Lingzhi Wang (Northwestern University)
Tutorial: Using Aurora, an automated attack emulation system, to create benchmark datasets for intrusion detection
View More Papers
“NLIP: A Natural Language Approach to Securing IoT Devices”
Sanjay Aiyagari, Senior Principal Chief Architect, Red Hat
Read MoreIdentifying Microcontroller Architecture Through Static Analysis of Firmware Binaries
David Malaschonok (Fraunhofer SIT — ATHENE)
Read MoreThe Things That Count: Coverage Evaluation Under the Microscope...
Tobias Holl (Ruhr University Bochum), Leon Weiß (Ruhr University Bochum), Kevin Borgolte (Ruhr University Bochum)
Read More