Serge Vaudenay, EPFL, Switzerland
Debunking Exposure Notification
View More Papers
WINNIE : Fuzzing Windows Applications with Harness Synthesis and...
Jinho Jung (Georgia Institute of Technology), Stephen Tong (Georgia Institute of Technology), Hong Hu (Pennsylvania State University), Jungwon Lim (Georgia Institute of Technology), Yonghwi Jin (Georgia Institute of Technology), Taesoo Kim (Georgia Institute of Technology)
Read MoreScenario-Driven Assessment of Cyber Risk Perception at the Security...
Simon Parkin (TU Delft), Kristen Kuhn, Siraj Ahmed Shaikh (Coventry University)
Read MoreDNS Privacy Vs : Confronting protocol design trade offs...
Mallory Knodel (Center for Democracy and Technology), Shivan Sahib (Salesforce)
Read MoreFrom Library Portability to Para-rehosting: Natively Executing Microcontroller Software...
Wenqiang Li (State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences; Department of Computer Science, the University of Georgia, USA; School of Cyber Security, University of Chinese Academy of Sciences; Department of Electrical Engineering and Computer Science, the University of Kansas, USA), Le Guan (Department of Computer Science, the University…
Read More