Mallory Knodel (Center for Democracy and Technology), Shivan Sahib (Salesforce)
DNS Privacy Vs : Confronting protocol design trade offs in the public interest
View More Papers
Rosita: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers
Madura A. Shelton (University of Adelaide), Niels Samwel (Radboud University), Lejla Batina (Radboud University), Francesco Regazzoni (University of Amsterdam and ALaRI – USI), Markus Wagner (University of Adelaide), Yuval Yarom (University of Adelaide and Data61)
Read MoreALchemist: Fusing Application and Audit Logs for Precise Attack...
Le Yu (Purdue University), Shiqing Ma (Rutgers University), Zhuo Zhang (Purdue University), Guanhong Tao (Purdue University), Xiangyu Zhang (Purdue University), Dongyan Xu (Purdue University), Vincent E. Urias (Sandia National Laboratories), Han Wei Lin (Sandia National Laboratories), Gabriela Ciocarlie (SRI International), Vinod Yegneswaran (SRI International), Ashish Gehani (SRI International)
Read MoreBringing Balance to the Force: Dynamic Analysis of the...
Abdallah Dawoud (CISPA Helmholtz Center for Information Security), Sven Bugiel (CISPA Helmholtz Center for Information Security)
Read MoreSquirRL: Automating Attack Analysis on Blockchain Incentive Mechanisms with...
Charlie Hou (CMU, IC3), Mingxun Zhou (Peking University), Yan Ji (Cornell Tech, IC3), Phil Daian (Cornell Tech, IC3), Florian Tramèr (Stanford University), Giulia Fanti (CMU, IC3), Ari Juels (Cornell Tech, IC3)
Read More