Kapil Singh

According to our database1, Kapil Singh authored at least 31 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Understanding the Privacy Practices of Political Campaigns: A Perspective from the 2020 US Election Websites.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Towards Automated Regulation Analysis for Effective Privacy Compliance.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

2022
Smart Home Privacy Policies Demystified: A Study of Availability, Content, and Coverage.
Proceedings of the 31st USENIX Security Symposium, 2022

2020
Actions Speak Louder than Words: Entity-Sensitive Privacy Policy and Data Flow Analysis with PoliCheck.
Proceedings of the 29th USENIX Security Symposium, 2020

2019
PrivIdEx: Privacy Preserving and Secure Exchange of Digital Identity Assets.
Proceedings of the World Wide Web Conference, 2019

PolicyLint: Investigating Internal Privacy Policy Contradictions on Google Play.
Proceedings of the 28th USENIX Security Symposium, 2019

2017
UiRef: analysis of sensitive user inputs in Android applications.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

2016
Passive security intelligence to analyze the security risks of mobile/BYOD activities.
IBM J. Res. Dev., 2016

Perceptions of Risk in Mobile Transaction.
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016

AppShell: Making data protection practical for lost or stolen Android devices.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

CASE: Comprehensive Application Security Enforcement on COTS Mobile Devices.
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016

2015
What is wrecking your data plan? A measurement study of mobile web overhead.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

WebCapsule: Towards a Lightweight Forensic Engine for Web Browsers.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Proceedings of the Third Workshop on Mobile Security Technologies (MoST) 2014.
CoRR, 2014

Owner-Centric Protection of Unstructured Data on Smartphones.
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014

CCS'14 Co-Located Workshop Summary for SPSM 2014.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Practical Context-Aware Permission Control for Hybrid Mobile Applications.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013

Practical out-of-band authentication for mobile applications.
Proceedings of the Industrial Track of the 14th ACM/IFIP/USENIX International Middleware Conference, 2013

Accurate and efficient reliability estimation techniques during ADL-driven embedded processor design.
Proceedings of the Design, Automation and Test in Europe, 2013

2012
Practical end-to-end web content integrity.
Proceedings of the 21st World Wide Web Conference 2012, 2012

xAccess: A unified user-centric access control framework for web applications.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

VulnerableMe: Measuring Systemic Weaknesses in Mobile Browser Security.
Proceedings of the Information Systems Security, 8th International Conference, 2012

Biometric authentication on a mobile device: a study of user effort, error and task disruption.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

Unity metric based highly adaptive scheduler for smartphones (UMBASS).
Proceedings of the IEEE International Conference on Advanced Networks and Telecommuncations Systems, 2012

2010
On the Incoherencies in Web Browser Access Control Policies.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

Evaluating Bluetooth as a Medium for Botnet Command and Control.
Proceedings of the Detection of Intrusions and Malware, 2010

2009
xBook: Redesigning Privacy Control in Social Networking Platforms.
Proceedings of the 18th USENIX Security Symposium, 2009

2008
Evaluating email's feasibility for botnet command and control.
Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2008

2007
Understanding Precision in Host Based Intrusion Detection.
Proceedings of the Recent Advances in Intrusion Detection, 10th International Symposium, 2007

2004
APHIDS: A Mobile Agent-Based Programmable Hybrid Intrusion Detection System.
Proceedings of the Mobility Aware Technologies and Applications, 2004

BLAZE: A Mobile Agent Paradigm for VoIP Intrusion Detection Systems.
Proceedings of the ICETE 2004, 2004


  Loading...