Ben Nassi (Ben-Gurion University of the Negev), Elad Feldman (Ben-Gurion University of the Negev), Aviel Levy (Ben-Gurion University of the Negev), Yaron Pirutin (Ben-Gurion University of the Negev), Asaf Shabtai (Ben-Gurion University of the Negev), Ryusuke Masuoka (Fujitsu System Integration Laboratories) and Yuval Elovici (Ben-Gurion University of the Negev)
Demo #8: Identifying Drones Based on Visual Tokens
View More Papers
“So I Sold My Soul“: Effects of Dark Patterns...
Oksana Kulyk (ITU Copenhagen), Willard Rafnsson (IT University of Copenhagen), Ida Marie Borberg, Rene Hougard Pedersen
Read MorePHYjacking: Physical Input Hijacking for Zero-Permission Authorization Attacks on...
Xianbo Wang (The Chinese University of Hong Kong), Shangcheng Shi (The Chinese University of Hong Kong), Yikang Chen (The Chinese University of Hong Kong), Wing Cheong Lau (The Chinese University of Hong Kong)
Read MoreSecuring CAN Traffic on J1939 Networks
Jeremy Daily, David Nnaji, and Ben Ettlinger (Colorado State University)
Read MoreThe Inconvenient Truths of Ground Truth for Binary Analysis
Jim Alves-Foss, Varsha Venugopal (University of Idaho)
Read More