Measuring and Analyzing Search Engine Poisoning of Linguistic Collisions |
40th IEEE Symposium on Security and Privacy
|
HoMonit: Monitoring Smart Home Apps from Encrypted Traffic |
ACM CCS 2018
|
No Training Hurdles: Fast Training-Agnostic Attacks to Infer Your Typing |
ACM CCS 2018
|
Pinpointing Insecure Cryptographic Keys from Execution Traces |
ACM CCS 2018
|
A Machine Learning Approach To Prevent Malicious Calls Over Telephony Networks |
39th IEEE Symposium on Security and Privacy
|
Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection |
ACM CCS 2017
|
Exploitations of Uninitialized Uses on macOS Sierra |
WOOT '17
|
Side-Channel Analysis |
RSAC USA 2017
|
Cloning 3G/4G SIM Cards with a PC and an Oscilloscope: Lessons Learned in Physical Security |
Black Hat USA 2015
|
Public-Key Encryption I |
RSAC USA 2013
|