Cherlynn Cha (ExpressVPN)
Detection-as-Code: Build threat detections the way you build software
View More Papers
DRAGON: Predicting Decompiled Variable Data Types with Learned Confidence...
Caleb Stewart, Rhonda Gaede, Jeffrey Kulick (University of Alabama in Huntsville)
Read MoreReThink: Reveal the Threat of Electromagnetic Interference on Power...
Fengchen Yang (Zhejiang University; ZJU QI-ANXIN IoT Security Joint Labratory), Zihao Dan (Zhejiang University; ZJU QI-ANXIN IoT Security Joint Labratory), Kaikai Pan (Zhejiang University; ZJU QI-ANXIN IoT Security Joint Labratory), Chen Yan (Zhejiang University; ZJU QI-ANXIN IoT Security Joint Labratory), Xiaoyu Ji (Zhejiang University; ZJU QI-ANXIN IoT Security Joint Labratory), Wenyuan Xu (Zhejiang University; ZJU…
Read MoreRecurrent Private Set Intersection for Unbalanced Databases with Cuckoo...
Eduardo Chielle (New York University Abu Dhabi), Michail Maniatakos (New York University Abu Dhabi)
Read MoreAn Empirical Study on Fingerprint API Misuse with Lifecycle...
Xin Zhang (Fudan University), Xiaohan Zhang (Fudan University), Zhichen Liu (Fudan University), Bo Zhao (Fudan University), Zhemin Yang (Fudan University), Min Yang (Fudan University)
Read More