Fatemeh Mireshghallah
How Much Can We Trust Large Language Models?
View More Papers
Access Your Tesla without Your Awareness: Compromising Keyless Entry...
Xinyi Xie (Shanghai Fudan Microelectronics Group Co., Ltd.), Kun Jiang (Shanghai Fudan Microelectronics Group Co., Ltd.), Rui Dai (Shanghai Fudan Microelectronics Group Co., Ltd.), Jun Lu (Shanghai Fudan Microelectronics Group Co., Ltd.), Lihui Wang (Shanghai Fudan Microelectronics Group Co., Ltd.), Qing Li (State Key Laboratory of ASIC & System, Fudan University), Jun Yu (State Key…
Read MoreMyTEE: Own the Trusted Execution Environment on Embedded Devices
Seungkyun Han (Chungnam National University), Jinsoo Jang (Chungnam National University)
Read MoreCANtropy: Time Series Feature Extraction-Based Intrusion Detection Systems for...
Md Hasan Shahriar, Wenjing Lou, Y. Thomas Hou (Virginia Polytechnic Institute and State University)
Read MoreTowards Protecting Billions and Billions of Bits on the...
Stephen Herwig (William & Mary)
Read More