Dr. Ruoyu (Fish) Wang, Assistant Professor at Arizona State University
30 Years into Scientific Binary Decompilation: What We Have Achieved and What We Need to Do Next
View More Papers
Analyzing and Creating Malicious URLs: A Comparative Study on...
Vincent Drury (IT-Security Research Group, RWTH Aachen University), Rene Roepke (Learning Technologies Research Group, RWTH Aachen University), Ulrik Schroeder (Learning Technologies Research Group, RWTH Aachen University), Ulrike Meyer (IT-Security Research Group, RWTH Aachen University)
Read MoreTowards a TEE-based V2V Protocol for Connected and Autonomous...
Mohit Kumar Jangid (Ohio State University) and Zhiqiang Lin (Ohio State University)
Read MorePISE: Protocol Inference using Symbolic Execution and Automata Learning
Ron Marcovich, Orna Grumberg, Gabi Nakibly (Technion, Israel Institute of Technology)
Read MoreGeneration of CAN-based Wheel Lockup Attacks on the Dynamics...
Alireza Mohammadi (University of Michigan-Dearborn), Hafiz Malik (University of Michigan-Dearborn) and Masoud Abbaszadeh (GE Global Research)
Read More