Chris Fennell (Walmart)
Evaluating the Impact of Cybersecurity Training: Exploring the Utility of Behavior Intentions and Security Best Practices
View More Papers
Compiled Models, Built-In Exploits: Uncovering Pervasive Bit-Flip Attack Surfaces...
Yanzuo Chen (The Hong Kong University of Science and Technology), Zhibo Liu (The Hong Kong University of Science and Technology), Yuanyuan Yuan (The Hong Kong University of Science and Technology), Sihang Hu (Huawei Technologies), Tianxiang Li (Huawei Technologies), Shuai Wang (The Hong Kong University of Science and Technology)
Read MoreCounterSEVeillance: Performance-Counter Attacks on AMD SEV-SNP
Stefan Gast (Graz University of Technology), Hannes Weissteiner (Graz University of Technology), Robin Leander Schröder (Fraunhofer SIT, Darmstadt, Germany and Fraunhofer Austria, Vienna, Austria), Daniel Gruss (Graz University of Technology)
Read MoreTweezers: A Framework for Security Event Detection via Event...
Jian Cui (Indiana University), Hanna Kim (KAIST), Eugene Jang (S2W Inc.), Dayeon Yim (S2W Inc.), Kicheol Kim (S2W Inc.), Yongjae Lee (S2W Inc.), Jin-Woo Chung (S2W Inc.), Seungwon Shin (KAIST), Xiaojing Liao (Indiana University)
Read MoreDUMPLING: Fine-grained Differential JavaScript Engine Fuzzing
Liam Wachter (EPFL), Julian Gremminger (EPFL), Christian Wressnegger (Karlsruhe Institute of Technology (KIT)), Mathias Payer (EPFL), Flavio Toffalini (EPFL)
Read More