Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning |
39th IEEE Symposium on Security and Privacy
|
Full accounting for verifiable outsourcing |
ACM CCS 2017
|
Scaling ORAM for Secure Computation★ |
ACM CCS 2017
|
Rise of the HaCRS: Augmenting Autonomous Cyber Reasoning Systems with Human Assistance |
ACM CCS 2017
|
CRLite: A Scalable System for Pushing All TLS Revocations to All Browsers |
38th IEEE Symposium on Security and Privacy
|
Is There a Doctor in The House? Hacking Medical Devices and Healthcare Infrastructure |
HITBSecConf2017 – Amsterdam
|
Trusted Code Execution on Untrusted Platform Using Intel SGX |
VB2016 Denver
|
Honey Onions: Exposing Snooping Tor HSDir Relays |
DEF CON 24
|
Samsung Pay: Tokenized Numbers, Flaws and Issues |
DEF CON 24
|
Inferring User Routes and Locations using Zero-Permission Mobile Sensors |
37th IEEE Symposium on Security and Privacy
|