Hackers vs. Testers: A Comparison of Software Vulnerability Discovery Processes |
39th IEEE Symposium on Security and Privacy
|
xJsnark: A Framework for Efficient Verifiable Computation |
39th IEEE Symposium on Security and Privacy
|
vRAM: Faster Verifiable RAM With Program-Independent Preprocessing |
39th IEEE Symposium on Security and Privacy
|
Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation★ |
ACM CCS 2017
|
Certified Malware: Measuring Breaches of Trust in the Windows Code-Signing PKI |
ACM CCS 2017
|
Global-Scale Secure Multiparty Computation |
ACM CCS 2017
|
Solidus: Confidential Distributed Ledger Transactions via PVORM |
ACM CCS 2017
|
unCaptcha: A Low-Resource Defeat of reCaptcha's Audio Challenge |
WOOT '17
|
vSQL: Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases |
38th IEEE Symposium on Security and Privacy
|
I Think They're Trying to Tell Me Something: Advice Sources and Selection for Digital Security |
37th IEEE Symposium on Security and Privacy
|