Analysis of Concurrent Moving Target Defenses |
ACM CCS 2018
|
Secure Computation with Differentially Private Access Patterns |
ACM CCS 2018
|
Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation★ |
ACM CCS 2017
|
Detecting Stealthy Botnets in a Resource-Constrained Environment using Reinforcement Learning |
ACM CCS 2017
|
Global-Scale Secure Multiparty Computation |
ACM CCS 2017
|
Performance Modeling of Moving Target Defenses |
ACM CCS 2017
|
Vulnerable Implicit Service: A Revisit |
ACM CCS 2017
|
Abusing Public Third-Party Services for EDoS Attacks |
WOOT '16
|
A Security Analysis of an In-Vehicle Infotainment and App Platform |
WOOT '16
|
Fuzzing E-mail Filters with Generative Grammars and N-Gram Analysis |
WOOT '15
|