Tariq Elahi
Ensuring Safety and Facilitating Research on the Live Tor Network
View More Papers
PISE: Protocol Inference using Symbolic Execution and Automata Learning
Ron Marcovich, Orna Grumberg, Gabi Nakibly (Technion, Israel Institute of Technology)
Read MoreBinaryInferno: Experiment Design and Evaluation Considerations When Reverse Engineering...
Jared Chandler (Tufts University)
Read MoreAttacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks...
Hadi Abdullah (Visa Research), Aditya Karlekar (University of Florida), Saurabh Prasad (University of Florida), Muhammad Sajidur Rahman (University of Florida), Logan Blue (University of Florida), Luke A. Bauer (University of Florida), Vincent Bindschaedler (University of Florida), Patrick Traynor (University of Florida)
Read MoreBackdoor Attacks Against Dataset Distillation
Yugeng Liu (CISPA Helmholtz Center for Information Security), Zheng Li (CISPA Helmholtz Center for Information Security), Michael Backes (CISPA Helmholtz Center for Information Security), Yun Shen (Netapp), Yang Zhang (CISPA Helmholtz Center for Information Security)
Read More