Dynamic Defense against Adaptive and Persistent Adversaries |
ACM CCS 2018
|
ThinSIM-based Attacks on Mobile Money Systems |
DEF CON 26
|
Computer Security and Privacy for Refugees in the United States |
39th IEEE Symposium on Security and Privacy
|
Towards Security and Privacy for Multi-User Augmented Reality: Foundations with End Users |
39th IEEE Symposium on Security and Privacy
|
GDPR Essentials |
RSAC USA 2018
|
Attacking Automatic Video Analysis Algorithms: A Case Study of Google Cloud Video Intelligence API |
ACM CCS 2017
|
Securing Augmented Reality Output |
38th IEEE Symposium on Security and Privacy
|
SURROGATES: Enabling Near-Real-Time Dynamic Analyses of Embedded Systems |
WOOT '15
|
Discussion panel: Vulnerability sharing in the age of Heartbleed |
VB2014 Seattle
|
U.S. and E.U. Competition to Regulate the Emerging Global Identity Architecture |
RSAC USA 2014
|