Daniel Kahn Gillmor (ACLU)
Keynote: Armor for the back half of the camel: Why confidentiality matters for recursive DNS traffic
View More Papers
WATSON: Abstracting Behaviors from Audit Logs via Aggregation of...
Jun Zeng (National University of Singapore), Zheng Leong Chua (Independent Researcher), Yinfang Chen (National University of Singapore), Kaihang Ji (National University of Singapore), Zhenkai Liang (National University of Singapore), Jian Mao (Beihang University)
Read MorePolypyus – The Firmware Historian
Jan Friebertshauser, Florian Kosterhon, Jiska Classen, Matthias Hollick (Secure Mobile Networking Lab, TU Darmstad)
Read MoreDenial-of-Service Attacks on C-V2X Networks
Natasa Trkulja, David Starobinski (Boston University), and Randall Berry (Northwestern University)
Read MoreShadow Attacks: Hiding and Replacing Content in Signed PDFs
Christian Mainka (Ruhr University Bochum), Vladislav Mladenov (Ruhr University Bochum), Simon Rohlmann (Ruhr University Bochum)
Read More