Star 0
Month Quarter Year
#N/A #N/A #N/A
Title Event
Towards Automated Safety Vetting of PLC Code in Real-World Plants 40th IEEE Symposium on Security and Privacy
Cross-App Poisoning in Software-Defined Networking ACM CCS 2018
Property Inference Attacks on Deep Neural Networks using Permutation Invariant Representations ACM CCS 2018
Runtime Analysis of Whole-System Provenance ACM CCS 2018
Web’s Sixth Sense: A Study of Scripts Accessing Smartphone Sensors ACM CCS 2018
A Tale of Two Studies: The Best and Worst of YubiKey Usability 39th IEEE Symposium on Security and Privacy
Self-Verifying Authentication – A Framework for Safer Integrations of Single-Sign-On Services Black Hat Europe 2017
Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX ACM CCS 2017
Hypervisor Introspection: A Technique for Evading Passive Virtual Machine Monitoring WOOT '15
Badger - The Networked Security State Estimation Toolkit Black Hat USA 2014