All Stories

  1. Highliner: Enhancing Binary Analysis through NLP-Based Instruction-Level Detection of C++ Inline Functions
  2. Swarm: A Distributed Ledger-based Framework to Enhance Air Traffic Control Security Using ADS-B Protocol
  3. Assessing the Resilience of Automotive Intrusion Detection Systems to Adversarial Manipulation
  4. The Illusion of Randomness: An Empirical Analysis of Address Space Layout Randomization Implementations
  5. You Might Have Known It Earlier: Analyzing the Role of Underground Forums in Threat Intelligence
  6. Lookin' Out My Backdoor! Investigating Backdooring Attacks Against DL-driven Malware Detectors
  7. DJM-CYBER: A Joint Master in Advanced Cybersecurity
  8. Coming of Age
  9. Fraud Detection Under Siege: Practical Poisoning Attacks and Defense Strategies
  10. CANflict
  11. SyML: Guiding Symbolic Execution Toward Vulnerable States Through Pattern Learning
  12. NoSQL Breakdown: A Large-scale Analysis of Misconfigured NoSQL Services
  13. Constrained Concealment Attacks against Reconstruction-based Anomaly Detectors in Industrial Control Systems
  14. Detecting security vulnerabilities in programs for industrial robots
  15. CopyCAN
  16. Security Evaluation of a Banking Fraud Analysis System
  17. SysTaint
  18. Prometheus: Analyzing WebInject-based information stealers
  19. Grab 'n Run
  20. Practical Exploit Generation for Intent Message Vulnerabilities in Android