Yan Shoshitaishvili (Arizona State University)
Reconciling the Hacker Spirit
View More Papers
A Systematic Study of the Consistency of Two-Factor Authentication...
Sanam Ghorbani Lyastani (CISPA Helmholtz Center for Information Security, Saarland University), Michael Backes (CISPA Helmholtz Center for Information Security), Sven Bugiel (CISPA Helmholtz Center for Information Security)
Read MorePost-GDPR Threat Hunting on Android Phones: Dissecting OS-level Safeguards...
Mark Huasong Meng (National University of Singapore), Qing Zhang (ByteDance), Guangshuai Xia (ByteDance), Yuwei Zheng (ByteDance), Yanjun Zhang (The University of Queensland), Guangdong Bai (The University of Queensland), Zhi Liu (ByteDance), Sin G. Teo (Agency for Science, Technology and Research), Jin Song Dong (National University of Singapore)
Read MoreSemi-Automated Synthesis of Driving Rules
Diego Ortiz, Leilani Gilpin, Alvaro A. Cardenas (University of California, Santa Cruz)
Read More