Tariq Elahi
Ensuring Safety and Facilitating Research on the Live Tor Network
View More Papers
VulHawk: Cross-architecture Vulnerability Detection with Entropy-based Binary Code Search
Zhenhao Luo (College of Computer, National University of Defense Technology), Pengfei Wang (College of Computer, National University of Defense Technology), Baosheng Wang (College of Computer, National University of Defense Technology), Yong Tang (College of Computer, National University of Defense Technology), Wei Xie (College of Computer, National University of Defense Technology), Xu Zhou (College of Computer,…
Read MoreWhy do Internet Devices Remain Vulnerable? A Survey with...
Tamara Bondar, Hala Assal, AbdelRahman Abdou (Carleton University)
Read MoreAutomatic Retrieval of Privacy Factors from IoMT Policies: ML...
Nyteisha Bookert, Mohd Anwar (North Carolina Agricultural and Technical State University)
Read MoreOptRand: Optimistically Responsive Reconfigurable Distributed Randomness
Adithya Bhat (Purdue University), Nibesh Shrestha (Rochester Institute of Technology), Aniket Kate (Purdue University), Kartik Nayak (Duke University)
Read More