Dangerous Skills: Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems |
40th IEEE Symposium on Security and Privacy
|
nanoPI: Extreme-Scale Actively-Secure Multi-Party Computation |
ACM CCS 2018
|
Two-Factor Authentication, Usable or Not? A Two-Phase Usability Study of the FIDO U2F Security Key |
Black Hat USA 2018
|
Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX |
ACM CCS 2017
|
Querying for Queries: Indexes of Queries for Efficient and Expressive IT-PIR |
ACM CCS 2017
|
Private Information Retrieval |
ACM CCS 2017
|
Pool: Scalable On-Demand Secure Computation Service Against Malicious Adversaries |
ACM CCS 2017
|
SemFuzz: Semantics-based Automatic Generation of Proof-of-Concept?Exploits |
ACM CCS 2017
|