No Free Charge Theorem 2.0: How to Steal Private Information from a Mobile Device Using a Powerbank |
Black Hat Europe 2018
|
Are we there yet? Understanding the challenges faced in complying with the General Data Protection Regulation (GDPR) |
ACM CCS 2018
|
Unwinding Ariadne's Identity Thread: Privacy Risks with Fitness Trackers and Online Social Networks |
ACM CCS 2017
|