Cherlynn Cha (ExpressVPN)
Detection-as-Code: Build threat detections the way you build software
View More Papers
Cross-Origin Web Attacks via HTTP/2 Server Push and Signed...
Pinji Chen (Tsinghua University), Jianjun Chen (Tsinghua University & Zhongguancun Laboratory), Mingming Zhang (Zhongguancun Laboratory), Qi Wang (Tsinghua University), Yiming Zhang (Tsinghua University), Mingwei Xu (Tsinghua University), Haixin Duan (Tsinghua University)
Read MoreKernelSnitch: Side Channel-Attacks on Kernel Data Structures
Lukas Maar (Graz University of Technology), Jonas Juffinger (Graz University of Technology), Thomas Steinbauer (Graz University of Technology), Daniel Gruss (Graz University of Technology), Stefan Mangard (Graz University of Technology)
Read MoreSOC Service Areas: Identification, Prioritization, and Implementation
Christopher Rodman, Breanna Kraus, Justin Novak (SEI/CERT)
Read More