Iodine: Fast Dynamic Taint Tracking Using Rollback-free Optimistic Hybrid Analysis |
40th IEEE Symposium on Security and Privacy
|
Hard Drive of Hearing: Disks that Eavesdrop with a Synthesized Microphone |
40th IEEE Symposium on Security and Privacy
|
The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations |
40th IEEE Symposium on Security and Privacy
|
Synesthesia: Detecting Screen Content via Remote Acoustic Side Channels |
40th IEEE Symposium on Security and Privacy
|
Towards Automated Safety Vetting of PLC Code in Real-World Plants |
40th IEEE Symposium on Security and Privacy
|
ALCHEMY: A Language and Compiler for Homomorphic Encryption Made easY |
ACM CCS 2018
|
Blue Note: How Intentional Acoustic Interference Damages Availability and Integrity in Hard Disk Drives and Operating Systems |
39th IEEE Symposium on Security and Privacy
|
Multi-Stage Attack Graph Security Games: Heuristic Strategies, with Empirical Game-Theoretic Analysis |
ACM CCS 2017
|
Viden: Attacker Identification on In-Vehicle Networks |
ACM CCS 2017
|
DDoSCoin: Cryptocurrency with a Malicious Proof-of-Work |
WOOT '16
|