Daniel Kahn Gillmor (ACLU)
Keynote: Armor for the back half of the camel: Why confidentiality matters for recursive DNS traffic
View More Papers
Time-Based CAN Intrusion Detection Benchmark
Deborah Blevins (University of Kentucky), Pablo Moriano, Robert Bridges, Miki Verma, Michael Iannacone, and Samuel Hollifield (Oak Ridge National Laboratory)
Read MoreCHANCEL: Efficient Multi-client Isolation Under Adversarial Programs
Adil Ahmad (Purdue University), Juhee Kim (Seoul National University), Jaebaek Seo (Google), Insik Shin (KAIST), Pedro Fonseca (Purdue University), Byoungyoung Lee (Seoul National University)
Read MoreSymQEMU: Compilation-based symbolic execution for binaries
Sebastian Poeplau (EURECOM and Code Intelligence), Aurélien Francillon (EURECOM)
Read MoreEvaluating Personal Data Control In Mobile Applications Using Heuristics
Alain Giboin (UCA, INRIA, CNRS, I3S), Karima Boudaoud (UCA, CNRS, I3S), Patrice Pena (Userthink), Yoann Bertrand (UCA, CNRS, I3S), Fabien Gandon (UCA, INRIA, CNRS, I3S)
Read More