Wes Hardaker (USC)
To understand anomalies, you must first understand your past
View More Papers
Inspecting Compiler Optimizations on Mixed Boolean Arithmetic Obfuscation
Rachael Little, Dongpeng Xu (University of New Hampshire)
Read MoreCyber Threat Intelligence for SOC Analysts
Nidhi Rastogi, Md Tanvirul Alam (Rochester Institute of Technology)
Read MoreDecoupling Permission Management from Cryptography for Privacy-Preserving Systems
Ruben De Smet (Department of Engineering Technology (INDI), Department of Electronics and Informatics (ETRO), Vrije Universiteit Brussel), Tom Godden (Department of Engineering Technology (INDI), Vrije Universiteit Brussel), Kris Steenhaut (Department of Engineering Technology (INDI), Department of Electronics and Informatics (ETRO), Vrije Universiteit Brussel), An Braeken (Department of Engineering Technology (INDI), Vrije Universiteit Brussel)
Read MoreStarshields for iOS: Navigating the Security Cosmos in Satellite...
Jiska Classen (Hasso Plattner Institute, University of Potsdam), Alexander Heinrich (TU Darmstadt, Germany), Fabian Portner (TU Darmstadt, Germany), Felix Rohrbach (TU Darmstadt, Germany), Matthias Hollick (TU Darmstadt, Germany)
Read More