All Stories

  1. Crime Scene Reconstruction in IoT Forensics
  2. A Survey of Hardware Improvements to Secure Program Execution
  3. Exposed by Default: A Security Analysis of Home Router Default Settings
  4. The Flaw Within: Identifying CVSS Score Discrepancies in the NVD
  5. Measuring the Leakage and Exploitability of Authentication Secrets in Super-apps: The WeChat Case
  6. vWitness: Certifying Web Page Interactions with Computer Vision
  7. VIET: A Tool for Extracting Essential Information from Vulnerability Descriptions for CVSS Evaluation
  8. A Hybrid Decision-making Approach to Security Metrics Aggregation in Cloud Environments
  9. Towards 5G-ready Security Metrics
  10. Emilia: Catching Iago in Legacy Code
  11. Is Hardware More Secure Than Software?
  12. Using Inputs and Context to Verify User Intentions in Internet Services
  13. TEE-aided Write Protection Against Privileged Data Tampering
  14. One-Time Programs Made Practical
  15. Deceptive Deletion Triggers Under Coercion
  16. Hypnoguard
  17. Gracewipe: Secure and Verifiable Deletion under Coercion
  18. Explicit authentication response considered harmful