Star 0
Month Quarter Year
#N/A #N/A #N/A
Title Event
CommSec: Solving The Last Mile Problem Between Machine Learning and Security Operations HITBSecConf2018 – Beijing
VSPMiner: Detecting Security Hazards in SEAndroid Vendor Customizations via Large-Scale Supervised Machine Learning Black Hat Asia 2018
macOS/iOS Kernel Debugging and Heap Feng Shui DEF CON 25
DC to DEF CON: Q&A; with Congressmen James Langevin and Will Hurd DEF CON 25
No Pardon for the Interruption: New Inference Attacks on Android Through Interrupt Timing Analysis 37th IEEE Symposium on Security and Privacy
Acoustic Fingerprinting Revisited: Generate Stable Device ID Stealthy with Inaudible Sound ACM CCS 2014