Fatemeh Mireshghallah
How Much Can We Trust Large Language Models?
View More Papers
Ghost Domain Reloaded: Vulnerable Links in Domain Name Delegation...
Xiang Li (Tsinghua University), Baojun Liu (Tsinghua University), Xuesong Bai (University of California, Irvine), Mingming Zhang (Tsinghua University), Qifan Zhang (University of California, Irvine), Zhou Li (University of California, Irvine), Haixin Duan (Tsinghua University; QI-ANXIN Technology Research Institute; Zhongguancun Laboratory), Qi Li (Tsinghua University; Zhongguancun Laboratory)
Read MoreExploiting Transport Protocol Vulnerabilities in SAE J1939 Networks
Rik Chatterjee, Subhojeet Mukherjee, Jeremy Daily (Colorado State University)
Read MoreA Case Study on Fuzzing Satellite Firmware
Tobias Scharnowski and Felix Buchmann (Ruhr-Universitat Bochum), Simon Woerner and Thorsten Holz (CISPA Helmholtz Center for Information Security) Presenter: Tobias Scharnowski
Read MoreLet Me Unwind That For You: Exceptions to Backward-Edge...
Victor Duta (Vrije Universiteit Amsterdam), Fabian Freyer (University of California San Diego), Fabio Pagani (University of California, Santa Barbara), Marius Muench (Vrije Universiteit Amsterdam), Cristiano Giuffrida (Vrije Universiteit Amsterdam)
Read More