DATA OBLIVIOUS ISA EXTENSIONS FOR SIDE CHANNEL-RESISTANT AND HIGH PERFORMANCE COMPUTING
|
2020 |
Yu, Jiyong |
COCONUT: THRESHOLD ISSUANCE SELECTIVE DISCLOSURE CREDENTIALS WITH APPLICATIONS TO DISTRIBUTED LEDGERS
|
2020 |
Sonnino, Alberto |
HOW TO END PASSWORD REUSE ON THE WEB
|
2020 |
Wang, Ke Coby |
UWB WITH PULSE REORDERING: SECURING RANGING AGAINST RELAY AND PHYSICAL-LAYER ATTACKS
|
2020 |
Singh, Mridula |
NEARBY THREATS: REVERSING, ANALYZING, AND ATTACKING GOOGLE'S 'NEARBY CONNECTIONS' ON ANDROID
|
2020 |
Antonioli, Daniele |
RORAM: EFFICIENT RANGE ORAM WITH O(LOG2 N) LOCALITY
|
2020 |
Chakraborti, Anrin |
PRIVATE CONTINUAL RELEASE OF REAL-VALUED DATA STREAMS
|
2020 |
Perrier, Victor |
VAULT: FAST BOOTSTRAPPING FOR THE ALGORAND CRYPTOCURRENCY
|
2020 |
Leung, Derek |
ESTABLISHING SOFTWARE ROOT OF TRUST UNCONDITIONALLY
|
2020 |
Gligor, Virgil D. |
NEURO-SYMBOLIC EXECUTION: AUGMENTING SYMBOLIC EXECUTION WITH NEURAL CONSTRAINTS
|
2020 |
Shiqi, Shen |
CODEALCHEMIST: SEMANTICS-AWARE CODE GENERATION TO FIND VULNERABILITIES IN JAVASCRIPT ENGINES
|
2020 |
Han, Hyungseok |
PROFIT: DETECTING AND QUANTIFYING SIDE CHANNELS IN NETWORKED APPLICATIONS
|
2020 |
Rosner, Nicolás |
UNDERSTANDING OPEN PORTS IN ANDROID APPLICATIONS: DISCOVERY, DIAGNOSIS, AND SECURITY ASSESSMENT
|
2020 |
Wu, Daoyuan |
BADBLUETOOTH: BREAKING ANDROID SECURITY MECHANISMS VIA MALICIOUS BLUETOOTH PERIPHERALS
|
2020 |
Xu, Fenghao |
IOTGUARD: DYNAMIC ENFORCEMENT OF SECURITY AND SAFETY POLICY IN COMMODITY IOT
|
2020 |
Celik, Z. Berkay |
ICSREF: A FRAMEWORK FOR AUTOMATED REVERSE ENGINEERING OF INDUSTRIAL CONTROL SYSTEMS BINARIES
|
2020 |
Keliris, Anastasis |
STATISTICAL PRIVACY FOR STREAMING TRAFFIC
|
2020 |
Zhang, Xiaokuan |
ADVERSARIAL ATTACKS AGAINST AUTOMATIC SPEECH RECOGNITION SYSTEMS VIA PSYCHOACOUSTIC HIDING
|
2020 |
Schönherr, Lea |
TIMBER-V: TAG-ISOLATED MEMORY BRINGING FINE-GRAINED ENCLAVES TO RISC-V
|
2020 |
Weiser, Samuel |
ENEMY AT THE GATEWAYS: CENSORSHIP-RESILIENT PROXY DISTRIBUTION USING GAME THEORY
|
2020 |
Nasr, Milad |