Michael Kadoshnikov, Clemente Izurieta, Matthew Revelle (Montana State University)
A Comparative Study of Program Graph Effectiveness for Binary Vulnerability Detection
View More Papers
Beyond the C: Retargetable Decompilation using Neural Machine Translation
Iman Hosseini, Brendan Dolan-Gavitt (NYU)
Read MoreEnhancing Legal Document Security and Accessibility with TAF
Renata Vaderna (Independent Researcher), Dušan Nikolić (University of Novi Sad), Patrick Zielinski (New York University), David Greisen (Open Law Library), BJ Ard (University of Wisconsin–Madison), Justin Cappos (New York University)
Read MoreContinuous User Behavior Monitoring using DNS Cache Timing Attacks
Hannes Weissteiner (Graz University of Technology), Roland Czerny (Graz University of Technology), Simone Franza (Graz University of Technology), Stefan Gast (Graz University of Technology), Johanna Ullrich (University of Vienna), Daniel Gruss (Graz University of Technology)
Read More