Pritam Dash, Mehdi Karimibiuki, and Karthik Pattabiraman (University of British Columbia)
Demo #6: Impact of Stealthy Attacks on Autonomous Robotic Vehicle Missions
View More Papers
From Library Portability to Para-rehosting: Natively Executing Microcontroller Software...
Wenqiang Li (State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences; Department of Computer Science, the University of Georgia, USA; School of Cyber Security, University of Chinese Academy of Sciences; Department of Electrical Engineering and Computer Science, the University of Kansas, USA), Le Guan (Department of Computer Science, the University…
Read MoreThe Bluetooth CYBORG: Analysis of the Full Human-Machine Passkey...
Michael Troncoso (Naval Postgraduate School), Britta Hale (Naval Postgraduate School)
Read MoreBringing Balance to the Force: Dynamic Analysis of the...
Abdallah Dawoud (CISPA Helmholtz Center for Information Security), Sven Bugiel (CISPA Helmholtz Center for Information Security)
Read MoreDemo #5: Disclosing the Pringles Syndrome in Tesla FSD...
Zhisheng Hu (Baidu), Shengjian Guo (Baidu) and Kang Li (Baidu)
Read More