Seyed Ali Ghazi Asgar, Narasimha Reddy (Texas A&M University)
Analysis of Misconfigured IoT MQTT Deployments and a Lightweight Exposure Detection System
View More Papers
PQConnect: Automated Post-Quantum End-to-End Tunnels
Daniel J. Bernstein (University of Illinois at Chicago and Academia Sinica), Tanja Lange (Eindhoven University of Technology amd Academia Sinica), Jonathan Levin (Academia Sinica and Eindhoven University of Technology), Bo-Yin Yang (Academia Sinica)
Read MoreOnion Franking: Abuse Reports for Mix-Based Private Messaging
Matthew Gregoire (University of North Carolina at Chapel Hill), Margaret Pierce (University of North Carolina at Chapel Hill), Saba Eskandarian (University of North Carolina at Chapel Hill)
Read MoreThe Road to Trust: Building Enclaves within Confidential VMs
Wenhao Wang (Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, CAS), Linke Song (Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, CAS), Benshan Mei (Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, CAS), Shuang Liu (Ant Group), Shijun Zhao (Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering,…
Read MoreDo (Not) Follow the White Rabbit: Challenging the Myth...
Soheil Khodayari (CISPA Helmholtz Center for Information Security), Kai Glauber (Saarland University), Giancarlo Pellegrino (CISPA Helmholtz Center for Information Security)
Read More