[HTML][HTML] Object detection under the lens of privacy: A critical survey of methods, challenges, and future directions

J Moon, M Bukhari, C Kim, Y Nam, M Maqsood, S Rho - ICT Express, 2024 - Elsevier
This paper presents critical surveillance system functions and considers advances and
challenges for privacy and ethical implications. We examine privacy-protection strategies …

[PDF][PDF] IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing.

J Chen, W Diao, Q Zhao, C Zuo, Z Lin, XF Wang… - NDSS, 2018 - staff.ie.cuhk.edu.hk
With more IoT devices entering the consumer market, it becomes imperative to detect their
security vulnerabilities before an attacker does. Existing binary analysis based approaches …

SoK: SSO-MONITOR-The Current State and Future Research Directions in Single Sign-on Security Measurements

L Jannett, C Mainka, M Westers… - 2024 IEEE 9th …, 2024 - ieeexplore.ieee.org
Single Sign-On (SSO) with OAuth 2.0 and OpenID Connect 1.0 is essential for user
authentication and autho-rization on the Internet. Billions of users rely on SSO services …

The cookie hunter: Automated black-box auditing for web authentication and authorization flaws

K Drakonakis, S Ioannidis, J Polakis - Proceedings of the 2020 ACM …, 2020 - dl.acm.org
In this paper, we focus on authentication and authorization flaws in web apps that enable
partial or full access to user accounts. Specifically, we develop a novel fully automated black …

Automatic fingerprinting of vulnerable ble iot devices with static uuids from mobile apps

C Zuo, H Wen, Z Lin, Y Zhang - Proceedings of the 2019 ACM SIGSAC …, 2019 - dl.acm.org
Being an easy-to-deploy and cost-effective low power wireless solution, Bluetooth Low
Energy (BLE) has been widely used by Internet-of-Things (IoT) devices. In a typical IoT …

Why does your data leak? uncovering the data leakage in cloud from mobile apps

C Zuo, Z Lin, Y Zhang - 2019 IEEE Symposium on Security and …, 2019 - ieeexplore.ieee.org
Increasingly, more and more mobile applications (apps for short) are using the cloud as the
back-end, in particular the cloud APIs, for data storage, data analytics, message notification …

{Plug-N-Pwned}: Comprehensive vulnerability analysis of {OBD-II} dongles as a new {Over-the-Air} attack surface in automotive {IoT}

H Wen, QA Chen, Z Lin - 29th USENIX security symposium (USENIX …, 2020 - usenix.org
With the growing trend of the Internet of Things, a large number of wireless OBD-II dongles
are developed, which can be simply plugged into vehicles to enable remote functions such …

O single {Sign-Off}, where art thou? An empirical analysis of single {Sign-On} account hijacking and session management on the web

M Ghasemisharif, A Ramesh, S Checkoway… - 27th USENIX Security …, 2018 - usenix.org
Single Sign-On (SSO) allows users to effortlessly navigate the Web and obtain a
personalized experience without the hassle of creating and managing accounts across …

Understanding the evolution of android app vulnerabilities

J Gao, L Li, P Kong, TF Bissyandé… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
The Android ecosystem today is a growing universe of a few billion devices, hundreds of
millions of users and millions of applications targeting a wide range of activities where …

DISTINCT: identity theft using in-browser communications in dual-window single sign-on

L Jannett, V Mladenov, C Mainka… - Proceedings of the 2022 …, 2022 - dl.acm.org
Single Sign-On (SSO) protocols like OAuth 2.0 and OpenID Connect 1.0 are cornerstones of
modern web security, and have received much academic attention. Users sign in at a trusted …