• Turing Obfuscation

  • BluePass: A Secure Hand-Free Password Manager

  • Guilt-by-Association: Detecting Malicious Entities via Graph Mining

  • Achieve Efficient and Privacy-Preserving Proximity Detection Scheme for Social Applications

  • HDoS: An Application-Layer DoS Attack Towards HTTP/2 Protocol

  • Query Recovery Attacks on Searchable Encryption Based on Partial Knowledge

  • Inferring Implicit Assumptions and Correct Usage of Mobile Payment Protocols

  • Visual Analysis of Android Malware Behavior Profile Based on : A Pruned Lightweight APP Call Graph

  • Mending Wall: On the Implementation of Censorship in India

  • Defining and Detecting Environment Discrimination in Android Apps