Serge Vaudenay, EPFL, Switzerland
Debunking Exposure Notification
View More Papers
WATSON: Abstracting Behaviors from Audit Logs via Aggregation of...
Jun Zeng (National University of Singapore), Zheng Leong Chua (Independent Researcher), Yinfang Chen (National University of Singapore), Kaihang Ji (National University of Singapore), Zhenkai Liang (National University of Singapore), Jian Mao (Beihang University)
Read MoreEmilia: Catching Iago in Legacy Code
Rongzhen Cui (University of Toronto), Lianying Zhao (Carleton University), David Lie (University of Toronto)
Read MoreSpecTaint: Speculative Taint Analysis for Discovering Spectre Gadgets
Zhenxiao Qi (UC Riverside), Qian Feng (Baidu USA), Yueqiang Cheng (NIO Security Research), Mengjia Yan (MIT), Peng Li (ByteDance), Heng Yin (UC Riverside), Tao Wei (Ant Group)
Read MoreSymQEMU: Compilation-based symbolic execution for binaries
Sebastian Poeplau (EURECOM and Code Intelligence), Aurélien Francillon (EURECOM)
Read More