Tristan Bilot (University of British Columbia)
Tutorial: Accelerating Provenance-based Intrusion Detection Research with PIDSMaker
View More Papers
Identifying Logical Vulnerabilities in QUIC Implementations
Kaihua Wang (Tsinghua University), Jianjun Chen (Tsinghua University), Pinji Chen (Tsinghua University), Jianwei Zhuge (Tsinghua University), Jiaju Bai (Beihang University), Haixin Duan (Tsinghua University)
Read MorePrivate Yet Accurate: A Decentralized Approach to System Intrusion...
Jinghan Zhang (University of Virginia), Sharon Biju (University of Virginia), Saleha Muzammil (University of Virginia), Wajih Ul Hassan (University of Virginia)
Read MoreDiscovering Blind-Trust Vulnerabilities in PLC Binaries via State Machine...
Fangzhou Dong (Arizona State University), Arvind S Raj (Arizona State University), Efrén López-Morales (New Mexico State University), Siyu Liu (Arizona State University), Yan Shoshitaishvili (Arizona State University), Tiffany Bao (Arizona State University), Adam Doupé (Arizona State University), Muslum Ozgur Ozmen (Arizona State University), Ruoyu Wang (Arizona State University)
Read More