Vijay k. Gurbani and Cynthia Hood ( Illinois Institute of Technology), Anita Nikolich (University of Illinois), Henning Schulzrinne (Columbia University) and Radu State (University of Luxembourg)
When DNS Goes Dark: Understanding Privacy and Shaping Policy of an Evolving Protocol
View More Papers
(Short) Spoofing Mobileye 630’s Video Camera Using a Projector
Ben Nassi, Dudi Nassi, Raz Ben Netanel and Yuval Elovici (Ben-Gurion University of the Negev)
Read MoreIs Your Firmware Real or Re-Hosted? A case study...
Abraham A. Clements, Logan Carpenter, William A. Moeglein (Sandia National Laboratories), Christopher Wright (Purdue University)
Read MoreOvid: Message-based Automatic Contact Tracing
Leonie Reichert and Samuel Brack (Humboldt University of Berlin); Björn Scheuermann (Humboldt-University of Berlin)
Read MoreFARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data
Junjie Liang (The Pennsylvania State University), Wenbo Guo (The Pennsylvania State University), Tongbo Luo (Robinhood), Vasant Honavar (The Pennsylvania State University), Gang Wang (University of Illinois at Urbana-Champaign), Xinyu Xing (The Pennsylvania State University)
Read More