Lingzhi Wang (Northwestern University)
Tutorial: Using Aurora, an automated attack emulation system, to create benchmark datasets for intrusion detection
View More Papers
Binary Analysis: An AI Success Story
Perri Adams, Dartmouth College ISTS Fellow & John Hopkins SAIS Adjunct Professor
Read MoreReFuzz: Reusing Tests for Processor Fuzzing with Contextual Bandits
Chen Chen (Texas A&M University, USA), Zaiyan Xu (Texas A&M University, USA), Mohamadreza Rostami (Technische Universitat Darmstadt, Germany), David Liu (Texas A&M University, USA), Dileep Kalathil (Texas A&M University, USA), Ahmad-Reza Sadeghi (Technische Universitat Darmstadt, Germany), Jeyavijayan (JV) Rajendran (Texas A&M University, USA)
Read MoreDSEF: DNS Synthetic Traffic Evaluation Framework
Jihye Kim (Research Institute CODE, University of the Bundeswehr Munich)
Read More