Star 0
Month Quarter Year
#N/A #N/A #N/A
Title Event
Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks 40th IEEE Symposium on Security and Privacy
MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense ACM CCS 2018
Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop 38th IEEE Symposium on Security and Privacy
Talking Behind Your Back: Attacks and Countermeasures of Ultrasonic Cross-Device Tracking Black Hat Europe 2016
Cyber Grand Shellphish DEF CON 24
Samsung Pay: Tokenized Numbers, Flaws and Issues DEF CON 24
TriggerScope: Towards Detecting Logic Bombs in Android Applications 37th IEEE Symposium on Security and Privacy
SoK: (State of) The Art of War: Offensive Techniques in Binary Analysis 37th IEEE Symposium on Security and Privacy
Dark side of the ELF - leveraging dynamic loading to pwn noobs DEF CON 23
Angry Hacking - the next generation of binary analysis DEF CON 23