Differentially Private Model Publishing For Deep Learning |
40th IEEE Symposium on Security and Privacy
|
Iodine: Fast Dynamic Taint Tracking Using Rollback-free Optimistic Hybrid Analysis |
40th IEEE Symposium on Security and Privacy
|
Fuzzing File Systems via Two-Dimensional Input Space Exploration |
40th IEEE Symposium on Security and Privacy
|
Dominance as a New Trusted Computing Primitive for the Internet of Things |
40th IEEE Symposium on Security and Privacy
|
SoK: The Challenges, Pitfalls, and Perils of Using Hardware Performance Counters for Security |
40th IEEE Symposium on Security and Privacy
|
SoK: Security Evaluation of Home-Based IoT Deployment |
40th IEEE Symposium on Security and Privacy
|
ClickShield: Are You Hiding Something? Towards Eradicating Clickjacking on Android |
ACM CCS 2018
|
Enforcing Unique Code Target Property for Control-Flow Integrity |
ACM CCS 2018
|
Utility-aware synthesis of differentially private and attack-resilient location traces |
ACM CCS 2018
|
Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels |
39th IEEE Symposium on Security and Privacy
|