John Heldreth (ASRG)
Shout-Out for Community Driven Automotive Security
View More Papers
Analyzing and Creating Malicious URLs: A Comparative Study on...
Vincent Drury (IT-Security Research Group, RWTH Aachen University), Rene Roepke (Learning Technologies Research Group, RWTH Aachen University), Ulrik Schroeder (Learning Technologies Research Group, RWTH Aachen University), Ulrike Meyer (IT-Security Research Group, RWTH Aachen University)
Read MoreD-Box: DMA-enabled Compartmentalization for Embedded Applications
Alejandro Mera (Northeastern University), Yi Hui Chen (Northeastern University), Ruimin Sun (Northeastern University), Engin Kirda (Northeastern University), Long Lu (Northeastern University)
Read MorePickMail: A Serious Game for Email Phishing Awareness Training
Gokul CJ (TCS Research, Tata Consultancy Services Ltd., Pune), Vijayanand Banahatti (TCS Research, Tata Consultancy Services Ltd., Pune), Sachin Lodha (TCS Research, Tata Consultancy Services Ltd., Pune)
Read MoreWhat the Fork? Finding and Analyzing Malware in GitHub...
Alan Cao (New York University) and Brendan Dolan-Gavitt (New York University)
Read More