Journal: DTRAP

Volume 4, Issue 2

0 -- 0Huili Chen, Cheng Fu, Jishen Zhao, Farinaz Koushanfar. GALU: A Genetic Algorithm Framework for Logic Unlocking
0 -- 0Karim Lounis, Mohammad Zulkernine. Lessons Learned: Analysis of PUF-based Authentication Protocols for IoT
0 -- 0Lionel Morel, Damien Couroussé, Thomas Hiscock. Code Polymorphism Meets Code Encryption: Confidentiality and Side-channel Protection of Software Components
0 -- 0Robert A. Bridges, Sean Oesch, Michael D. Iannacone, Kelly M. T. Huffer, Brian Jewell, Jeffrey A. Nichols, Brian Weber, Miki E. Verma, Daniel Scofield, Craig Miles, Thomas Plummer, Mark Daniell, Anne M. Tall, Justin M. Beaver, Jared M. Smith. Beyond the Hype: An Evaluation of Commercially Available Machine Learning-based Malware Detectors
0 -- 0Pierre Graux, Jean-François Lalande, Valérie Viet Triem Tong, Pierre Wilke. OATs'inside: Retrieving Object Behaviors From Native-based Obfuscated Android Applications
0 -- 0Abdurhman Albasir, Kshirasagar Naik, Ricardo Manzano. Toward Improving the Security of IoT and CPS Devices: An AI Approach
0 -- 0Fran Casino, Nikolaos Totosis, Theodoros Apostolopoulos, Nikolaos Lykousas, Constantinos Patsakis. Analysis and Correlation of Visual Evidence in Campaigns of Malicious Office Documents
0 -- 0Jonathan Oakley 0001, Carl R. Worley, Lu Yu 0001, Richard R. Brooks, Ilker Özçelik, Anthony Skjellum, Jihad S. Obeid. Scrybe: A Secure Audit Trail for Clinical Trial Data Fusion
0 -- 0Girish Vaidya, T. V. Prabhakar 0001, Nithish K. Gnani, Ryan Shah, Shishir Nagaraja. Sensor Identification via Acoustic Physically Unclonable Function
0 -- 0Aydin Aysu, Scott R. Graham. Introduction to the Special Issue on the Digital Threats of Hardware Security
0 -- 0Thomas Walshe, Andrew Simpson 0001. Towards a Greater Understanding of Coordinated Vulnerability Disclosure Policy Documents
0 -- 0Poushali Sengupta, Sudipta Paul 0004, Subhankar Mishra. BUDS+: Better Privacy with Converger and Noisy Shuffling
0 -- 0S. S. Iyengar 0001, Bhavani Thuraisingham, Marek Zmuda. Special Issue on Actionable Information for Digital Threat Discovery Using Contextualized Data or Multi Sensor Data Fusion
0 -- 0Rajat Subhra Bhowmick, Rahul Indra, Isha Ganguli, Jayanta Paul, Jaya Sil. Breaking Captcha System with Minimal Exertion through Deep Learning: Real-time Risk Assessment on Indian Government Websites
0 -- 0Tor J. Langehaug, Brett J. Borghetti, Scott R. Graham. Classifying Co-resident Computer Programs Using Information Revealed by Resource Contention