Yan Shoshitaishvili (Arizona State University)
Reconciling the Hacker Spirit
View More Papers
Why do Internet Devices Remain Vulnerable? A Survey with...
Tamara Bondar, Hala Assal, AbdelRahman Abdou (Carleton University)
Read MoreAccess Your Tesla without Your Awareness: Compromising Keyless Entry...
Xinyi Xie (Shanghai Fudan Microelectronics Group Co., Ltd.), Kun Jiang (Shanghai Fudan Microelectronics Group Co., Ltd.), Rui Dai (Shanghai Fudan Microelectronics Group Co., Ltd.), Jun Lu (Shanghai Fudan Microelectronics Group Co., Ltd.), Lihui Wang (Shanghai Fudan Microelectronics Group Co., Ltd.), Qing Li (State Key Laboratory of ASIC & System, Fudan University), Jun Yu (State Key…
Read MoreTowards More Effective Responsible Disclosure for Vulnerability Research
Weiheng Bai and Qiushi Wu (University of Minnesota)
Read More“This is different from the Western world”: Understanding Password...
Aniqa Alam, Elizabeth Stobert, Robert Biddle (Carleton University)
Read More