Wes Hardaker (USC)
To understand anomalies, you must first understand your past
View More Papers
LeakLess: Selective Data Protection against Memory Leakage Attacks for...
Maryam Rostamipoor (Stony Brook University), Seyedhamed Ghavamnia (University of Connecticut), Michalis Polychronakis (Stony Brook University)
Read MoreA Key-Driven Framework for Identity-Preserving Face Anonymization
Miaomiao Wang (Shanghai University), Guang Hua (Singapore Institute of Technology), Sheng Li (Fudan University), Guorui Feng (Shanghai University)
Read MoreKernelSnitch: Side Channel-Attacks on Kernel Data Structures
Lukas Maar (Graz University of Technology), Jonas Juffinger (Graz University of Technology), Thomas Steinbauer (Graz University of Technology), Daniel Gruss (Graz University of Technology), Stefan Mangard (Graz University of Technology)
Read More