A diverse set of Internet of Things (IoT) devices are becoming an integr...
We conduct a large-scale measurement of developers' insecure practices
l...
As privacy features in Android operating system improve, privacy-invasiv...
Employees are often required to use Enterprise Security Software ("ESS")...
Public key infrastructure (PKI) is a certificate-based technology that h...
A smart contract that is deployed to a blockchain system like Ethereum i...
The Android operating system is currently the most popular mobile operat...
Recently, cloud control systems have gained increasing attention from th...
Open access WiFi hotspots are widely deployed in many public places,
inc...
A one-time program (OTP) works as follows: Alice provides Bob with the
i...
Unauthorized data alteration has been a longstanding threat since the
em...
Comprehensive case studies on malicious code mostly focus on botnets and...
Case studies on malicious code mostly focus on botnets and worms (recent...
Network traffic inspection, including TLS traffic, in enterprise environ...
Smart toys have captured an increasing share of the toy market, and are
...
Smart toys have captured an increasing share of the toy market, and are
...
Personal cryptographic keys are the foundation of many secure services, ...