Cherlynn Cha (ExpressVPN)
Detection-as-Code: Build threat detections the way you build software
View More Papers
Cyber Threat Intelligence for SOC Analysts
Nidhi Rastogi, Md Tanvirul Alam (Rochester Institute of Technology)
Read MoreWelcome to Jurassic Park: A Comprehensive Study of Security...
Abdullah AlHamdan (CISPA Helmholtz Center for Information Security), Cristian-Alexandru Staicu (CISPA Helmholtz Center for Information Security)
Read MoreFrom Large to Mammoth: A Comparative Evaluation of Large...
Jie Lin (University of Central Florida), David Mohaisen (University of Central Florida)
Read MoreKernelSnitch: Side Channel-Attacks on Kernel Data Structures
Lukas Maar (Graz University of Technology), Jonas Juffinger (Graz University of Technology), Thomas Steinbauer (Graz University of Technology), Daniel Gruss (Graz University of Technology), Stefan Mangard (Graz University of Technology)
Read More