Dr. Ruoyu (Fish) Wang, Assistant Professor at Arizona State University
30 Years into Scientific Binary Decompilation: What We Have Achieved and What We Need to Do Next
View More Papers
Finding 1-Day Vulnerabilities in Trusted Applications using Selective Symbolic...
Marcel Busch (Friedrich-Alexander-Universität Erlangen-Nürnberg), Kalle Dirsch (Friedrich-Alexander-Universität Erlangen-Nürnberg)
Read MoreTestability Tarpits: the Impact of Code Patterns on the...
Feras Al Kassar (SAP Security Research), Giulia Clerici (SAP Security Research), Luca Compagna (SAP Security Research), Davide Balzarotti (EURECOM), Fabian Yamaguchi (ShiftLeft Inc)
Read MoreGet a Model! Model Hijacking Attack Against Machine Learning...
Ahmed Salem (CISPA Helmholtz Center for Information Security), Michael Backes (CISPA Helmholtz Center for Information Security), Yang Zhang (CISPA Helmholtz Center for Information Security)
Read MoreDemo #6: Attacks on CAN Error Handling Mechanism
Khaled Serag (Purdue University), Vireshwar Kumar (IIT Delhi), Z. Berkay Celik (Purdue University), Rohit Bhatia (Purdue University), Mathias Payer (EPFL) and Dongyan Xu (Purdue University)
Read More