Date | Main | Opponent | Title |
---|
23.1.3 | Mohsen Ali | Minseo Park | Time-Print: Authenticating USB Flash Drives with Novel Timing Fingerprints |
23.1.10 | Yurak Choe | Chanjong Lee | Rushmore: securely displaying static and animated images using TrustZone |
23.1.17 | Chaejin Lim | Sanghak Oh | Phishing URL Detection: A Network-based Approach Robust to Evasion |
23.1.31 | Seungho Kim | Nivedita Singh | Privacy Limitations of Interest-based Advertising on The Web: A Post-mortem Empirical Analysis of Google's FLoC |
23.2.7 | Yejin Do | Eunsoo Kim | Watch Out for Race Condition Attacks When Using Android External Storage |
23.2.14 | Seyoung Jin | Seonhye Park | Users' Perceptions of Chrome Compromised Credential Notification |
23.2.21 | Eunsoo Kim | Kiho Lee | Understanding and Detecting Remote Infection on Linux-based IoT Devices |
23.2.28 | Jeongyong Park | Nivedita Singh | Lumos: Identifying and Localizing Diverse Hidden IoT Devices in an Unfamiliar Environment |
23.3.21 | Soolin Kim | Taeyoung Kim | Automating Cookie Consent and GDPR Violation Detection |
23.3.28 | Sanghak Oh | Seungho Kim | A Large-scale Investigation into Geodifferences in Mobile Apps |
23.4.4 | Chanjong Lee | Yurak Choe | Hidden in Plain Sight: Exploring Encrypted Channels in Android Apps |
23.4.11 | Seonhye Park | - | Membership Inference Attacks by Exploiting Loss Trajectory |
23.4.18 | Taeyoung Kim | - | - |
23.4.25 | Bedeuro Kim | - | - |
23.5.2 | Kiho Lee | - | - |
23.5.9 | Beomjin Jin | - | - |
23.5.16 | Nivedita Singh | - | - |