-
2024-10-01 | Jäger: Automated Telephone Call Traceback
-
2024-09-01 | Fixing Insecure Cellular System Information Broadcasts For Good
-
2024-07-01 | Pairing Security Advisories with Vulnerable Functions Using Open-Source LLMs
-
2024-07-01 | VFCFinder: Pairing Security Advisories and Patches
-
2024-05-01 | On SMS Phishing Tactics and Infrastructure
-
2023-10-01 | A Comparative Study of Software Secrets Reporting by Secret Detection Tools
-
2023-08-09 | Diving into Robocall Content with SNORCall
We characterize content from over 232,0000 robocalls collected over two years with efficient, accurate techniques. -
2023-08-01 | Diving into Robocall Content with SNORCall
-
2023-08-01 | Who Comes Up with this Stuff? Interviewing Authors to Understand How They Produce Security Advice
-
2023-07-31 | Diving into Robocall Content with SnorCall
-
2023-07-01 | Finding Fixed Vulnerabilities with Off-the-Shelf Static Analysis
-
2023-06-01 | MSNetViews: Geographically Distributed Management of Enterprise Network Security Policy
-
2023-05-01 | SecretBench: A Dataset of Software Secrets
-
2023-05-01 | Towards Simultaneous Attacks on Multiple Cellular Networks
-
2023-05-01 | What Challenges Do Developers Face About Checked-in Secrets in Software Artifacts?
-
2022-10-01 | What are the practices for secret management in software artifacts?
-
2022-08-01 | Characterizing the Security of GitHub CI Workflows
-
2022-06-01 | A Study of Application Sandbox Policies in Linux
-
2022-06-01 | Removing the Reliance on Perimeters for Security Using Network Views
Test content. -
2021-08-01 | Investigating Web Service Account Remediation Advice
-
2021-07-01 | Anonymous device authorization for cellular networks
-
2021-03-01 | Characterizing the Security of Endogenous and Exogenous Desktop Application Network Flows
-
2021-02-01 | A First Look at Scams on YouTube
-
2020-09-10 | Does ignoring robocalls make them stop? Here's what we learned from getting 1.5 million calls on 66,000 phone lines
-
2020-08-01 | Actions Speak Louder than Words: Entity-Sensitive Privacy Policy and Dataflow Analysis with PoliCheck
-
2020-08-01 | Cardpliance: PCI-DSS Compliance of Android Applications
-
2020-08-01 | Who's Calling? Characterizing Robocalls through Audio and Metadata Analysis
-
2019-11-01 | Thou Shalt Discuss Security: Quantifying the Impacts of Instructions to RFC Authors
-
2019-08-01 | PolicyLint: Investigating Internal Privacy Policy Contradictions on Google Play
-
2019-05-01 | Blinded and Confused: Uncovering Systemic Flaws in Device Telemetry for Smart-home Internet of Things
-
2019-05-01 | Hestia: Simple Least Privilege Network Policies for Smart Homes
-
2019-05-01 | HomeSnitch: Behavior Transparency and Control for Smart Home IoT Devices
-
2019-02-01 | How Bad Can It Git? Characterizing Secret Leakage in Public GitHub Repositories
-
2018-12-01 | A Large Scale Investigation of Obfuscation Use in Google Play
-
2018-05-01 | Sonar: Detecting SS7 Redirection Attacks Via Call Audio-Based Distance Bounding
-
2017-08-01 | AuthentiCall: Efficient identity and content authentication for phone calls
-
2017-08-01 | Regulators, Mount Up? Analysis of Privacy Policies for Mobile Money Applications
-
2017-04-01 | Transparent Web Service Auditing via Network Provenance Functions
-
2017-01-01 | FinTechSec: Addressing the Security Challenges of Digital Financial Services
-
2017-01-01 | Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications in the Developing World
-
2017-01-01 | Phonion: Practical protection of metadata in telephony networks
-
2016-10-01 | *droid: Assessment and evaluation of Android application analysis tools
-
2016-08-01 | Authloop: Practical end-to-end cryptographic authentication for telephony over voice channels
-
2016-07-01 | Detecting SMS spam in the age of legitimate bulk messaging
-
2016-05-01 | Sending Out an SMS: Characterizing the Security of the SMS Ecosystem with Public Gateways
-
2015-08-01 | Boxed Out: Blocking Cellular Interconnect Bypass Fraud at the Network Edge
-
2015-08-01 | Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications in the Developing World
-
2015-01-01 | Uncovering Use-After-Free Conditions In Compiled Code
-
2013-04-01 | MAST: Triage for Market-scale Mobile Malware Analysis
-
2012-01-01 | An open virtual testbed for industrial control system security research
-
2012-01-01 | Analysis and mitigation of vulnerabilities in short-range wireless communications for industrial control systems
-
2011-08-01 | A Control System Testbed to Validate Critical Infrastructure Protection Concepts
-
2010-10-01 | On SCADA Control System Command and Response Injection and Intrusion Detection
-
2009-10-01 | Discovery, Infiltration, and Denial of Service in a Process Control System Wireless Network
-
2009-10-01 | Engineering Future cyber-physical Energy Systems: Challenges, Research Needs, and Roadmap