Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks |
40th IEEE Symposium on Security and Privacy
|
MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense |
ACM CCS 2018
|
Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop |
38th IEEE Symposium on Security and Privacy
|
Talking Behind Your Back: Attacks and Countermeasures of Ultrasonic Cross-Device Tracking |
Black Hat Europe 2016
|
Cyber Grand Shellphish |
DEF CON 24
|
Samsung Pay: Tokenized Numbers, Flaws and Issues |
DEF CON 24
|
TriggerScope: Towards Detecting Logic Bombs in Android Applications |
37th IEEE Symposium on Security and Privacy
|
SoK: (State of) The Art of War: Offensive Techniques in Binary Analysis |
37th IEEE Symposium on Security and Privacy
|
Dark side of the ELF - leveraging dynamic loading to pwn noobs |
DEF CON 23
|
Angry Hacking - the next generation of binary analysis |
DEF CON 23
|