Andrew Fasano, Zachary Estrada, Luke Craig, Ben Levy, Jordan McLeod, Jacques Becker, Elysia Witham, Cole DiLorenzo, Caden Kline, Ali Bobi (MIT Lincoln Laboratory), Dinko Dermendzhiev (Georgia Institute of Technology), Tim Leek (MIT Lincoln Laboratory), William Robertson (Northeastern University)
Target-Centric Firmware Rehosting with Penguin
View More Papers
Understanding reCAPTCHAv2 via a Large-Scale Live User Study
Andrew Searles (University of California Irvine), Renascence Tarafder Prapty (University of California Irvine), Gene Tsudik (University of California Irvine)
Read MoreHADES Attack: Understanding and Evaluating Manipulation Risks of Email...
Ruixuan Li (Tsinghua University), Chaoyi Lu (Tsinghua University), Baojun Liu (Tsinghua University;Zhongguancun Laboratory), Yunyi Zhang (Tsinghua University), Geng Hong (Fudan University), Haixin Duan (Tsinghua University;Zhongguancun Laboratory), Yanzhong Lin (Coremail Technology Co. Ltd), Qingfeng Pan (Coremail Technology Co. Ltd), Min Yang (Fudan University), Jun Shao (Zhejiang Gongshang University)
Read MoreIris: Dynamic Privacy Preserving Search in Authenticated Chord Peer-to-Peer...
Angeliki Aktypi (University of Oxford), Kasper Rasmussen (University of Oxford)
Read MoreLeakLess: Selective Data Protection against Memory Leakage Attacks for...
Maryam Rostamipoor (Stony Brook University), Seyedhamed Ghavamnia (University of Connecticut), Michalis Polychronakis (Stony Brook University)
Read More