Wes Hardaker (USC)
To understand anomalies, you must first understand your past
View More Papers
Onion Franking: Abuse Reports for Mix-Based Private Messaging
Matthew Gregoire (University of North Carolina at Chapel Hill), Margaret Pierce (University of North Carolina at Chapel Hill), Saba Eskandarian (University of North Carolina at Chapel Hill)
Read MoreHitchhiking Vaccine: Enhancing Botnet Remediation With Remote Code Deployment...
Runze Zhang (Georgia Institute of Technology), Mingxuan Yao (Georgia Institute of Technology), Haichuan Xu (Georgia Institute of Technology), Omar Alrawi (Georgia Institute of Technology), Jeman Park (Kyung Hee University), Brendan Saltaformaggio (Georgia Institute of Technology)
Read MoreMismatched SOCs: A Case Study of Cybersecurity Goal Incongruency...
Andrew Morin (University of Tulsa)
Read MoreRethink Custom Transformers for Binary Analysis
Heng Yin, Professor, Department of Computer Science and Engineering, University of California, Riverside
Read More