Michael Kadoshnikov, Clemente Izurieta, Matthew Revelle (Montana State University)
A Comparative Study of Program Graph Effectiveness for Binary Vulnerability Detection
View More Papers
XR Devices Send WiFi Packets When They Should Not:...
Christopher Vattheuer (UCLA), Justin Feng (UCLA), Hossein Khalili (UCLA), Nader Sehatbakhsh (UCLA), Omid Abari (UCLA)
Read MoreUnveiling BYOVD Threats: Malware's Use and Abuse of Kernel...
Andrea Monzani (University of Milan), Antonio Parata (University of Milan), Andrea Oliveri (EURECOM), Simone Aonzo (EURECOM), Davide Balzarotti (EURECOM), Andrea Lanzi (University of Milan)
Read MoreMVPNalyzer: An Investigative Framework for Auditing the Security &...
Wayne Wang (University of Michigan), Aaron Ortwein (University of Michigan), Enrique Sobrados (University of New Mexico), Robert Stanley (University of Michigan), Piyush Kumar Sharma (IIT Delhi), Afsah Anwar (University of New Mexico), Roya Ensafi (University of Michigan)
Read More