Microarchitectural attacks in heterogeneous systems: A survey

H Naghibijouybari, EM Koruyeh… - ACM Computing …, 2022 - dl.acm.org
With the increasing proliferation of hardware accelerators and the predicted continued
increase in the heterogeneity of future computing systems, it is necessary to understand the …

Leaky forms: A study of email and password exfiltration before form submission

A Senol, G Acar, M Humbert, FZ Borgesius - 31st USENIX Security …, 2022 - usenix.org
Web users enter their email addresses into online forms for a variety of reasons, including
signing in or signing up for a service or subscribing to a newsletter. While enabling such …

" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences

D Olszewski, A Lu, C Stillman, K Warren… - Proceedings of the …, 2023 - dl.acm.org
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …

[HTML][HTML] Adversarial attacks and defenses on ML-and hardware-based IoT device fingerprinting and identification

PMS Sánchez, AH Celdrán, G Bovet… - Future Generation …, 2024 - Elsevier
In the last years, the number of IoT devices deployed has suffered an undoubted explosion,
reaching the scale of billions. However, some new cybersecurity issues have appeared …

Rods with laser beams: understanding browser fingerprinting on phishing pages

I Sanchez-Rola, L Bilge, D Balzarotti… - 32nd USENIX Security …, 2023 - usenix.org
Phishing is one of the most common forms of social engineering attacks and is regularly
used by criminals to compromise millions of accounts every year. Numerous solutions have …

Fashion faux pas: Implicit stylistic fingerprints for bypassing browsers' anti-fingerprinting defenses

X Lin, F Araujo, T Taylor, J Jang… - 2023 IEEE Symposium …, 2023 - ieeexplore.ieee.org
Browser fingerprinting remains a topic of particular interest for both the research community
and the browser ecosystem, and various anti-fingerprinting countermeasures have been …

A survey on fingerprinting technologies for smartphones based on embedded transducers

A Berdich, B Groza, R Mayrhofer - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
Smartphones are a vital technology, they improve our social interactions, provide us a great
deal of information, and bring forth the means to control various emerging technologies, like …

IoT Device Identification and Cybersecurity: Advancements, Challenges, and an LSTM-MLP Solution

SA Alshaya - Engineering, Technology & Applied Science Research, 2023 - etasr.com
Over the past few years, there has been an undeniable surge in the deployment of IoT
devices. However, this rapid growth has brought new challenges in cybersecurity, as …

Targeted and troublesome: Tracking and advertising on children's websites

Z Moti, A Senol, H Bostani, FZ Borgesius… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
On the modern web, trackers and advertisers frequently construct and monetize users'
detailed behavioral profiles without consent. Despite various studies on web tracking …

From hardware fingerprint to access token: Enhancing the authentication on iot devices

Y **ao, Y He, X Zhang, Q Wang, R **e, K Sun… - arxiv preprint arxiv …, 2024 - arxiv.org
The proliferation of consumer IoT products in our daily lives has raised the need for secure
device authentication and access control. Unfortunately, these resource-constrained devices …