Showing 1–15 of 15 results
/ Date/ Name
May 12, 2019Passport: Enabling Accurate Country-Level Router Geolocation using Inaccurate SourcesMar 16, 2020Towards Automatic Identification and Blocking of Non-Critical IoT Traffic DestinationsMay 11, 2021Blocking without Breaking: Identification and Mitigation of Non-Essential IoT TrafficJan 25, 2024SunBlock: Cloudless Protection for IoT SystemsApr 6, 2023Protected or Porous: A Comparative Analysis of Threat Detection Capability of IoT SafeguardsSep 11, 2024Echoes of Privacy: Uncovering the Profiling Practices of Voice AssistantsJun 9, 2020SoK: Attacks on Industrial Control Logic and Formal Verification-Based DefensesJul 22, 2021ZLeaks: Passive Inference Attacks on Zigbee based Smart HomesDec 7, 2022Not Your Average App: A Large-scale Privacy Analysis of Android BrowsersNov 14, 2015Client-Side Web Proxy Detection from Unprivileged Mobile DevicesApr 12, 2025Empirically Measuring Data Localization in the EUApr 22, 2022Tracking, Profiling, and Ad Targeting in the Alexa Echo Smart Speaker EcosystemSep 3, 2020A Haystack Full of Needles: Scalable Detection of IoT Devices in the WildJul 1, 2015ReCon: Revealing and Controlling PII Leaks in Mobile Network TrafficMar 3, 2018AntShield: On-Device Detection of Personal Information Exposure