All Stories

  1. Firmware Secure Updates meet Formal Verification
  2. Coordinated Enforcement of Obligations in Distributed Usage Control Systems [Work In Progress Paper]
  3. Hidden Web Caches Discovery
  4. FLAShadow: A Flash-based Shadow Stack for Low-end Embedded Systems
  5. Obligation Management Framework for Usage Control
  6. OAuth 2.0 Redirect URI Validation Falls Short, Literally
  7. WiP: Metamodel for Continuous Authorisation and Usage Control
  8. Generative adversarial networks for subdomain enumeration
  9. SWIPEGAN
  10. Delegated attestation
  11. Verify&Revive: Secure Detection and Recovery of Compromised Low-end Embedded Devices
  12. Detecting malicious applications using system services request behavior
  13. Demystifying Authentication Concepts in Smartphones: Ways and Types to Secure Access
  14. Large-Scale Analysis of Style Injection by Relative Path Overwrite
  15. Analyzing Remote Server Locations for Personal Data Transfers in Mobile Apps
  16. StaDynA