Fatemeh Mireshghallah
How Much Can We Trust Large Language Models?
View More Papers
Evaluating Wireless Attacks Against CCS Electric Vehicle Charging
Sebastian Köhler (University of Oxford)
Read MoreDiffCSP: Finding Browser Bugs in Content Security Policy Enforcement...
Seongil Wi (KAIST), Trung Tin Nguyen (CISPA Helmholtz Center for Information Security, Saarland University), Jihwan Kim (KAIST), Ben Stock (CISPA Helmholtz Center for Information Security), Sooel Son (KAIST)
Read MoreAccess Your Tesla without Your Awareness: Compromising Keyless Entry...
Xinyi Xie (Shanghai Fudan Microelectronics Group Co., Ltd.), Kun Jiang (Shanghai Fudan Microelectronics Group Co., Ltd.), Rui Dai (Shanghai Fudan Microelectronics Group Co., Ltd.), Jun Lu (Shanghai Fudan Microelectronics Group Co., Ltd.), Lihui Wang (Shanghai Fudan Microelectronics Group Co., Ltd.), Qing Li (State Key Laboratory of ASIC & System, Fudan University), Jun Yu (State Key…
Read More