Ben Nassi (Ben-Gurion University of the Negev), Elad Feldman (Ben-Gurion University of the Negev), Aviel Levy (Ben-Gurion University of the Negev), Yaron Pirutin (Ben-Gurion University of the Negev), Asaf Shabtai (Ben-Gurion University of the Negev), Ryusuke Masuoka (Fujitsu System Integration Laboratories) and Yuval Elovici (Ben-Gurion University of the Negev)
Demo #8: Identifying Drones Based on Visual Tokens
View More Papers
V-Range: Enabling Secure Ranging in 5G Wireless Networks
Mridula Singh (CISPA - Helmholtz Center for Information Security), Marc Roeschlin (ETH Zurich), Aanjhan Ranganathan (Northeastern University), Srdjan Capkun (ETH Zurich)
Read MoreEuler: Detecting Network Lateral Movement via Scalable Temporal Graph...
Isaiah J. King (The George Washington University), H. Howie Huang (The George Washington University)
Read MoreCANCloak: Deceiving Two ECUs with One Frame
Li Yue, Zheming Li, Tingting Yin, and Chao Zhang (Tsinghua University)
Read MoreRemote Memory-Deduplication Attacks
Martin Schwarzl (Graz University of Technology), Erik Kraft (Graz University of Technology), Moritz Lipp (Graz University of Technology), Daniel Gruss (Graz University of Technology)
Read More