Hyungsub Kim (Purdue University), Muslum Ozgur Ozmen (Purdue University), Antonio Bianchi (Purdue University), Z. Berkay Celik (Purdue University) and Dongyan Xu (Purdue University)
Demo #2: Policy-based Discovery and Patching of Logic Bugs in Robotic Vehicles
View More Papers
Characterizing the Adoption of Security.txt Files and their Applications...
William Findlay (Carleton University) and AbdelRahman Abdou (Carleton University)
Read MoreF-PKI: Enabling Innovation and Trust Flexibility in the HTTPS...
Laurent Chuat (ETH Zurich), Cyrill Krähenbühl (ETH Zürich), Prateek Mittal (Princeton University), Adrian Perrig (ETH Zurich)
Read MoreProvTalk: Towards Interpretable Multi-level Provenance Analysis in Networking Functions...
Azadeh Tabiban (CIISE, Concordia University, Montreal, QC, Canada), Heyang Zhao (CIISE, Concordia University, Montreal, QC, Canada), Yosr Jarraya (Ericsson Security Research, Ericsson Canada, Montreal, QC, Canada), Makan Pourzandi (Ericsson Security Research, Ericsson Canada, Montreal, QC, Canada), Mengyuan Zhang (Department of Computing, The Hong Kong Polytechnic University, China), Lingyu Wang (CIISE, Concordia University, Montreal, QC, Canada)
Read MoreChhoyhopper: A Moving Target Defense with IPv6
A S M Rizvi (University of Southern California/Information Sciences Institute) and John Heidemann (University of Southern California/Information Sciences Institute)
Read More