Daniel Kahn Gillmor (ACLU)
Keynote: Armor for the back half of the camel: Why confidentiality matters for recursive DNS traffic
View More Papers
Rosita: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers
Madura A. Shelton (University of Adelaide), Niels Samwel (Radboud University), Lejla Batina (Radboud University), Francesco Regazzoni (University of Amsterdam and ALaRI – USI), Markus Wagner (University of Adelaide), Yuval Yarom (University of Adelaide and Data61)
Read MoreSymQEMU: Compilation-based symbolic execution for binaries
Sebastian Poeplau (EURECOM and Code Intelligence), Aurélien Francillon (EURECOM)
Read MoreHunting the Haunter — Efficient Relational Symbolic Execution for...
Lesly-Ann Daniel (CEA, List, France), Sébastien Bardin (CEA, List, France), Tamara Rezk (Inria, France)
Read More