Comprehensive Privacy Analysis of Deep Learning |
40th IEEE Symposium on Security and Privacy
|
On the Feasibility of Rerouting-Based DDoS Defenses |
40th IEEE Symposium on Security and Privacy
|
Evading Classifiers by Morphing in the Dark |
ACM CCS 2017
|
Directed Greybox Fuzzing |
ACM CCS 2017
|
Data-Oriented Programming: On the Expressiveness of Non-Control Data Attacks |
37th IEEE Symposium on Security and Privacy
|
Authenticator Leakage through Backup Channels on Android |
Black Hat Europe 2015
|
Securing Software Against Library Attacks |
RSAC Asia Pacific 2013
|