AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |
Back to Blog
Snoop catcher uw9/10/2023 ![]() ![]() Mathur, Arunesh and Wang, Angelina and Schwemmer, Carsten and Hamin, Maia and Stewart, Brandon M and Narayanan, Arvind Manipulative tactics are the norm in political emails Lin, Xu and Ilia, Panagiotis and Polakis, Jason Sharma, Piyush Kumar and Gosain, Devashish and Sagar, Himanshu and Kumar, Chaitanya and Dogra, Aneesh and Naik, Vinayak and Acharya, HB and Chakravarty, SambuddhoĮxamining Mirai's Battle over the Internet of Thingsįill in the Blanks: Empirical Analysis of the Privacy Threats of Browser Form Autofill SiegeBreaker: An SDN Based Practical Decoy Routing System Kaleli, Beliz and Kondracki, Brian and Egele, Manuel and Nikiforakis, Nick and Stringhini, Gianluca To Err.Is Human: Characterizing the Threat of Unintended URLs in Social Media Karami, Soroush and Ilia, Panagiotis and Polakis, Jason Hagen, Christoph and Weinert, Christian and Sendner, Christoph and Dmitrienko, Alexandra and Schneider, ThomasĪwakening the Web’s Sleeper Agents: Misusing Service Workers for Privacy Leakage Trippel, Timothy and Shin, Kang G and Bush, Kevin B and Hicks, MatthewĪll the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers Voelker, David Wagnerīomberman: Defining and Defeating Hardware Ticking Timebombs at Design-time Grant Ho, Mayank Dhiman, Devdatta Akhawe,Vern Paxson, Stefan Savage, Geoffrey M. Hopper: Modeling and Detecting Lateral Movement ![]() PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDropĪlexander Heinrich, Matthias Hollick, Thomas Schneider, Milan Stute, and Christian Weinert, TU Darmstadt Nguyen Phong Hoang, Arian Akhavan Niaki, Jakub Dalek, Jeffrey Knockel, Pellaeon Lin, Bill Marczak, Masashi Crete-Nishihata, Phillipa Gill, Michalis Polychronakis ![]() How Great is the Great Firewall? Measuring China’s DNS Censorship Kevin Bock, Abdulrahman Alaraj, Yair Fax, Kyle Hurley, Eric Wustrow, Dave Levin Weaponizing Middleboxes for TCP Reflected Amplification Zhongjie Wang, Shitong Zhu, Keyu Man, Pengxiong Zhu, Yu Hao, Zhiyun Qian, Srikanth V. Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison Paul Grubbs, Arasu Arun, Ye Zhang, Joseph Bonneau, Michael Walfish Is this model mine? On stealing and defending Machine Learning models. Roland Meier, Vincent Lenders, Laurent Vanbever Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architectureĭitto: WAN Traffic Obfuscation at Line Rate ![]() SpecHammer: Combining Spectre and Rowhammer for New Speculative Attacks If you noticed any problems on this page, please contact the SECRIT admins. If you would like to receive announcements and reminders pertaining to this group, subscribe to the security-reading list at. If you would like to sign up to recommend a paper, you can do so on this spreadsheet We also begin each meeting with a 10-minute discussion of current events pertaining to computer security. The format of the security reading group is that everyone reads the paper beforehand and we have a roundtable discussion of a paper picked by a member over lunch. Since learning went remote due to COVID-19, the group has been meeting biweekly in a hybrid mode. Security reading meets every (other) Tuesday from 12:30 PM to 1:30 PM in 3901 for this academic year, but we might move back to 3725 BBB (the stained-glass conference room) next year. The group is run by Elisa Tsai (eltsai) and Jonah Rosenblum (jonaher). This is the home page for our security reading group, known as SECRIT (SECurity Reading Is Terrific). ![]()
0 Comments
Read More
Leave a Reply. |