The capabilities of modern devices, coupled with the almost ubiquitous availability of Internet connectivity, have resulted in photos being shared online at an unprecedented scale...
Panagiotis Ilia, Iasonas Polakis, Elias Athanasopo...
Credit card fraud has seen rampant increase in the past years, as customers use credit cards and similar financial instruments frequently. Both online and brick-and-mortar outfi...
Shuang Hao, Kevin Borgolte, Nick Nikiforakis, Gian...
In this paper, we report the first large-scale, systematic study on the security qualities of emerging push-messaging services, focusing on their app-side service integrations. W...
Yangyi Chen, Tongxin Li, XiaoFeng Wang, Kai Chen 0...
We present HORNET, a system that enables high-speed end-to-end anonymous channels by leveraging next-generation network architectures. HORNET is designed as a low-latency onion ro...
Chen Chen, Daniele Enrico Asoni, David Barrera, Ge...
This paper describes a new class of denial-of-service (DoS) attack, which we refer to as Second Order DoS attacks. These attacks consist of two phases, one that pollutes a databas...
IMSI catching is a problem on all generations of mobile telecommunication networks, i.e., 2G (GSM, GPRS), 3G (HDSPA, EDGE, UMTS) and 4G (LTE, LTE+). Currently, the SIM card of a m...
Fabian van den Broek, Roel Verdult, Joeri de Ruite...
Designing secure cyber-physical systems (CPS) is a particularly difficult task since security vulnerabilities stem not only from traditional cybersecurity concerns, but also physi...
Ivan Ruchkin, Ashwini Rao, Dionisio de Niz, Sagar ...
Encrypting data on client-side before uploading it to a cloud storage is essential for protecting users’ privacy. However client-side encryption is at odds with the standard pra...
Sybil attacks present a significant threat to many Internet systems and applications, in which a single adversary inserts multiple colluding identities in the system to compromis...
Changchang Liu, Peng Gao, Matthew K. Wright, Prate...
—An implicit goal of Bitcoin’s reward structure is to diffuse network influence over a diverse, decentralized population of individual participants. Indeed, Bitcoin’s securi...
Andrew Miller, Ahmed E. Kosba, Jonathan Katz, Elai...