Ghazal Abdollahi, Hamid Asadi, Robert Ricci (The University of Utah)
NOD: Uncovering intense attackers’ behavior through Nested Outlier Detection from SSH logs
View More Papers
SoK: Cryptographic Authenticated Dictionaries
Harjasleen Malvai (University of Illinois, Urbana-Champaign), Francesca Falzon (ETH Zürich), Andrew Zitek-Estrada (EPFL), Sarah Meiklejohn (University College London), Joseph Bonneau (NYU)
Read MoreTrust Me, I Know This Function: Hijacking LLM Static...
Shir Bernstein (Ben Gurion University of the Negev), David Beste (CISPA Helmholtz Center for Information Security), Daniel Ayzenshteyn (Ben Gurion University of the Negev), Lea Schönherr (CISPA Helmholtz Center for Information Security), Yisroel Mirsky (Ben Gurion University of the Negev)
Read More“I wanted to buy Robux but got scammed for...
Lily Klucinec (Carnegie Mellon University), Ellie Young (Carnegie Mellon University), Elijah Bouma-Sims (Carnegie Mellon University), Lorrie Faith Cranor (Carnegie Mellon University)
Read More