Zero-click attacks require no user interaction and typically exploit zer...
Embedded and Internet-of-Things (IoT) devices have seen an increase in
a...
Emerging blockchain and cryptocurrency-based technologies are redefining...
Microcontroller-based embedded devices are at the core of Internet-of-Th...
The prevalence of memory corruption bugs in the past decades resulted in...
Contemporary fuzz testing techniques focus on identifying memory corrupt...
Web cache deception (WCD) is an attack proposed in 2017, where an attack...
In a smart home system, multiple users have access to multiple devices,
...
We present an empirical and large-scale analysis of malware samples capt...
Web developers routinely rely on third-party Java-Script libraries such ...
Relative Path Overwrite (RPO) is a recent technique to inject style
dire...
Control flow integrity (CFI) has received significant attention in the
c...