
-
Measurement-driven Security Analysis of Imperceptible Impersonation Attacks
The emergence of Internet of Things (IoT) brings about new security chal...
read it
-
Connecting the Dots: Detecting Adversarial Perturbations Using Context Inconsistency
There has been a recent surge in research on adversarial perturbations t...
read it
-
SPECCFI: Mitigating Spectre Attacks using CFI Informed Speculation
Spectre attacks and their many subsequent variants are a new vulnerabili...
read it
-
SynFuzz: Efficient Concolic Execution via Branch Condition Synthesis
Concolic execution is a powerful program analysis technique for explorin...
read it
-
IoTSan: Fortifying the Safety of IoT Systems
Today's IoT systems include event-driven smart applications (apps) that ...
read it
-
SPX: Preserving End-to-End Security for Edge Computing
Beyond point solutions, the vision of edge computing is to enable web se...
read it
-
Spectre Returns! Speculation Attacks using the Return Stack Buffer
The recent Spectre attacks exploit speculative execution, a pervasively ...
read it
-
Adversarial Perturbations Against Real-Time Video Classification Systems
Recent research has demonstrated the brittleness of machine learning sys...
read it
-
SafeSpec: Banishing the Spectre of a Meltdown with Leakage-Free Speculation
Speculative execution which is used pervasively in modern CPUs can leave...
read it