[HTML][HTML] Object detection under the lens of privacy: A critical survey of methods, challenges, and future directions
This paper presents critical surveillance system functions and considers advances and
challenges for privacy and ethical implications. We examine privacy-protection strategies …
challenges for privacy and ethical implications. We examine privacy-protection strategies …
[PDF][PDF] IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing.
With more IoT devices entering the consumer market, it becomes imperative to detect their
security vulnerabilities before an attacker does. Existing binary analysis based approaches …
security vulnerabilities before an attacker does. Existing binary analysis based approaches …
SoK: SSO-MONITOR-The Current State and Future Research Directions in Single Sign-on Security Measurements
Single Sign-On (SSO) with OAuth 2.0 and OpenID Connect 1.0 is essential for user
authentication and autho-rization on the Internet. Billions of users rely on SSO services …
authentication and autho-rization on the Internet. Billions of users rely on SSO services …
The cookie hunter: Automated black-box auditing for web authentication and authorization flaws
In this paper, we focus on authentication and authorization flaws in web apps that enable
partial or full access to user accounts. Specifically, we develop a novel fully automated black …
partial or full access to user accounts. Specifically, we develop a novel fully automated black …
Automatic fingerprinting of vulnerable ble iot devices with static uuids from mobile apps
Being an easy-to-deploy and cost-effective low power wireless solution, Bluetooth Low
Energy (BLE) has been widely used by Internet-of-Things (IoT) devices. In a typical IoT …
Energy (BLE) has been widely used by Internet-of-Things (IoT) devices. In a typical IoT …
Why does your data leak? uncovering the data leakage in cloud from mobile apps
Increasingly, more and more mobile applications (apps for short) are using the cloud as the
back-end, in particular the cloud APIs, for data storage, data analytics, message notification …
back-end, in particular the cloud APIs, for data storage, data analytics, message notification …
{Plug-N-Pwned}: Comprehensive vulnerability analysis of {OBD-II} dongles as a new {Over-the-Air} attack surface in automotive {IoT}
With the growing trend of the Internet of Things, a large number of wireless OBD-II dongles
are developed, which can be simply plugged into vehicles to enable remote functions such …
are developed, which can be simply plugged into vehicles to enable remote functions such …
O single {Sign-Off}, where art thou? An empirical analysis of single {Sign-On} account hijacking and session management on the web
Single Sign-On (SSO) allows users to effortlessly navigate the Web and obtain a
personalized experience without the hassle of creating and managing accounts across …
personalized experience without the hassle of creating and managing accounts across …
Understanding the evolution of android app vulnerabilities
The Android ecosystem today is a growing universe of a few billion devices, hundreds of
millions of users and millions of applications targeting a wide range of activities where …
millions of users and millions of applications targeting a wide range of activities where …
DISTINCT: identity theft using in-browser communications in dual-window single sign-on
Single Sign-On (SSO) protocols like OAuth 2.0 and OpenID Connect 1.0 are cornerstones of
modern web security, and have received much academic attention. Users sign in at a trusted …
modern web security, and have received much academic attention. Users sign in at a trusted …