Finding Flaws from Password Authentication Code in Android Apps
Siqi Ma, Elisa Bertino, Robert Deng, Juanru Li, Diet Ostry, Surya Nepal and Sanjay Jha
Identifying Privilege Separation Vulnerabilities in IoT Firmware with Symbolic Execution
Yao Yao, Wei Zhou, Yan Jia, Lipeng Zhu, Yuqing Zhang and Peng Liu
iCAT: An Interactive Customizable Anonymization Tool
Momen Oqaily, Yosr Jarraya, Lingyu Wang, Mengyuan Zhang, Makan Pourzandi and Mourad Debbabi
Monitoring the GDPR
Emma Arfelt, David Basin and Søren Debois