Lawful Device Access without Mass Surveillance Risk: A Technical Design Discussion |
ACM CCS 2018
|
Quantifying the Pressure of Legal Risks on Third-party Vulnerability Research |
ACM CCS 2017
|
Fast and Vulnerable: A Story of Telematic Failures |
WOOT '15
|
Characterizing Large-Scale Click Fraud in ZeroAccess |
ACM CCS 2014
|