Chloe Fortuna (STR), Chris Casinghino (Jane Street), Sam Lasser (Draper), JT Paasch (STR), Cody Roux (AWS), Philip Zucker (Draper)

View More Papers

TinyML meets IoBT against Sensor Hacking

Raushan Kumar Singh, Sudeepta Mishra (IIT Ropar)

Read More

Symphony: Path Validation at Scale

Anxiao He (Zhejiang University), Jiandong Fu (Zhejiang University), Kai Bu (Zhejiang University), Ruiqi Zhou (Zhejiang University), Chenlu Miao (Zhejiang University), Kui Ren (Zhejiang University)

Read More

Facilitating Threat Modeling by Leveraging Large Language Models

Isra Elsharef, Zhen Zeng (University of Wisconsin-Milwaukee), Zhongshu Gu (IBM Research)

Read More

Is Your Firmware Real or Re-Hosted? A case study...

Abraham A. Clements, Logan Carpenter, William A. Moeglein (Sandia National Laboratories), Christopher Wright (Purdue University)

Read More