Cherlynn Cha (ExpressVPN)
Detection-as-Code: Build threat detections the way you build software
View More Papers
Too Subtle to Notice: Investigating Executable Stack Issues in...
Hengkai Ye (The Pennsylvania State University), Hong Hu (The Pennsylvania State University)
Read MoreA Large-Scale Measurement Study of the PROXY Protocol and...
Stijn Pletinckx (University of California, Santa Barbara), Christopher Kruegel (University of California, Santa Barbara), Giovanni Vigna (University of California, Santa Barbara)
Read MoreDecoupling Permission Management from Cryptography for Privacy-Preserving Systems
Ruben De Smet (Department of Engineering Technology (INDI), Department of Electronics and Informatics (ETRO), Vrije Universiteit Brussel), Tom Godden (Department of Engineering Technology (INDI), Vrije Universiteit Brussel), Kris Steenhaut (Department of Engineering Technology (INDI), Department of Electronics and Informatics (ETRO), Vrije Universiteit Brussel), An Braeken (Department of Engineering Technology (INDI), Vrije Universiteit Brussel)
Read More