Secure Outsourced Matrix Computation and Application to Neural Networks |
ACM CCS 2018
|
Towards Verified, Constant-time Floating Point Operations |
ACM CCS 2018
|
Pestilential Protocol: How Unsecure HL7 Messages Threaten Patient Lives |
Black Hat USA 2018
|
Identity-Based Format-Preserving Encryption |
ACM CCS 2017
|
Quantifying the Pressure of Legal Risks on Third-party Vulnerability Research |
ACM CCS 2017
|
Fast and Vulnerable: A Story of Telematic Failures |
WOOT '15
|
SURROGATES: Enabling Near-Real-Time Dynamic Analyses of Embedded Systems |
WOOT '15
|
Mouse Trap: Exploiting Firmware Updates in USB Peripherals |
WOOT '14
|