Jason Liu, Muhammad Adil Inam, Akul Goyal, Dylen Greenenwald (University of Illinois at Urbana-Champaign), Saurav Chittal (Purdue University), Adam Bates (University of Illinois at Urbana-Champaign)
How to Effectively Trace Provenance on Windows Endpoint Detection & Response Telemetry
View More Papers
NetCap: Data-Plane Capability-Based Defense Against Token Theft in Network...
Osama Bajaber (Virginia Tech), Bo Ji (Virginia Tech), Peng Gao (Virginia Tech)
Read MorePrivATE: Differentially Private Average Treatment Effect Estimation for Observational...
Quan Yuan (Zhejiang University), Xiaochen Li (University of North Carolina at Greensboro), Linkang Du (Xi'an Jiaotong University), Min Chen (Vrije Universiteit Amsterdam), Mingyang Sun (Peking University), Yunjun Gao (Zhejiang University), Shibo He (Zhejiang University), Jiming Chen (Zhejiang University), Zhikun Zhang (Zhejiang University)
Read MoreAnota: Identifying Business Logic Vulnerabilities via Annotation-Based Sanitization
Meng Wang (CISPA Helmholtz Center for Information Security), Philipp Görz (CISPA Helmholtz Center for Information Security), Joschua Schilling (CISPA Helmholtz Center for Information Security), Keno Hassler (CISPA Helmholtz Center for Information Security), Liwei Guo (University of Electronic Science and Technology), Thorsten Holz (Max Planck Institute for Security and Privacy), Ali Abbasi (CISPA Helmholtz Center for…
Read More