Daniel Kahn Gillmor (ACLU)
Keynote: Armor for the back half of the camel: Why confidentiality matters for recursive DNS traffic
View More Papers
WINNIE : Fuzzing Windows Applications with Harness Synthesis and...
Jinho Jung (Georgia Institute of Technology), Stephen Tong (Georgia Institute of Technology), Hong Hu (Pennsylvania State University), Jungwon Lim (Georgia Institute of Technology), Yonghwi Jin (Georgia Institute of Technology), Taesoo Kim (Georgia Institute of Technology)
Read MoreYour Phone is My Proxy: Detecting and Understanding Mobile...
Xianghang Mi (University at Buffalo), Siyuan Tang (Indiana University Bloomington), Zhengyi Li (Indiana University Bloomington), Xiaojing Liao (Indiana University Bloomington), Feng Qian (University of Minnesota Twin Cities), XiaoFeng Wang (Indiana University Bloomington)
Read More(Short) Fooling Perception via Location: A Case of Region-of-Interest...
Kanglan Tang, Junjie Shen, and Qi Alfred Chen (UC Irvine)
Read MoreZoom on the Keystrokes: Exploiting Video Calls for Keystroke...
Mohd Sabra (University of Texas at San Antonio), Anindya Maiti (University of Oklahoma), Murtuza Jadliwala (University of Texas at San Antonio)
Read More