Blind Certificate Authorities |
40th IEEE Symposium on Security and Privacy
|
Beyond Credential Stuffing: Password Similarity Models using Neural Networks |
40th IEEE Symposium on Security and Privacy
|
Machine Learning Models that Remember Too Much |
ACM CCS 2017
|
The TypTop System: Personalized Typo-tolerant Password Checking |
ACM CCS 2017
|
Controlling UAVs with Sensor Input Spoofing Attacks |
WOOT '16
|
Not-So-Random Numbers in Virtualized Linux and the Whirlwind RNG |
35th IEEE Symposium on Security and Privacy
|
Security Analysis of Smartphone Point-of-Sale Systems |
WOOT '12
|