Cherlynn Cha (ExpressVPN)
Detection-as-Code: Build threat detections the way you build software
View More Papers
Rethink Custom Transformers for Binary Analysis
Heng Yin, Professor, Department of Computer Science and Engineering, University of California, Riverside
Read MoreCellular Metasploit
Dr. Yongdae Kim, Director, KAIST Chair Professor, Electrical Engineering and GSIS, KAIST
Read MoreTZ-DATASHIELD: Automated Data Protection for Embedded Systems via Data-Flow-Based...
Zelun Kong (University of Texas at Dallas), Minkyung Park (University of Texas at Dallas), Le Guan (University of Georgia), Ning Zhang (Washington University in St. Louis), Chung Hwan Kim (University of Texas at Dallas)
Read MoreHuman Performance in Security Operations: A Survey on Burnout,...
Kashyap Thimmaraju (TU Berlin)
Read More