Dairo de Ruck, Jef Jacobs, Jorn Lapon, Vincent Naessens (DistriNet, KU Leuven, 3001 Leuven, Belgium)
dAngr: Lifting Software Debugging to a Symbolic Level
View More Papers
From Observations to Insights: Constructing Effective Cyberattack Provenance with...
Anis Yusof (NU Singapore)
Read MoreWork-in-Progress: Uncovering Dark Patterns: A Longitudinal Study of Cookie...
Zihan Qu (Johns Hopkins University), Xinyi Qu (University College London), Xin Shen, Zhen Liang, and Jianjia Yu (Johns Hopkins University)
Read MoreSymbolic Path Tracing to Find Android Permission-Use Triggers
Kristopher Micinski (Haverford College), Thomas Gilray (University of Alabama, Birmingham), Daniel Votipka (University of Maryland), Michelle L. Mazurek (University of Maryland), Jeffrey S. Foster (Tufts University)
Read MoreDetection-as-Code: Build threat detections the way you build software
Cherlynn Cha (ExpressVPN)
Read More