Linked Presentation: Defending Against Data Reconstruction Attacks in Federated Learning: An Information Theory ApproachDemystifying the Security Implications in IoT Device Rental ServicesHijacking Attacks against Neural Network by Analyzing Training DataImproving ML-based Binary Function Similarity Detection by Assessing and Deprioritizing Control Flow Graph FeaturesMore Simplicity for Trainers, More Opportunity for Attackers: Black-Box Attacks on Speaker Recognition Systems by Inferring Feature ExtractorResolverFuzz: Automated Discovery of DNS Resolver Vulnerabilities with Query-Response FuzzingTransferability of White-box Perturbations: Query-Efficient Adversarial Attacks against Commercial DNN ServicesWhat IF Is Not Enough? Fixing Null Pointer Dereference With Contextual CheckYour Firmware Has Arrived: A Study of Firmware Update Vulnerabilities