Cherlynn Cha (ExpressVPN)
Detection-as-Code: Build threat detections the way you build software
View More Papers
Modeling End-User Affective Discomfort With Mobile App Permissions Across...
Yuxi Wu (Georgia Institute of Technology and Northeastern University), Jacob Logas (Georgia Institute of Technology), Devansh Ponda (Georgia Institute of Technology), Julia Haines (Google), Jiaming Li (Google), Jeffrey Nichols (Apple), W. Keith Edwards (Georgia Institute of Technology), Sauvik Das (Carnegie Mellon University)
Read MoreEvaluating Machine Learning-Based IoT Device Identification Models for Security...
Eman Maali (Imperial College London), Omar Alrawi (Georgia Institute of Technology), Julie McCann (Imperial College London)
Read MoredAngr: Lifting Software Debugging to a Symbolic Level
Dairo de Ruck, Jef Jacobs, Jorn Lapon, Vincent Naessens (DistriNet, KU Leuven, 3001 Leuven, Belgium)
Read MoreHitchhiking Vaccine: Enhancing Botnet Remediation With Remote Code Deployment...
Runze Zhang (Georgia Institute of Technology), Mingxuan Yao (Georgia Institute of Technology), Haichuan Xu (Georgia Institute of Technology), Omar Alrawi (Georgia Institute of Technology), Jeman Park (Kyung Hee University), Brendan Saltaformaggio (Georgia Institute of Technology)
Read More