Cherlynn Cha (ExpressVPN)
Detection-as-Code: Build threat detections the way you build software
View More Papers
Transforming Raw Authentication Logs into Interpretable Events
Seth Hastings, Tyler Moore, Corey Bolger, Philip Schumway (University of Tulsa)
Read MoreQMSan: Efficiently Detecting Uninitialized Memory Errors During Fuzzing
Matteo Marini (Sapienza University of Rome), Daniele Cono D'Elia (Sapienza University of Rome), Mathias Payer (EPFL), Leonardo Querzoni (Sapienza University of Rome)
Read MoreThe (Un)usual Suspects – Studying Reasons for Lacking Updates...
Maria Hellenthal (CISPA Helmholtz Center for Information Security), Lena Gotsche (CISPA Helmholtz Center for Information Security), Rafael Mrowczynski (CISPA Helmholtz Center for Information Security), Sarah Kugel (Saarland University), Michael Schilling (CISPA Helmholtz Center for Information Security), Ben Stock (CISPA Helmholtz Center for Information Security)
Read MoreBeyond Classification: Inferring Function Names in Stripped Binaries via...
Linxi Jiang (The Ohio State University), Xin Jin (The Ohio State University), Zhiqiang Lin (The Ohio State University)
Read More