Full accounting for verifiable outsourcing |
ACM CCS 2017
|
Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems |
36th IEEE Symposium on Security and Privacy
|
Using Frankencerts for Automated Adversarial Testing of Certificate Validation in SSL/TLS Implementations |
35th IEEE Symposium on Security and Privacy
|