Wes Hardaker (USC)
To understand anomalies, you must first understand your past
View More Papers
LeakLess: Selective Data Protection against Memory Leakage Attacks for...
Maryam Rostamipoor (Stony Brook University), Seyedhamed Ghavamnia (University of Connecticut), Michalis Polychronakis (Stony Brook University)
Read MoreTarget-Centric Firmware Rehosting with Penguin
Andrew Fasano, Zachary Estrada, Luke Craig, Ben Levy, Jordan McLeod, Jacques Becker, Elysia Witham, Cole DiLorenzo, Caden Kline, Ali Bobi (MIT Lincoln Laboratory), Dinko Dermendzhiev (Georgia Institute of Technology), Tim Leek (MIT Lincoln Laboratory), William Robertson (Northeastern University)
Read MoreEvaluating the Strength and Availability of Multilingual Passphrase Authentication
Chi-en Amy Tai (University of Waterloo), Urs Hengartner (University of Waterloo), Alexander Wong (University of Waterloo)
Read More