Wes Hardaker (USC)
To understand anomalies, you must first understand your past
View More Papers
Too Subtle to Notice: Investigating Executable Stack Issues in...
Hengkai Ye (The Pennsylvania State University), Hong Hu (The Pennsylvania State University)
Read MoreExploring User Perceptions of Security Auditing in the Web3...
Molly Zhuangtong Huang (University of Macau), Rui Jiang (University of Macau), Tanusree Sharma (Pennsylvania State University), Kanye Ye Wang (University of Macau)
Read MoreHidden and Lost Control: on Security Design Risks in...
Haoqiang Wang, Yiwei Fang (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences; Indiana University Bloomington), Yichen Liu (Indiana University Bloomington), Ze Jin (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences; Indiana University Bloomington), Emma Delph…
Read More