Users rely on ad and tracker blocking tools to protect their privacy. Unfortunately, existing ad and tracker blocking tools are susceptible to mutable advertising and tracking content. In this …
The emergence of Internet of Things (IoT) brings about new security challenges at the intersection of cyber and physical spaces. One prime example is the vulnerability of Face …
Modern web applications are built by combining functionality from external third parties; with the caveat that the website developers trust them. However, third parties come from various …
Although encryption hides the content of communications from third parties, metadata, ie, the information attached to the content (such as the size or timing of communication) can be a …
Abstract Deep Neural Networks (DNNs) have achieved state-of-the-art performance on a wide range of tasks, thus are increasingly deployed in real-world applications. However …
Globally, hundreds of millions of Internet users worldwide are using ad-blocking systems. By blocking the ads and trackers on the web pages, Internet users can enhance security …