Search Results
Reading Between the Lines: An Extensive Evaluation of the Security and Privacy Implications ...
Reading Between the Lines: An Extensive Evaluation of the Security and Privacy Implications ...
Calculating Risk in the Era of Obscurity: Reading Between the Lines of Security Advisories
USENIX Security '20 - A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web
Compositional Security for Reentrant Applications
Bookworm Game: Automatic Discovery of LTE Vulnerabilities Through Documentation Analysis
Bookworm Game: Automatic Discovery of LTE Vulnerabilities Through Documentation Analysis
RAMBleed: Reading Bits in Memory without Accessing Them
Compositional Security for Reentrant Applications
The EMV Standard: Break, Fix, Verify
From Marriott to Morrisons - important lessons from recent data security cases
HackEd: A Pedagogical Analysis of Online Vulnerability Discovery Exercises