TBA
View More Papers
Is Your Firmware Real or Re-Hosted? A case study...
Abraham A. Clements, Logan Carpenter, William A. Moeglein (Sandia National Laboratories), Christopher Wright (Purdue University)
Read MoreMore than a Fair Share: Network Data Remanence Attacks...
Leila Rashidi (University of Calgary), Daniel Kostecki (Northeastern University), Alexander James (University of Calgary), Anthony Peterson (Northeastern University), Majid Ghaderi (University of Calgary), Samuel Jero (MIT Lincoln Laboratory), Cristina Nita-Rotaru (Northeastern University), Hamed Okhravi (MIT Lincoln Laboratory), Reihaneh Safavi-Naini (University of Calgary)
Read MoreReinforcement Learning-based Hierarchical Seed Scheduling for Greybox Fuzzing
Jinghan Wang (University of California, Riverside), Chengyu Song (University of California, Riverside), Heng Yin (University of California, Riverside)
Read MoreScreen Gleaning: Receiving and Interpreting Pixels by Eavesdropping on...
Zhuoran Liu, Léo Weissbart, Dirk Lauret (Radboud University)
Read More