Detecting User Experience Issues of the Tor Browser In The Wild |
ACM CCS 2018
|
Detecting Structurally Anomalous Logins Within Enterprise Networks |
ACM CCS 2017
|
Full accounting for verifiable outsourcing |
ACM CCS 2017
|
Provably-Secure Logic Locking: From Theory To Practice |
ACM CCS 2017
|
AutoCTF: Creating Diverse Pwnables via Automated Bug Injection |
WOOT '17
|
And Then the Script-Kiddie Said Let There be No Light. Are Cyber-Attacks on the Power Grid Limited to Nation-State Actors? |
Black Hat USA 2017
|
Non-Deterministic Timers for Hardware Trojan Activation (or How a Little Randomness Can Go the Wrong Way) |
WOOT '16
|
Putting LTE Security Functions to the Test: A Framework to Evaluate Implementation Correctness |
WOOT '16
|
A Security Analysis of an In-Vehicle Infotainment and App Platform |
WOOT '16
|
Verifiable ASICs |
37th IEEE Symposium on Security and Privacy
|