Cherlynn Cha (ExpressVPN)
Detection-as-Code: Build threat detections the way you build software
View More Papers
The Discriminative Power of Cross-layer RTTs in Fingerprinting Proxy...
Diwen Xue (University of Michigan), Robert Stanley (University of Michigan), Piyush Kumar (University of Michigan), Roya Ensafi (University of Michigan)
Read MoreAutomating Remediation: Accelerating Mean Time to Response for Externally...
Johnathan Wilkes, John Anny (Palo Alto Networks)
Read MoreStarshields for iOS: Navigating the Security Cosmos in Satellite...
Jiska Classen (Hasso Plattner Institute, University of Potsdam), Alexander Heinrich (TU Darmstadt, Germany), Fabian Portner (TU Darmstadt, Germany), Felix Rohrbach (TU Darmstadt, Germany), Matthias Hollick (TU Darmstadt, Germany)
Read More