TBA
View More Papers
Shadow Attacks: Hiding and Replacing Content in Signed PDFs
Christian Mainka (Ruhr University Bochum), Vladislav Mladenov (Ruhr University Bochum), Simon Rohlmann (Ruhr University Bochum)
Read MoreReinforcement Learning-based Hierarchical Seed Scheduling for Greybox Fuzzing
Jinghan Wang (University of California, Riverside), Chengyu Song (University of California, Riverside), Heng Yin (University of California, Riverside)
Read MoreDemo #3: Detecting Illicit Drone Video Filming Using Cryptanalysis
Ben Nassi, Raz Ben-Netanel (Ben-Gurion University of the Negev), Adi Shamir (Weizmann Institute of Science), and Yuval Elovic (Ben-Gurion University of the Negev)
Read MoreScreen Gleaning: Receiving and Interpreting Pixels by Eavesdropping on...
Zhuoran Liu, Léo Weissbart, Dirk Lauret (Radboud University)
Read More