160
click to vote
ACSAC
9 years 8 months ago
2015 IEEE
Client fingerprinting techniques enhance classical cookie-based user tracking to increase the robustness of tracking techniques. A unique identifier is created based on characte...
ACSAC
9 years 8 months ago
2015 IEEE
CAPTCHAs represent an important pillar in the web security domain. Yet, current CAPTCHAs do not fully meet the web security requirements. Many existing CAPTCHAs can be broken usin...
91
Voted
ACSAC
9 years 8 months ago
2015 IEEE
Android’s graphical authentication mechanism requires users to unlock their devices by “drawing” a pattern that connects a sequence of contact points arranged in a 3x3 grid....
91
Voted
ACSAC
9 years 8 months ago
2015 IEEE
Mobile devices are prevalently used for processing personal private data and sometimes collecting evidence of social injustice or political oppression. The device owners may alway...
88
Voted
ACSAC
9 years 8 months ago
2015 IEEE
Existing malware defenses are primarily reactive in nature, with defenses effective only on malware that has previously been observed. Unfortunately, we are witnessing a generati...
|