Linked Presentation: Demon in the Variant: Statistical Analysis of DNNs for Robust Backdoor Contamination DetectionEvil Under the Sun: Understanding and Discovering Attacks on Ethereum Decentralized ApplicationsUnderstanding Malicious Cross-library Data Harvesting on Android