Mohammed Lamine Bouchouia (Telecom Paris - Institut Polytechnique de Paris), Jean-Philippe Monteuuis (Qualcomm), Houda Labiod (Telecom Paris - Institut Polytechnique de Paris), Ons Jelassi, Wafa Ben Jaballah (Thales) and Jonathan Petit (Telecom Paris - Institut Polytechnique de Paris)
Demo: A Simulator for Cooperative and Automated Driving Security
View More Papers
Forensic Analysis of Configuration-based Attacks
Muhammad Adil Inam (University of Illinois at Urbana-Champaign), Wajih Ul Hassan (University of Illinois at Urbana-Champaign), Ali Ahad (University of Virginia), Adam Bates (University of Illinois at Urbana-Champaign), Rashid Tahir (University of Prince Mugrin), Tianyin Xu (University of Illinois at Urbana-Champaign), Fareed Zaffar (LUMS)
Read MoreTrusted Verification of Over-the-Air (OTA) Secure Software Updates on...
Anway Mukherjee, Ryan Gerdes, and Tam Chantem (Virginia Tech)
Read MoreVPNInspector: Systematic Investigation of the VPN Ecosystem
Reethika Ramesh (University of Michigan), Leonid Evdokimov (Independent), Diwen Xue (University of Michigan), Roya Ensafi (University of Michigan)
Read MoreV-Range: Enabling Secure Ranging in 5G Wireless Networks
Mridula Singh (CISPA - Helmholtz Center for Information Security), Marc Roeschlin (ETH Zurich), Aanjhan Ranganathan (Northeastern University), Srdjan Capkun (ETH Zurich)
Read More