Daniel Kahn Gillmor (ACLU)
Keynote: Armor for the back half of the camel: Why confidentiality matters for recursive DNS traffic
View More Papers
(Short) WIP: End-to-End Analysis of Adversarial Attacks to Automated...
Hengyi Liang, Ruochen Jiao (Northwestern University), Takami Sato, Junjie Shen, Qi Alfred Chen (UC Irvine), and Qi Zhu (Northwestern University) Best Short Paper Award Winner!
Read MoreSOK: An Evaluation of Quantum Authentication Through Systematic Literature...
Ritajit Majumdar (Indian Statistical Institute), Sanchari Das (University of Denver)
Read MorePyPANDA: Taming the PANDAmonium of Whole System Dynamic Analysis
Luke Craig, Tim Leek (MIT Lincoln Laboratory), Andrew Fasano, Tiemoko Ballo (MIT Lincoln Laboratory, Northeastern University), Brendan Dolan-Gavitt (New York University), William Robertson (Northeastern University)
Read MoreBaseSpec: Comparative Analysis of Baseband Software and Cellular Specifications...
Eunsoo Kim (KAIST), Dongkwan Kim (KAIST), CheolJun Park (KAIST), Insu Yun (KAIST), Yongdae Kim (KAIST)
Read More