Pritam Dash, Mehdi Karimibiuki, and Karthik Pattabiraman (University of British Columbia)
Demo #6: Impact of Stealthy Attacks on Autonomous Robotic Vehicle Missions
View More Papers
Rosita: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers
Madura A. Shelton (University of Adelaide), Niels Samwel (Radboud University), Lejla Batina (Radboud University), Francesco Regazzoni (University of Amsterdam and ALaRI – USI), Markus Wagner (University of Adelaide), Yuval Yarom (University of Adelaide and Data61)
Read MoreA First Look at Scams on YouTube
Elijah Bouma-Sims, Bradley Reaves (North Carolina State University)
Read MoreDemo #15: Remote Adversarial Attack on Automated Lane Centering
Yulong Cao (University of Michigan), Yanan Guo (University of Pittsburgh), Takami Sato (UC Irvine), Qi Alfred Chen (UC Irvine), Z. Morley Mao (University of Michigan) and Yueqiang Cheng (NIO)
Read MorePHOENIX: Device-Centric Cellular Network Protocol Monitoring using Runtime Verification
Mitziu Echeverria (The University of Iowa), Zeeshan Ahmed (The University of Iowa), Bincheng Wang (The University of Iowa), M. Fareed Arif (The University of Iowa), Syed Rafiul Hussain (Pennsylvania State University), Omar Chowdhury (The University of Iowa)
Read More