Daniel Kahn Gillmor (ACLU)
Keynote: Armor for the back half of the camel: Why confidentiality matters for recursive DNS traffic
View More Papers
EarArray: Defending against DolphinAttack via Acoustic Attenuation
Guoming Zhang (Zhejiang University), Xiaoyu Ji (Zhejiang University), Xinfeng Li (Zhejiang University), Gang Qu (University of Maryland), Wenyuan Xu (Zhejing University)
Read MoreTime-Based CAN Intrusion Detection Benchmark
Deborah Blevins (University of Kentucky), Pablo Moriano, Robert Bridges, Miki Verma, Michael Iannacone, and Samuel Hollifield (Oak Ridge National Laboratory)
Read MoreMINOS: A Lightweight Real-Time Cryptojacking Detection System
Faraz Naseem (Florida International University), Ahmet Aris (Florida International University), Leonardo Babun (Florida International University), Ege Tekiner (Florida International University), A. Selcuk Uluagac (Florida International University)
Read MoreDinosaur Resurrection: PowerPC Binary Patching for Base Station Analysis
Uwe Muller, Eicke Hauck, Timm Welz, Jiska Classen, Matthias Hollick (Secure Mobile Networking Lab, TU Darmstadt)
Read More