Understanding the Privacy Practices of Political Campaigns: A Perspective from the 2020 US Election WebsitesKaushal KaflePrianka Mandalet al.2024S&P 2024
Understanding and Bridging the Gap Between Unsupervised Network Representation Learning and Security AnalyticsJiacen XuXiaokui Shuet al.2024S&P 2024
SyzGen++: Dependency Inference for Augmenting Kernel Driver FuzzingWeiteng ChenYu Haoet al.2024S&P 2024
Standardization of Cryptography Bill of Materials in OWASP CycloneDXBasil HessNicklas Körtge2024ETSI/IQC QSC 2024
A Lightweight Method for Tackling Unknown Participation Statistics in Federated AveragingShiqiang WangMingyue Ji2024ICLR 2024
STRonG: System Topology Risk Analysis on GraphsLars SchneidenbachSandhya Koteshwaraet al.2024CCGrid 2024
Cutting the GRASS: Threshold GRoup Action Signature SchemesGiacomo BorinEdoardo Persichettiet al.2024RSAC 2024
Using automation to mitigate risk and enforce policy complianceMatthew JonesYuji Watanabeet al.2024Red Hat Summit 2024