Synesthesia: Detecting Screen Content via Remote Acoustic Side Channels |
40th IEEE Symposium on Security and Privacy
|
Spectre Attacks: Exploiting Speculative Execution |
40th IEEE Symposium on Security and Privacy
|
SoK: General Purpose Compilers for Secure Multi-Party Computation |
40th IEEE Symposium on Security and Privacy
|
In Search of CurveSwap: Measuring Elliptic Curve Implementations in the Wild |
Black Hat Europe 2018
|
Effective Program Debloating via Reinforcement Learning |
ACM CCS 2018
|
Practical state recovery attacks against legacy RNG implementations |
ACM CCS 2018
|
What's a little leakage between friends? |
ACM CCS 2018
|
Protecting the Stack with Metadata Policies and Tagged Hardware |
39th IEEE Symposium on Security and Privacy
|
Micro-Policies: Formally Verified, Tag-Based Security Monitors |
36th IEEE Symposium on Security and Privacy
|