Hosts infected with malicious software, so called malware, are ubiquitous in today’s computer networks. The means whereby malware can infiltrate a network are manifold and rang...
Konrad Rieck, Guido Schwenk, Tobias Limmer, Thorst...
CAPTCHAs protect online resources and services from automated access. From an attacker’s point of view, they are typically perceived as an annoyance that prevents the mass creat...
Manuel Egele, Leyla Bilge, Engin Kirda, Christophe...
The proliferation of new modes of communication and collaboration has resulted in an explosion of digital information. To turn this challenge into an opportunity, the IT industry ...
Public-use sensor datasets are a useful scientific resource with the unfortunate feature that their provenance is easily disconnected from their content. To address this we intro...
Stephen Chong, Christian Skalka, Jeffrey A. Vaugha...
Bisimulation between processes has been proven a successful method for formalizing security properties. We argue that in certain cases, a scheduler that has full information on the...