Archive
2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |
Results
Showing: 251 to 275 of 903Affiliation shown is the affiliation at the time the talk was given.

MPI: Multiple Perspective Attack Investigation with Semantic Aware Execution Partitioning
Shiqing Ma - Purdue University

Enabling Trust and Efficiency in Provenance-Aware Systems
Adam Bates - University of Illinois at Urbana-Champaign

Pushing Computers to the Edge: Next Generation Security and Privacy Controls for Systems and IoT Devices
Ron Ross - National Institute for Standards and Technology (NIST)
SymCerts: Practical Symbolic Execution For Exposing Noncompliance in X.509 Certificate Validation Implementations
Sze Yiu Chau - Purdue University

DataShield: Configurable Data Confidentiality and Integrity
Scott Carr - Purdue University

CIO Risk Appetite and Information Security Management
Tawei (David) Wang - DePaul University

A2C: Self Destructing Exploit Executions via Input Perturbation
Yonghwi Kwon - Purdue University

Behavioral and Computational Aspects of Network Security Games
Ashish Hota - Purdue University

When Side Channel Meets Row Hammer: Cache-Memory Attacks in Clouds and Mobile Devices
Yinqian Zhang - The Ohio State University

The Application of Natural Language Processing to Open Source Intelligence for Ontology Development in the Advanced Persistent Threat Domain
Corey Holzer - Purdue University
Protecting Computer Systems by Eliminating Vulnerabilities
Byoungyoung Lee - Purdue University

Enforcing Least Privilege Memory Views for Multithreaded Applications
Terry Ching-Hsiang Hsu - Purdue University
Ways to Watch
