Star 0
Month Quarter Year
#N/A #N/A #N/A
Title Event
Detecting User Experience Issues of the Tor Browser In The Wild ACM CCS 2018
Detecting Structurally Anomalous Logins Within Enterprise Networks ACM CCS 2017
Full accounting for verifiable outsourcing ACM CCS 2017
Provably-Secure Logic Locking: From Theory To Practice ACM CCS 2017
AutoCTF: Creating Diverse Pwnables via Automated Bug Injection WOOT '17
And Then the Script-Kiddie Said Let There be No Light. Are Cyber-Attacks on the Power Grid Limited to Nation-State Actors? Black Hat USA 2017
Non-Deterministic Timers for Hardware Trojan Activation (or How a Little Randomness Can Go the Wrong Way) WOOT '16
Putting LTE Security Functions to the Test: A Framework to Evaluate Implementation Correctness WOOT '16
A Security Analysis of an In-Vehicle Infotainment and App Platform WOOT '16
Verifiable ASICs 37th IEEE Symposium on Security and Privacy