Cited By
View all- Lv LZhou P(2025)TrojanProbe: Fingerprinting Trojan tunnel implementations by actively probing crafted HTTP requestsComputers & Security10.1016/j.cose.2024.104147148(104147)Online publication date: Jan-2025
- Raj RNewar MMondal MBalzarotti DXu W(2024)"I just hated it and I want my money back"Proceedings of the 33rd USENIX Conference on Security Symposium10.5555/3698900.3699237(6021-6037)Online publication date: 14-Aug-2024
- Gegenhuber GHolzbauer FFrenzel PWeippl EDabrowski ABalzarotti DXu W(2024)Diffie-hellman picture showProceedings of the 33rd USENIX Conference on Security Symposium10.5555/3698900.3698926(451-468)Online publication date: 14-Aug-2024
- Show More Cited By