Star 0
Month Quarter Year
#N/A #N/A #N/A
Title Event
Secure Outsourced Matrix Computation and Application to Neural Networks ACM CCS 2018
Towards Verified, Constant-time Floating Point Operations ACM CCS 2018
Pestilential Protocol: How Unsecure HL7 Messages Threaten Patient Lives Black Hat USA 2018
Identity-Based Format-Preserving Encryption ACM CCS 2017
Quantifying the Pressure of Legal Risks on Third-party Vulnerability Research ACM CCS 2017
Fast and Vulnerable: A Story of Telematic Failures WOOT '15
SURROGATES: Enabling Near-Real-Time Dynamic Analyses of Embedded Systems WOOT '15
Mouse Trap: Exploiting Firmware Updates in USB Peripherals WOOT '14