Penetration Testing Learning Kit
Retrofitting Legacy Code for Authorization Policy Enforcement Vinod Ganapathy [email protected] Trent Jaeger [email protected] Somesh Jha [email protected].
Sparse Representations for Packetized Predictive Networked Control
Handout1o
Toward 0-norm Reconstruction, and A Nullspace Technique for Compressive Sampling Christine Law Gary Glover Dept. of EE, Dept. of Radiology Stanford University.
Locating Prefix Hijackers using LOCK Tongqing Qiu +, Lusheng Ji *, Dan Pei * Jia Wang *, Jun (Jim) Xu +, Hitesh Ballani ++ + College of Computing, Georgia.
Quantifying Location Privacy: The Case of Sporadic Location Exposure Reza Shokri George Theodorakopoulos George Danezis Jean-Pierre Hubaux Jean-Yves Le.
The Impact of Programming Language Theory on Computer Security Drew Dean Computer Science Laboratory SRI International.
Considerations and Pitfalls for Conducting Intrusion Detection Research Vern Paxson International Computer Science Institute and Lawrence Berkeley National.
Weakly Coupled Oscillators
A Framework for Distributed Anonymous Data Collection and Feedback Max TimchenkoAri Trachtenberg Poster: ACM Systor 2015 IEEE S&P 2015 (Oakland)