Ryutaro Nishizaka, Yudai Fujiwara, Takuya Shimizu, Kazushi Kato, Yuichi Sugiyama (Ricerca Security, Inc.)
Towards LLM-Resistant Software Protection: Agent Failure Patterns in CTF Reverse Engineering
View More Papers
Breaking 5G on The Lower Layer
Subangkar Karmaker Shanto (Purdue University), Imtiaz Karim (The University of Texas at Dallas), Elisa Bertino (Purdue University)
Read MorePitfalls for Security Isolation in Multi-CPU Systems
Simeon Hoffmann (CISPA Helmholtz Center for Information Security), Nils Ole Tippenhauer (CISPA Helmholtz Center for Information Security)
Read MoreOne Email, Many Faces: A Deep Dive into Identity...
Mengying Wu (Fudan University, China), Geng Hong (Fudan University, China), Jiatao Chen (Fudan University, China), Baojun Liu (Tsinghua University, China), Mingxuan Liu (Zhongguancun Laboratory, China), Min Yang (Fudan University, China)
Read More