Exploiting Unintended Feature Leakage in Collaborative Learning |
40th IEEE Symposium on Security and Privacy
|
Tiresias: Predicting Security Events Through Deep Learning |
ACM CCS 2018
|
Tight on Budget? Tight Bounds for r-Fold Approximate Differential Privacy |
ACM CCS 2018
|
A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components |
ACM CCS 2017
|
Trojan-tolerant Hardware & Supply Chain Security in Practice |
DEF CON 25
|
DC to DEF CON: Q&A; with Congressmen James Langevin and Will Hurd |
DEF CON 25
|
OpenCrypto: Unchaining the JavaCard Ecosystem |
Black Hat USA 2017
|
Talking Behind Your Back: Attacks and Countermeasures of Ultrasonic Cross-Device Tracking |
Black Hat Europe 2016
|