Blind Certificate Authorities |
40th IEEE Symposium on Security and Privacy
|
Beyond Credential Stuffing: Password Similarity Models using Neural Networks |
40th IEEE Symposium on Security and Privacy
|
Exploiting Unintended Feature Leakage in Collaborative Learning |
40th IEEE Symposium on Security and Privacy
|
Synesthesia: Detecting Screen Content via Remote Acoustic Side Channels |
40th IEEE Symposium on Security and Privacy
|
Pump up the Volume: Practical Database Reconstruction from Volume Leakage on Range Queries |
ACM CCS 2018
|
Situational Access Control in the Internet of Things |
ACM CCS 2018
|
The Spyware Used in Intimate Partner Violence |
39th IEEE Symposium on Security and Privacy
|
Machine Learning Models that Remember Too Much |
ACM CCS 2017
|
The TypTop System: Personalized Typo-tolerant Password Checking |
ACM CCS 2017
|
Solidus: Confidential Distributed Ledger Transactions via PVORM |
ACM CCS 2017
|