Hyungsub Kim (Purdue University), Muslum Ozgur Ozmen (Purdue University), Antonio Bianchi (Purdue University), Z. Berkay Celik (Purdue University) and Dongyan Xu (Purdue University)
Demo #2: Policy-based Discovery and Patching of Logic Bugs in Robotic Vehicles
View More Papers
Multi-Certificate Attacks against Proof-of-Elapsed-Time and Their Countermeasures
Huibo Wang (Baidu Security), Guoxing Chen (Shanghai Jiao Tong University), Yinqian Zhang (Southern University of Science and Technology), Zhiqiang Lin (Ohio State University)
Read MoreDenial-of-Service Attacks on C-V2X Networks
Natasa Trkulja, David Starobinski (Boston University), and Randall Berry (Northwestern University)
Read MoreSpeeding Dumbo: Pushing Asynchronous BFT Closer to Practice
Bingyong Guo (Institute of Software, Chinese Academy of Sciences), Yuan Lu (Institute of Software Chinese Academy of Sciences), Zhenliang Lu (The University of Sydney), Qiang Tang (The University of Sydney), jing xu (Institute of Software, Chinese Academy of Sciences), Zhenfeng Zhang (Institute of Software, Chinese Academy of Sciences)
Read MoreDemo #11: Understanding the Effects of Paint Colors on...
Shaik Sabiha (University at Buffalo), Keyan Guo (University at Buffalo), Foad Hajiaghajani (University at Buffalo), Chunming Qiao (University at Buffalo), Hongxin Hu (University at Buffalo) and Ziming Zhao (University at Buffalo)
Read More