All Stories

  1. OAuth 2.0 Redirect URI Validation Falls Short, Literally
  2. WiP: Metamodel for Continuous Authorisation and Usage Control
  3. Generative adversarial networks for subdomain enumeration
  4. SWIPEGAN
  5. Delegated attestation
  6. Verify&Revive: Secure Detection and Recovery of Compromised Low-end Embedded Devices
  7. Detecting malicious applications using system services request behavior
  8. Demystifying Authentication Concepts in Smartphones: Ways and Types to Secure Access
  9. Large-Scale Analysis of Style Injection by Relative Path Overwrite
  10. Analyzing Remote Server Locations for Personal Data Transfers in Mobile Apps
  11. StaDynA