Shaofei Li, Jiandong Jin, Hanlin Jiang, Yi Huang (Peking University), Yifei Bao (Jilin University), Yuhan Meng, Fengwei Hong, Zheng Huang (Peking University), Peng Jiang (Southeast University), Ding Li (Peking University)
SysArmor: The Practice of Integrating Provenance Analysis into Endpoint Detection and Response Systems
View More Papers
SECV: Securing Connected Vehicles with Hardware Trust Anchors
Martin Kayondo (Seoul National University), Junseung You (Seoul National University), Eunmin Kim (Seoul National University), Jiwon Seo (Dankook University), Yunheung Paek (Seoul National University)
Read MoreEnhancing Legal Document Security and Accessibility with TAF
Renata Vaderna (Independent Researcher), Dušan Nikolić (University of Novi Sad), Patrick Zielinski (New York University), David Greisen (Open Law Library), BJ Ard (University of Wisconsin–Madison), Justin Cappos (New York University)
Read MoreIsolatOS: Detecting Double Fetch Bugs in COTS RTOS by...
Yingjie Cao (The Hong Kong Polytechnic University), Xiaogang Zhu (The University of Adelaide), Dean Sullivan (University of New Hampshire), Haowei Yang (360 Security Technology Inc.), Lei Xue (Sun Yat-sen University), Xian Li (Swinburne University of Technology), Chenxiong Qian (University of Hong Kong), Minrui Yan (Swinburne University of Technology), Xiapu Luo (The Hong Kong Polytechnic University)
Read More