Uncertainty learning and quantification of models are crucial tasks to
e...
Self-supervised learning, or SSL, holds the key to expanding the usage o...
Recently, deep learning models have shown the potential to predict breas...
Fuzzing has gained in popularity for software vulnerability detection by...
Blockchains with smart contracts are distributed ledger systems which ac...
Memory-safety bugs introduce critical software-security issues. Rust pro...
The accurate localization of inserted medical tubes and parts of human
a...
Low-volume Denial-of-Service (μDoS) attacks have been demonstrated to
fu...
Since Bitcoin appeared in 2009, over 6,000 different cryptocurrency proj...
Web browsers are integral parts of everyone's daily life. They are commo...
This paper presents an in-kernel, hardware-based control-flow integrity ...
A wide range of binary analysis applications, such as bug discovery, mal...
Global corporations (e.g., Google and Microsoft) have recently introduce...
We present Recipe, a principled approach for converting concurrent DRAM
...
We present SplitFS, a file system for persistent memory (PM) that reduce...
Heap exploitation techniques to abuse the metadata of allocators have be...
Intel memory protection keys (MPK) is a new hardware feature to support
...
Beyond point solutions, the vision of edge computing is to enable web
se...