Cherlynn Cha (ExpressVPN)
Detection-as-Code: Build threat detections the way you build software
View More Papers
GadgetMeter: Quantitatively and Accurately Gauging the Exploitability of Speculative...
Qi Ling (Purdue University), Yujun Liang (Tsinghua University), Yi Ren (Tsinghua University), Baris Kasikci (University of Washington and Google), Shuwen Deng (Tsinghua University)
Read MoreHow Different Tokenization Algorithms Impact LLMs and Transformer Models...
Ahmed Mostafa, Raisul Arefin Nahid, Samuel Mulder (Auburn University)
Read MoreRetrofitting XoM for Stripped Binaries without Embedded Data Relocation
Chenke Luo (Wuhan University), Jiang Ming (Tulane University), Mengfei Xie (Wuhan University), Guojun Peng (Wuhan University), Jianming Fu (Wuhan University)
Read MoreTowards Better CFG Layouts
Jack Royer (CentraleSupélec), Frédéric TRONEL (CentraleSupélec, Inria, CNRS, University of Rennes), Yaëlle Vinçont (Univ Rennes, Inria, CNRS, IRISA)
Read More