Wes Hardaker (USC)
To understand anomalies, you must first understand your past
View More Papers
Mismatched SOCs: A Case Study of Cybersecurity Goal Incongruency...
Andrew Morin (University of Tulsa)
Read MoreGadgetMeter: Quantitatively and Accurately Gauging the Exploitability of Speculative...
Qi Ling (Purdue University), Yujun Liang (Tsinghua University), Yi Ren (Tsinghua University), Baris Kasikci (University of Washington and Google), Shuwen Deng (Tsinghua University)
Read MoreEMIRIS: Eavesdropping on Iris Information via Electromagnetic Side Channel
Wenhao Li (Shandong University), Jiahao Wang (Shandong University), Guoming Zhang (Shandong University), Yanni Yang (Shandong University), Riccardo Spolaor (Shandong University), Xiuzhen Cheng (Shandong University), Pengfei Hu (Shandong University)
Read MoreExploring User Perceptions of Security Auditing in the Web3...
Molly Zhuangtong Huang (University of Macau), Rui Jiang (University of Macau), Tanusree Sharma (Pennsylvania State University), Kanye Ye Wang (University of Macau)
Read More