diff --git a/index.html b/index.html index 22e792b..2ab0bf4 100644 --- a/index.html +++ b/index.html @@ -199,7 +199,7 @@
Exceptional Interprocedural Control Flow Graphs for x86-64 Binaries by Joshua Bockenek (Virginia Tech), Freek Verbeek (Open University of The Netherlands and Virginia Tech), and Binoy Ravindran (Virginia Tech)
@@ -220,7 +220,7 @@Constructs of Deceit: Exploring Nuances in Modern Social Engineering Attacks (no onsite talk) by Mohammad Ali Tofighi (Florida International University), Behzad Ousat (Florida International University), Javad Zandi (Florida International University), Esteban Schafir (Florida International University), and Amin Kharraz (Florida International University)
@@ -241,7 +241,7 @@Bringing UFUs Back into the Air With FUEL: A Framework for Evaluating the Effectiveness of Unrestricted File Upload Vulnerability Scanners by Sebastian Neef (TU Berlin) and Maath Oudeh (TU Berlin)
@@ -289,7 +289,7 @@Approach for the Optimization of Machine Learning Models for Calculating Binary Function Similarity by Suguru Horimoto (National Police Agency of Japan), Keane Lucas (Carnegie Mellon University), and Lujo Bauer (Carnegie Mellon University)
@@ -310,7 +310,7 @@Seum Spread: Discerning Flaws in IoT Firmware Via Security-Relevant Call Sequence Semantics by Anis Lounis (Security Research Centre, Concordia University, Montreal, QC, Canada), Anthony Andreoli (Security Research Centre, Concordia University, Montreal, QC, Canada), Mourad Debbabi (Security Research Centre, Concordia University, Montreal, QC, Canada), and Aiman Hanna (Security Research Centre, Concordia University, Montreal, QC, Canada)
@@ -328,7 +328,7 @@SecMonS: A Security Monitoring Framework for IEC 61850 Substations Based on Configuration Files and Logs by Onur Duman (Concordia University), Mengyuan Zhang (Vrije Universiteit), Lingyu Wang (Concordia University), and Mourad Debbabi (Concordia university)