TBA
View More Papers
Does Every Second Count? Time-based Evolution of Malware Behavior...
Alexander Küchler (Fraunhofer AISEC), Alessandro Mantovani (EURECOM), Yufei Han (NortonLifeLock Research Group), Leyla Bilge (NortonLifeLock Research Group), Davide Balzarotti (EURECOM)
Read MoreManipulating the Byzantine: Optimizing Model Poisoning Attacks and Defenses...
Virat Shejwalkar (UMass Amherst), Amir Houmansadr (UMass Amherst)
Read MoreShort Paper: Declarative Demand-Driven Reverse Engineering
Yihao Sun, Jeffrey Ching, Kristopher Micinski (Department of Electical Engineering and Computer Science, Syracuse University)
Read MoreGoogle/Apple Exposure Notification Due Diligence
Douglas Leith and Stephen Farrell (Trinity College Dublin)
Read More