Daniel Kahn Gillmor (ACLU)
Keynote: Armor for the back half of the camel: Why confidentiality matters for recursive DNS traffic
View More Papers
Obfuscated Access and Search Patterns in Searchable Encryption
Zhiwei Shang (University of Waterloo), Simon Oya (University of Waterloo), Andreas Peter (University of Twente), Florian Kerschbaum (University of Waterloo)
Read MoreLet’s Stride Blindfolded in a Forest: Sublinear Multi-Client Decision...
Jack P. K. Ma (The Chinese University of Hong Kong), Raymond K. H. Tai (The Chinese University of Hong Kong), Yongjun Zhao (Nanyang Technological University), Sherman S.M. Chow (The Chinese University of Hong Kong)
Read MoreSpecTaint: Speculative Taint Analysis for Discovering Spectre Gadgets
Zhenxiao Qi (UC Riverside), Qian Feng (Baidu USA), Yueqiang Cheng (NIO Security Research), Mengjia Yan (MIT), Peng Li (ByteDance), Heng Yin (UC Riverside), Tao Wei (Ant Group)
Read More