Tariq Elahi
Ensuring Safety and Facilitating Research on the Live Tor Network
View More Papers
Extrapolating Formal Analysis to Uncover Attacks in Bluetooth Passkey...
Mohit Kumar Jangid (The Ohio State University), Yue Zhang (Computer Science & Engineering, Ohio State University), Zhiqiang Lin (The Ohio State University)
Read MoreOBSan: An Out-Of-Bound Sanitizer to Harden DNN Executables
Yanzuo Chen (The Hong Kong University of Science and Technology), Yuanyuan Yuan (The Hong Kong University of Science and Technology), Shuai Wang (The Hong Kong University of Science and Technology)
Read MoreLocation Spoofing Attacks on Autonomous Fleets
Jinghan Yang, Andew Estornell, Yevgeniy Vorobeychik (Washington University in St. Louis)
Read MoreBackdoor Attacks Against Dataset Distillation
Yugeng Liu (CISPA Helmholtz Center for Information Security), Zheng Li (CISPA Helmholtz Center for Information Security), Michael Backes (CISPA Helmholtz Center for Information Security), Yun Shen (Netapp), Yang Zhang (CISPA Helmholtz Center for Information Security)
Read More