1

Game of Missuggestions: Semantic Analysis of Search-Autocomplete Manipulations

Understanding and detecting manipulation of search engine autocomplete.

An Empirical Characterization of IFTTT: Ecosystem, Usage, and Performance

A comprehensive measurement of IFTTT, an IoT workflow platform, to reveal its network and security implications.

Picking Up My Tab: Understanding and Mitigating Synchronized Token Lifting and Spending in Mobile Payment

Understand and mitigate synchronized token lifting and spending in mobile payment.

Under the shadow of sunshine: Understanding and detecting bulletproof hosting on legitimate service pr ovider networks

How can millions of residential IPs serve as traffic exits in commercial web proxy networks?

Understanding iot security through the data crystal ball: Where we are now and where we are going to be

Inspired by the boom of the consumer IoT market, many device manufacturers, new start-up companies and technology behemoths have jumped into the space. Indeed, in a span of less than 5 years, we have experienced the manifestation of an array of …

SMig: Stream Migration Extension For HTTP/2

HTTP/2 is quickly replacing HTTP/1.1, the protocol that supports the WWW for the past 17 years. However, HTTP/2’s connection management and multiplexing schemes often incur unexpected cross-layer interactions. In this paper, we propose SMig, an …