KHyperLogLog: Estimating Reidentifiability and Joinability of Large Data at Scale |
40th IEEE Symposium on Security and Privacy
|
Debin: Predicting Debug Information in Stripped Binaries |
ACM CCS 2018
|
Formal Analysis of 5G Authentication |
ACM CCS 2018
|
Ouroboros Genesis: Composable Proof-of-Stake Blockchains with Dynamic Availability |
ACM CCS 2018
|
SECURIFY: Practical Security Analysis of Smart Contracts |
ACM CCS 2018
|
Towards Usable Checksums: Automating the Integrity Verification of Web Downloads for the Masses |
ACM CCS 2018
|
Tight on Budget? Tight Bounds for r-Fold Approximate Differential Privacy |
ACM CCS 2018
|
Droplet: Decentralized Authorization for IoT Data Streams |
39th IEEE Symposium on Security and Privacy
|
Software Grand Exposure: SGX Cache Attacks Are Practical |
WOOT '17
|
High-Speed Inter-domain Fault Localization |
37th IEEE Symposium on Security and Privacy
|