On Ends-to-Ends Encryption: Asynchronous Group Messaging with Strong Security Guarantees |
ACM CCS 2018
|
Exploiting Automation in LTE Mobile Networks |
HITB GSEC 2018 – Singapore
|
Is the Mafia Taking Over Cybercrime? |
Black Hat USA 2018
|
When Your Fitness Tracker Betrays You: Quantifying the Predictability of Biometric Features Across Contexts |
39th IEEE Symposium on Security and Privacy
|
White-Stingray: Evaluating IMSI Catchers Detection Applications |
WOOT '17
|
New Adventures in Spying 3G and 4G Users: Locate Track & Monitor |
Black Hat USA 2017
|
WiFi-Based IMSI Catcher |
Black Hat Europe 2016
|
Automated Analysis and Verification of TLS 1.3: 0-RTT, Resumption and Delayed Authentication |
37th IEEE Symposium on Security and Privacy
|