Lay Down the Common Metrics: Evaluating Proof-of-Work Consensus Protocols' Security |
40th IEEE Symposium on Security and Privacy
|
Key Management and Protection: Evaluation of Hardware, Tokens, TEEs and MPC |
RSAC USA 2019
|
How Unique is Your .onion? An Analysis of the Fingerprintability of Tor Onion Services★ |
ACM CCS 2017
|
Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting |
ACM CCS 2017
|
Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2★ |
ACM CCS 2017
|
WiFuzz: Detecting and Exploiting Logical Flaws in the Wi-Fi Cryptographic Handshake |
Black Hat USA 2017
|
HEIST: HTTP Encrypted Information can be Stolen Through TCP-Windows |
Black Hat USA 2016
|