Mobile mini-programs in WeChat have gained significant popularity since ...
Mobile applications, particularly those from social media platforms such...
The super app paradigm, exemplified by platforms such as WeChat and AliP...
Retroactive operation is an operation that changes a past operation in a...
Recently, Decentralized Finance (DeFi) platforms on Ethereum are booming...
Identifying "superspreaders" of disease is a pressing concern for societ...
AMD's Secure Encrypted Virtualization (SEV) is an emerging security feat...
In this paper, we propose a new privacy-preserving, automated contact tr...
Control-flow hijacking attacks are used to perform malicious com-putatio...
To defeat security threats such as man-in-the-middle (MITM) attacks,
Blu...
Inertial sensors provide crucial feedback for control systems to determi...
This paper presents SgxPectre Attacks that exploit the recently disclose...
In spite of years of improvements to software security, heap-related att...