Caleb Helbling, Graham Leach-Krouse, Sam Lasser, Greg Sullivan (Draper)
cozy: Comparative Symbolic Execution for Binary Programs
View More Papers
Logical Maneuvers: Detecting and Mitigating Adversarial Hardware Faults in...
Fatemeh Khojasteh Dana, Saleh Khalaj Monfared, Shahin Tajik (Worcester Polytechnic Institute)
Read MoreOn the Realism of LiDAR Spoofing Attacks against Autonomous...
Takami Sato (University of California, Irvine), Ryo Suzuki (Keio University), Yuki Hayakawa (Keio University), Kazuma Ikeda (Keio University), Ozora Sako (Keio University), Rokuto Nagata (Keio University), Ryo Yoshida (Keio University), Qi Alfred Chen (University of California, Irvine), Kentaro Yoshioka (Keio University)
Read MoreThe Road to Trust: Building Enclaves within Confidential VMs
Wenhao Wang (Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, CAS), Linke Song (Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, CAS), Benshan Mei (Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, CAS), Shuang Liu (Ant Group), Shijun Zhao (Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering,…
Read MoreA Systematic Evaluation of Novel and Existing Cache Side...
Fabian Rauscher (Graz University of Technology), Carina Fiedler (Graz University of Technology), Andreas Kogler (Graz University of Technology), Daniel Gruss (Graz University of Technology)
Read More