Showing 1–14 of 14 results
/ Date/ Name
May 22, 2014Hello rootKitty: A lightweight invariance-enforcing frameworkJun 4, 2018Tranco: A Research-Oriented Top Sites Ranking Hardened Against ManipulationAug 21, 2017Automated Website Fingerprinting through Deep LearningFeb 20, 2018Frictionless Authentication Systems: Emerging Trends, Research Challenges and OpportunitiesMay 22, 2014HyperForce: Hypervisor-enForced Execution of Security-Critical CodeDec 29, 2025Optimal Configuration of API Resources in Cloud Native ComputingMar 6, 2026A LINDDUN-based Privacy Threat Modeling Framework for GenAIFeb 29, 2024How to Train your Antivirus: RL-based Hardening through the Problem-SpaceDec 6, 2017Selective Jamming of LoRaWAN using Commodity HardwareFeb 7, 2020A Comprehensive Feature Comparison Study of Open-Source Container Orchestration FrameworksMay 22, 2014On the effectiveness of virtualization-based securityAug 22, 2017Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared HostingDec 20, 2023The Adaptive Arms Race: Redefining Robustness in AI SecurityFeb 18, 2021The CNAME of the Game: Large-scale Analysis of DNS-based Tracking Evasion