Philip Stoner (Deloitte)
AI Adoption and Skill Development in Security Operations Centers
View More Papers
Automating Remediation: Accelerating Mean Time to Response for Externally...
Johnathan Wilkes, John Anny (Palo Alto Networks)
Read Morecozy: Comparative Symbolic Execution for Binary Programs
Caleb Helbling, Graham Leach-Krouse, Sam Lasser, Greg Sullivan (Draper)
Read MoreStatically Discover Cross-Entry Use-After-Free Vulnerabilities in the Linux Kernel
Hang Zhang (Indiana University Bloomington), Jangha Kim (The Affiliated Institute of ETRI, ROK), Chuhong Yuan (Georgia Institute of Technology), Zhiyun Qian (University of California, Riverside), Taesoo Kim (Georgia Institute of Technology)
Read MoreBARBIE: Robust Backdoor Detection Based on Latent Separability
Hanlei Zhang (Zhejiang University), Yijie Bai (Zhejiang University), Yanjiao Chen (Zhejiang University), Zhongming Ma (Zhejiang University), Wenyuan Xu (Zhejiang University)
Read More