Daniel Kahn Gillmor (ACLU)
Keynote: Armor for the back half of the camel: Why confidentiality matters for recursive DNS traffic
View More Papers
Empirical Scanning Analysis of Censys and Shodan
Christopher Bennett, AbdelRahman Abdou, and Paul C. van Oorschot (School of Computer Science, Carleton University, Canada)
Read More(Short) Spoofing Mobileye 630’s Video Camera Using a Projector
Ben Nassi, Dudi Nassi, Raz Ben Netanel and Yuval Elovici (Ben-Gurion University of the Negev)
Read MoreDemo #7: Automated Tracking System For LiDAR Spoofing Attacks...
Yulong Cao, Jiaxiang Ma, Kevin Fu (University of Michigan), Sara Rampazzi (University of Florida), and Z. Morley Mao (University of Michigan) Best Demo Award Runner-up ($200 cash prize)!
Read MoreSquirRL: Automating Attack Analysis on Blockchain Incentive Mechanisms with...
Charlie Hou (CMU, IC3), Mingxun Zhou (Peking University), Yan Ji (Cornell Tech, IC3), Phil Daian (Cornell Tech, IC3), Florian Tramèr (Stanford University), Giulia Fanti (CMU, IC3), Ari Juels (Cornell Tech, IC3)
Read More