automatically Generating User-Specific Recovery Procedures After Windows Malware Infections
  4. frameD: Toward Automated Identification of Embedded Frameworks in Firmware Images
  5. Large-Scale Security Analysis of Real-World Backend Deployments Speaking IoT-Focused Protocols
  6. ERAFL: Efficient Resource Allocation for Federated Learning Training in Smart Homes
  7. ReplicaWatcher: Training-less Anomaly Detection in Containerized Microservices
  8. Shimware: Toward Practical Security Retrofitting for Monolithic Firmware Images
  9. Mobile apps and children’s privacy: a traffic analysis of data sharing practices among children’s mobile iOS apps
  10. AoT - Attack on Things: A security analysis of IoT firmware updates
  11. Columbus: Android App Testing Through Systematic Callback Exploration
  12. HoneyKube: Designing and Deploying a Microservices-based Web Honeypot
  13. Operationalizing Cybersecurity Research Ethics Review: From Principles and Guidelines to Practice
  14. Are hackers using my smart lamp?
  15. Detecting Anomalous Misconfigurations in AWS Identity and Access Management Policies
  16. Contextualizing System Calls in Containers for Anomaly-Based Intrusion Detection
  17. DEEPCASE: Semi-Supervised Contextual Analysis of Security Events
  18. A Systematical and longitudinal study of evasive behaviors in windows malware
  19. Reversing and Fuzzing the Google Titan M Chip
  20. SyML: Guiding Symbolic Execution Toward Vulnerable States Through Pattern Learning
  21. Toward a secure crowdsourced location tracking system
  22. Bran: Reduce Vulnerability Search Space in Large Open Source Repositories by Learning Bug Symptoms
  23. An I/O Request Packet (IRP) Driven Effective Ransomware Detection Scheme using Artificial Neural Network
  24. SYMBION: Interleaving Symbolic with Concrete Execution
  25. Karonte: Detecting Insecure Multi-binary Interactions in Embedded Firmware
  26. HeadPrint
  27. FlowPrint: Semi-Supervised Mobile-App Fingerprinting on Encrypted Network Traffic
  28. LeakDoctor
  29. Data sharing practices of medicines related apps and the mobile ecosystem: traffic, content, and network analysis
  30. Victim-Aware Adaptive Covert Channels
  31. There's a Hole in that Bucket!
  32. Security Evaluation of a Banking Fraud Analysis System
  33. Extended Abstract: Toward Systematically Exploring Antivirus Engines
  34. SysTaint
  35. GroupDroid
  36. Prometheus: Analyzing WebInject-based information stealers
  37. Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis
  38. Measuring and Defeating Anti-Instrumentation-Equipped Malware
  39. ShieldFS
  40. GASOLINE: a Cytoscape app for multiple local alignment of PPI networks