Cherlynn Cha (ExpressVPN)
Detection-as-Code: Build threat detections the way you build software
View More Papers
Before the Vicious Cycle Starts: Preventing Burnout Across SOC...
Kashyap Thimmaraju (Technische Universitat Berlin), Duc Anh Hoang (Technische Universitat Berlin), Souradip Nath (Arizona State University), Jaron Mink (Arizona State University), Gail-Joon Ahn (Arizona State University)
Read MoreBumbleBee: Secure Two-party Inference Framework for Large Transformers
Wen-jie Lu (Ant Group), Zhicong Huang (Ant Group), Zhen Gu (Alibaba Group), Jingyu Li (Ant Group & Zhejiang University), Jian Liu (Zhejiang University), Cheng Hong (Ant Group), Kui Ren (Zhejiang University), Tao Wei (Ant Group), WenGuang Chen (Ant Group)
Read MoreInspecting Compiler Optimizations on Mixed Boolean Arithmetic Obfuscation
Rachael Little, Dongpeng Xu (University of New Hampshire)
Read More