Use Privacy in Data-Driven Systems: Theory and Experiments with Machine Learnt Programs |
ACM CCS 2017
|
Real Humans Simulated Attacks: Usability Testing with Attack Scenarios |
Black Hat USA 2017
|
Verifying and Synthesizing Constant-Resource Implementations with Types |
38th IEEE Symposium on Security and Privacy
|
DevOps Connect: DevSecOps Edition |
RSAC USA 2017
|
Workplace Violence and IT Sabotage: Two Sides of the Same Coin? |
RSAC USA 2017
|
How Secure are your Docker Images? |
BSidesSF2017
|
1000 Ways to Die in Mobile OAuth |
Black Hat USA 2016
|
Algorithmic Transparency via Quantitative Input Influence: Theory and Experiments with Learning Systems |
37th IEEE Symposium on Security and Privacy
|
Securing Multiparty Online Services via Certification of Symbolic Transactions |
36th IEEE Symposium on Security and Privacy
|
Program-Adaptive Mutational Fuzzing |
36th IEEE Symposium on Security and Privacy
|