Caleb Helbling, Graham Leach-Krouse, Sam Lasser, Greg Sullivan (Draper)
cozy: Comparative Symbolic Execution for Binary Programs
View More Papers
RContainer: A Secure Container Architecture through Extending ARM CCA...
Qihang Zhou (Institute of Information Engineering,Chinese Academy of Sciences), Wenzhuo Cao (Institute of Information Engineering,Chinese Academy of Sciences;School of Cyberspace Security, University of Chinese Academy of Sciences), Xiaoqi Jia (Institute of Information Engineering,Chinese Academy of Sciences), Peng Liu (The Pennsylvania State University, USA), Shengzhi Zhang (Department of Computer Science, Metropolitan College, Boston University, USA), Jiayun…
Read MoreCellular Metasploit
Dr. Yongdae Kim, Director, KAIST Chair Professor, Electrical Engineering and GSIS, KAIST
Read MoreProvGuard: Detecting SDN Control Policy Manipulation via Contextual Semantics...
Ziwen Liu (Beihang University), Jian Mao (Beihang University; Tianmushan Laboratory; Hangzhou Innovation Institute, Beihang University), Jun Zeng (National University of Singapore), Jiawei Li (Beihang University; National University of Singapore), Qixiao Lin (Beihang University), Jiahao Liu (National University of Singapore), Jianwei Zhuge (Tsinghua University; Zhongguancun Laboratory), Zhenkai Liang (National University of Singapore)
Read MoreABElity: Attribute Based Encryption for Securing RIC Communication in...
K Sowjanya (Indian Institute of Technology Delhi), Rahul Saini (Eindhoven University of Technology), Dhiman Saha (Indian Institute of Technology Bhilai), Kishor Joshi (Eindhoven University of Technology), Madhurima Das (Indian Institute of Technology Delhi)
Read More