All Stories

  1. Behavior Nets: Context-Aware Behavior Modeling for Code Injection-Based Windows Malware
  2. SoK: Hardening Techniques in the Mobile Ecosystem — Are We There Yet?
  3. Toward Automatically Generating User-Specific Recovery Procedures After Windows Malware Infections
  4. Large-Scale Security Analysis of Real-World Backend Deployments Speaking IoT-Focused Protocols
  5. ERAFL: Efficient Resource Allocation for Federated Learning Training in Smart Homes
  6. ReplicaWatcher: Training-less Anomaly Detection in Containerized Microservices
  7. Shimware: Toward Practical Security Retrofitting for Monolithic Firmware Images
  8. Mobile apps and children’s privacy: a traffic analysis of data sharing practices among children’s mobile iOS apps
  9. AoT - Attack on Things: A security analysis of IoT firmware updates
  10. Columbus: Android App Testing Through Systematic Callback Exploration
  11. HoneyKube: Designing and Deploying a Microservices-based Web Honeypot
  12. Operationalizing Cybersecurity Research Ethics Review: From Principles and Guidelines to Practice
  13. Are hackers using my smart lamp?
  14. Detecting Anomalous Misconfigurations in AWS Identity and Access Management Policies
  15. Contextualizing System Calls in Containers for Anomaly-Based Intrusion Detection
  16. DEEPCASE: Semi-Supervised Contextual Analysis of Security Events
  17. A Systematical and longitudinal study of evasive behaviors in windows malware
  18. Reversing and Fuzzing the Google Titan M Chip
  19. SyML: Guiding Symbolic Execution Toward Vulnerable States Through Pattern Learning
  20. Toward a secure crowdsourced location tracking system
  21. Bran: Reduce Vulnerability Search Space in Large Open Source Repositories by Learning Bug Symptoms
  22. An I/O Request Packet (IRP) Driven Effective Ransomware Detection Scheme using Artificial Neural Network
  23. SYMBION: Interleaving Symbolic with Concrete Execution
  24. Karonte: Detecting Insecure Multi-binary Interactions in Embedded Firmware
  25. HeadPrint
  26. FlowPrint: Semi-Supervised Mobile-App Fingerprinting on Encrypted Network Traffic
  27. LeakDoctor
  28. Data sharing practices of medicines related apps and the mobile ecosystem: traffic, content, and network analysis
  29. Victim-Aware Adaptive Covert Channels
  30. There's a Hole in that Bucket!
  31. Security Evaluation of a Banking Fraud Analysis System
  32. Extended Abstract: Toward Systematically Exploring Antivirus Engines
  33. SysTaint
  34. GroupDroid
  35. Prometheus: Analyzing WebInject-based information stealers
  36. Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis
  37. Measuring and Defeating Anti-Instrumentation-Equipped Malware
  38. ShieldFS
  39. GASOLINE: a Cytoscape app for multiple local alignment of PPI networks