Towards Automated Safety Vetting of PLC Code in Real-World Plants |
40th IEEE Symposium on Security and Privacy
|
Cross-App Poisoning in Software-Defined Networking |
ACM CCS 2018
|
Property Inference Attacks on Deep Neural Networks using Permutation Invariant Representations |
ACM CCS 2018
|
Runtime Analysis of Whole-System Provenance |
ACM CCS 2018
|
Web’s Sixth Sense: A Study of Scripts Accessing Smartphone Sensors |
ACM CCS 2018
|
A Tale of Two Studies: The Best and Worst of YubiKey Usability |
39th IEEE Symposium on Security and Privacy
|
Self-Verifying Authentication – A Framework for Safer Integrations of Single-Sign-On Services |
Black Hat Europe 2017
|
Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX |
ACM CCS 2017
|
Hypervisor Introspection: A Technique for Evading Passive Virtual Machine Monitoring |
WOOT '15
|
Badger - The Networked Security State Estimation Toolkit |
Black Hat USA 2014
|