Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
NDSS.2025
papers.cool
Translating
C To Rust:
Lessons
from a User Study
papers.cool
·
10w
Rethinking
Trust in
Forge-Based
Git Security
papers.cool
·
10w
YuraScanner
: Leveraging LLMs for Task-driven Web App
Scanning
papers.cool
·
10w
You Can Rand but You Can't Hide: A Holistic Security Analysis of Google
Fuchsia
's (and
gVisor
's) Network Stack
papers.cool
·
10w
TWINFUZZ
: Differential Testing of Video Hardware Acceleration
Stacks
papers.cool
·
10w
Rediscovering
Method
Confusion
in Proposed Security Fixes for Bluetooth
papers.cool
·
10w
The Road to Trust: Building
Enclaves
within Confidential
VMs
papers.cool
·
10w
Deanonymizing
Device Identities via Side-channel Attacks in Exclusive-use
IoTs
& Mitigation
papers.cool
·
10w
Secure
IP
Address
Allocation
at Cloud Scale
papers.cool
·
10w
DShield
: Defending against Backdoor Attacks on Graph Neural Networks via
Discrepancy
Learning
papers.cool
·
10w
QMSan
: Efficiently Detecting
Uninitialized
Memory Errors During Fuzzing
papers.cool
·
10w
Attributing
Open-Source
Contributions
is Critical but Difficult: A Systematic Analysis of GitHub Practices and Their Impact on Software Supply Chain Security
papers.cool
·
10w
Understanding Data Importance in Machine Learning Attacks: Does
Valuable
Data Pose Greater
Harm
?
papers.cool
·
10w
CHAOS:
Exploiting
Station Time
Synchronization
in 802.11 Networks
papers.cool
·
10w
The Kids Are All Right: Investigating the
Susceptibility
of Teens and Adults to YouTube
Giveaway
Scams
papers.cool
·
10w
PBP
: Post-training Backdoor
Purification
for Malware Classifiers
papers.cool
·
10w
“Where Are We On Cyber?” – A
Qualitative
Study On
Boards
' Cybersecurity Risk Decision Making
papers.cool
·
10w
A Large-Scale
Measurement
Study of the PROXY Protocol and its Security
Implications
papers.cool
·
10w
Ctrl
+Alt+
Deceive
: Quantifying User Exposure to Online Scams
papers.cool
·
10w
Iris: Dynamic Privacy Preserving Search in
Authenticated
Chord
Peer-to-Peer Networks
papers.cool
·
10w
« Page 6
·
Page 8 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help