Showing results 1 to 4 of 4
Title | Author(s) | Issue Date | |
---|---|---|---|
Bookworm game: Automatic discovery of LTE vulnerabilities through documentation analysis Proceeding/Conference:Proceedings - IEEE Symposium on Security and Privacy | 2021 | ||
Racing on the Negative Force: Efficient Vulnerability Root-Cause Analysis through Reinforcement Learning on Counterexamples Proceeding/Conference:Proceedings of the 33rd USENIX Security Symposium | 2024 | ||
Seeing the Forest for the Trees: Understanding Security Hazards in the 3GPP Ecosystem through Intelligent Analysis on Change Requests Proceeding/Conference:Proceedings of the 31st USENIX Security Symposium, Security 2022 | 2022 | ||
Sherlock on Specs: Building LTE Conformance Tests through Automated Reasoning Proceeding/Conference:32nd USENIX Security Symposium, USENIX Security 2023 | 2023 |