Client fingerprinting techniques enhance classical cookie-based user tracking to increase the robustness of tracking techniques. A unique identifier is created based on characte...
We propose a new way to verify the integrity and freshness of footage from security cameras by sending visual challenges to the area being monitored by the camera. We study the ef...
Over the past decade many exploit mitigation techniques have been introduced to defend against memory corruption attacks. WˆX, ASLR, and canary-based protections are nowadays wid...
Theofilos Petsios, Vasileios P. Kemerlis, Michalis...
In [7] we introduced the category MKHaus of modal compact Hausdorff spaces, and showed these were concrete realizations of coalgebras for the Vietoris functor on compact Hausdor...
Guram Bezhanishvili, Nick Bezhanishvili, John Hard...
We define the notion of exact completion with respect to an existential elementary doctrine. We observe that the forgetful functor from the 2category of exact categories to exist...
Lax monoidal powerset-enriched monads yield a monoidal structure on the category of monoids in the Kleisli category of a monad. Exponentiable objects in this category are identi...
We propose the notion of association schemoids generalizing that of association schemes from small categorical points of view. In particular, a generalization of the Bose-Mesner al...
We make explicit a larger structural phenomenon hidden behind the existence of normalizers in terms of existence of certain cartesian maps related to the kernel functor.