Vijay k. Gurbani and Cynthia Hood ( Illinois Institute of Technology), Anita Nikolich (University of Illinois), Henning Schulzrinne (Columbia University) and Radu State (University of Luxembourg)
When DNS Goes Dark: Understanding Privacy and Shaping Policy of an Evolving Protocol
View More Papers
Time-Based CAN Intrusion Detection Benchmark
Deborah Blevins (University of Kentucky), Pablo Moriano, Robert Bridges, Miki Verma, Michael Iannacone, and Samuel Hollifield (Oak Ridge National Laboratory)
Read MoreYour Phone is My Proxy: Detecting and Understanding Mobile...
Xianghang Mi (University at Buffalo), Siyuan Tang (Indiana University Bloomington), Zhengyi Li (Indiana University Bloomington), Xiaojing Liao (Indiana University Bloomington), Feng Qian (University of Minnesota Twin Cities), XiaoFeng Wang (Indiana University Bloomington)
Read MoreEmilia: Catching Iago in Legacy Code
Rongzhen Cui (University of Toronto), Lianying Zhao (Carleton University), David Lie (University of Toronto)
Read MoreUIScope: Accurate, Instrumentation-free, and Visible Attack Investigation for GUI...
Runqing Yang (Zhejiang University), Shiqing Ma (Rutgers University), Haitao Xu (Arizona State University), Xiangyu Zhang (Purdue University), Yan Chen (Northwestern University)
Read More