Mallory Knodel (Center for Democracy and Technology), Shivan Sahib (Salesforce)
DNS Privacy Vs : Confronting protocol design trade offs in the public interest
View More Papers
Time-Based CAN Intrusion Detection Benchmark
Deborah Blevins (University of Kentucky), Pablo Moriano, Robert Bridges, Miki Verma, Michael Iannacone, and Samuel Hollifield (Oak Ridge National Laboratory)
Read MoreUIScope: Accurate, Instrumentation-free, and Visible Attack Investigation for GUI...
Runqing Yang (Zhejiang University), Shiqing Ma (Rutgers University), Haitao Xu (Arizona State University), Xiangyu Zhang (Purdue University), Yan Chen (Northwestern University)
Read MorePyPANDA: Taming the PANDAmonium of Whole System Dynamic Analysis
Luke Craig, Tim Leek (MIT Lincoln Laboratory), Andrew Fasano, Tiemoko Ballo (MIT Lincoln Laboratory, Northeastern University), Brendan Dolan-Gavitt (New York University), William Robertson (Northeastern University)
Read MoreCROW: Code Diversification for WebAssembly
Javier Cabrera Arteaga, Orestis Floros, Benoit Baudry, Martin Monperrus (KTH Royal Institute of Technology), Oscar Vera Perez (Univ Rennes, Inria, CNRS, IRISA)
Read More