Tristan Bilot (University of British Columbia)
Tutorial: Accelerating Provenance-based Intrusion Detection Research with PIDSMaker
View More Papers
NEXUS: Towards Accurate and Scalable Mapping between Vulnerabilities and...
Ehsan Khodayarseresht (Concordia University), Suryadipta Majumdar (Concordia University), Serguei Mokhov (Concordia University), Mourad Debbabi (Concordia University)
Read MorePhantomMap: GPU-Assisted Kernel Exploitation
Jiayi Hu (Zhejiang University), Qi Tang (Jilin University), Xingkai Wang (Zhejiang University), Jinmeng Zhou (Zhejiang University), Rui Chang (Zhejiang University), Wenbo Shen (Zhejiang University)
Read MoreWhat Are Brands Telling You About Smishing? A Cross-Industry...
Dev Vikesh Doshi (California State University San Marcos), Mehjabeen Tasnim (California State University San Marcos), Fernando Landeros (California State University San Marcos), Chinthagumpala Muni Venkatesh (California State University San Marcos), Daniel Timko (Emerging Threats Lab / Smishtank.com), Muhammad Lutfor Rahman (California State University San Marcos)
Read More