Tariq Elahi
Ensuring Safety and Facilitating Research on the Live Tor Network
View More Papers
VulHawk: Cross-architecture Vulnerability Detection with Entropy-based Binary Code Search
Zhenhao Luo (College of Computer, National University of Defense Technology), Pengfei Wang (College of Computer, National University of Defense Technology), Baosheng Wang (College of Computer, National University of Defense Technology), Yong Tang (College of Computer, National University of Defense Technology), Wei Xie (College of Computer, National University of Defense Technology), Xu Zhou (College of Computer,…
Read MorePrivacy-Preserving Database Fingerprinting
Tianxi Ji (Texas Tech University), Erman Ayday (Case Western Reserve University), Emre Yilmaz (University of Houston-Downtown), Ming Li (CSE Department The University of Texas at Arlington), Pan Li (Case Western Reserve University)
Read MoreThe Vulnerabilities Less Exploited: Cyberattacks on End-of-Life Satellites
Frank Lee and Gregory Falco (Johns Hopkins University) Presenter: Frank Lee
Read MoreChargePrint: A Framework for Internet-Scale Discovery and Security Analysis...
Tony Nasr (Concordia University), Sadegh Torabi (George Mason University), Elias Bou-Harb (University of Texas at San Antonio), Claude Fachkha (University of Dubai), Chadi Assi (Concordia University)
Read More