Yan Shoshitaishvili (Arizona State University)
Reconciling the Hacker Spirit
View More Papers
VulHawk: Cross-architecture Vulnerability Detection with Entropy-based Binary Code Search
Zhenhao Luo (College of Computer, National University of Defense Technology), Pengfei Wang (College of Computer, National University of Defense Technology), Baosheng Wang (College of Computer, National University of Defense Technology), Yong Tang (College of Computer, National University of Defense Technology), Wei Xie (College of Computer, National University of Defense Technology), Xu Zhou (College of Computer,…
Read MoreVASP: V2X Application Spoofing Platform
Mohammad Raashid Ansari, Jonathan Petit, Jean-Philippe Monteuuis, Cong Chen (Qualcomm Technologies, Inc.)
Read MoreUsing automation to prevent internet exposures becoming incidents
Johnathan Wilkes, Palo Alto Networks
Read More