Media Summary: What IF Is Not Enough? Fixing Null Pointer Dereference With Contextual Check Yunlong Xing, Shu Wang, Shiyu Sun, Xu He, and ... Your Firmware Has Arrived: A Study of Firmware Update Vulnerabilities Yuhao Wu, Jinwen Wang, Yujie Wang, Shixuan Zhai, and ... MetaSafe: Compiling for Protecting Smart Pointer Metadata to Ensure Safe Rust Integrity Martin Kayondo and Inyoung Bang, ...
Usenix Security 24 Voodoo Memory Tagging Authenticated Encryption And Error Correction - Detailed Analysis & Overview
What IF Is Not Enough? Fixing Null Pointer Dereference With Contextual Check Yunlong Xing, Shu Wang, Shiyu Sun, Xu He, and ... Your Firmware Has Arrived: A Study of Firmware Update Vulnerabilities Yuhao Wu, Jinwen Wang, Yujie Wang, Shixuan Zhai, and ... MetaSafe: Compiling for Protecting Smart Pointer Metadata to Ensure Safe Rust Integrity Martin Kayondo and Inyoung Bang, ... A Wolf in Sheep's Clothing: Practical Black-box Adversarial Attacks for Evading Learning-based Windows Malware Detection in ... Can Virtual Reality Protect Users from Keystroke Inference Attacks? Zhuolin Yang, Zain Sarwar, Iris Hwang, Ronik Bhaskar, Ben ... EVOKE: Efficient Revocation of Verifiable Credentials in IoT Networks Carlo Mazzocca, University of Bologna; Abbas Acar and ...
Neural Network Semantic Backdoor Detection and Mitigation: A Causality-Based Approach Bing Sun, Jun Sun, and Wayne Koh, ... Uncovering the Limits of Machine Learning for Automatic Vulnerability Detection Niklas Risse and Marcel Böhme, MPI-SP, ... A Linear Reconstruction Approach for Attribute Inference Attacks against Synthetic Data Meenatchi Sundaram Muthu Selva ...