Linked Presentation: A Wolf in Sheep's Clothing: Practical Black-box Adversarial Attacks for Evading Learning-based Windows Malware Detection in the WildCritical Code Guided Directed Greybox Fuzzing for CommitsDetecting Kernel Memory Bugs through Inconsistent Memory Management Intention InferencesExploring ChatGPT's Capabilities on Vulnerability ManagementImproving Indirect-Call Analysis in LLVM with Type and Data-Flow Co-AnalysisOn the Difficulty of Defending Contrastive Learning against Backdoor Attacks