Towards Practical Differentially Private Convex Optimization |
40th IEEE Symposium on Security and Privacy
|
A Large-Scale Empirical Study of Security Patches |
ACM CCS 2017
|
A Formal Foundation for Secure Remote Execution of Enclaves★ |
ACM CCS 2017
|
Data breaches, phishing, or malware? Understanding the risks of stolen credentials |
ACM CCS 2017
|
Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection |
ACM CCS 2017
|
Let's go in for a closer look: Observing passwords in their natural habitat |
ACM CCS 2017
|
TinyOLE: Efficient Actively Secure Two-Party Computation from Oblivious Linear Function Evaluation |
ACM CCS 2017
|
Towards Evaluating the Robustness of Neural Networks |
38th IEEE Symposium on Security and Privacy
|
Clickjacking Revisited: A Perceptual View of UI Security |
WOOT '14
|
Breaking Cell Phone Authentication: Vulnerabilities in AKA, IMS, and Android |
WOOT '13
|