Wes Hardaker (USC)
To understand anomalies, you must first understand your past
View More Papers
Optimizing Trust-Centric Authentication in Matter-enabled IoT Devices with PUF...
Chandranshu Gupta, Gaurav Varshney (IIT Jammu)
Read MoreImpact Tracing: Identifying the Culprit of Misinformation in Encrypted...
Zhongming Wang (Chongqing University), Tao Xiang (Chongqing University), Xiaoguo Li (Chongqing University), Biwen Chen (Chongqing University), Guomin Yang (Singapore Management University), Chuan Ma (Chongqing University), Robert H. Deng (Singapore Management University)
Read MoreA Comprehensive Memory Safety Analysis of Bootloaders
Jianqiang Wang (CISPA Helmholtz Center for Information Security), Meng Wang (CISPA Helmholtz Center for Information Security), Qinying Wang (Zhejiang University), Nils Langius (Leibniz Universität Hannover), Li Shi (ETH Zurich), Ali Abbasi (CISPA Helmholtz Center for Information Security), Thorsten Holz (CISPA Helmholtz Center for Information Security)
Read More