Title: Evaluation and Analysis of Timing Leakage in the context of Wireless IoT Microcontrollers
Events
Title: Verifizieren der realen Anwendbarkeit von verbreiteten Bluetooth Sicherheitslücken
Title: Analyzing and Improving Code and Data Integrity in an OS-Level Virtualization Solution
Title: On the Robustness of Active Learning Models against Data Poisoning
Title: Softwaresicherheitsvorkehrungen in der Praxis: Eine Analyse weit verbreiteter Software
Title: Visualization Methods for Adversarial Examples
Title: Augmented Reality Visualization of Attacks on IoT Systems
Title: Rückkopplungsgesteuerte Aktivierungsanalyse
Title: Leveraging Hardware-Assisted TEEs to Protect Host Secrets in an OS-Level Virtualization Environment
Title: Program Slicing on Code Property Graphs
Title: Showing the Absence of Integer Overflows in ARM Binaries by Applying Abstract Interpretation
Title: Life Long Learning on Language Models and its Robustness
Title: Integration of User Interaction into the Analysis of iOS Applications
Title: Applications of Model Checking to Code Property Graphs
Title: Emulating Linux Based IoT Firmware for Empirical Security Analysis
Title: Defending Network Intrusion Detection Systems against Adversarial Machine Learning Attacks
Title: Selective Jamming of Bluetooth
Title: Fault-tolerant Memory Safety with LLVM
Title: Benchmarking Supersingular Isogeny Diffie-Hellman Implementations
Title: Typestate Learning from Code-Property Graph