Michael Kadoshnikov, Clemente Izurieta, Matthew Revelle (Montana State University)
A Comparative Study of Program Graph Effectiveness for Binary Vulnerability Detection
View More Papers
SoK: Understanding the Fundamentals and Implications of Sensor Out-of-band...
Shilin Xiao (Zhejiang University), Wenjun Zhu (Zhejiang University), Yan Jiang (Zhejiang University), Kai Wang (Zhejiang University), Peiwang Wang (Zhejiang University), Chen Yan (Zhejiang University), Xiaoyu Ji (Zhejiang University), Wenyuan Xu (Zhejiang University)
Read MoreTutorial: Accelerating Provenance-based Intrusion Detection Research with PIDSMaker
Tristan Bilot (University of British Columbia)
Read MoreUser-Space Dependency-Aware Rehosting for Linux-Based Firmware Binaries
Chuan Qin (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences; Nanyang Technological University), Cen Zhang (Nanyang Technological University), Yaowen Zheng (Institute of Information Engineering, Chinese Acadamy of Sciences), Puzhuo Liu (Ant Group; Tsinghua University), Jian Zhang (Nanyang Technological University), Yeting Li (Institute of Information Engineering,…
Read More