Все публикации

9 Prune+PlumTree Finding Eviction Sets at Scale Tom Kissos

6 Efficient Zero knowledge Arguments for Paillier Cryptosystem Rae Gong

101 The Great Request Robbery Soheil Khodayari Soheil Khodayari

116 Security Privacy and Data Sharing Challenges When Moving to the US Insights from a Qualitative s

220 Piano Extremely Simple Single Server PIR with Sublinear Server Computation Mingxun Zhou

227 Sabre Cutting through Adversarial Noise with Adaptive Spectral Filtering and Input Reconstructio

307 Springproofs Efficient Inner Product Arguments for Vectors of Arbitrary Length Ming Su

443 Targeted and Troublesome Zahra Moti Zahra Moti

520 BELT Old School Backdoor Attacks can Evade the State of the Art Defense with Backdoor Exclusivit

483 Pandora Principled Symbolic Validation of Intel SGX Enclave Runtimes Jo Van Bulck

665 Obelix Mitigating Side Channels Through Dynamic Obfuscation Jan

694 LLMIF Augmented Large Language Model for Fuzzing IoT Devices Jincheng Wang

2024 37 SoK Safer Digital Safety Research Involving At Risk Users Rosanna “Rosie” Bellini

2024 76 Formal Dolev Yao Models Meet Cryptographic Protocol Fuzz Testing Max Ammann

2024 125 DeepTheft Stealing DNN Model Architectures through Power Side Channel Garrison Gao

2024 205 FlowMur A Stealthy and Practical Audio Backdoor Attack with Limited Knowledge Jiahe Lan

2024 305 Pianist Scalable zkRollups via Fully Distributed Zero Knowledge Proofs Tianyi Liu

Backdooring Multimodal Learning

LowerBoundsRDP Tim Kutta

183 Who Left the Door Open Investigating the Causes of Exposed IoT Devices in an Academic Network

114 GAuV Xingyu Xie

239 Nebula A Privacy First Platform for Data Backhaul Jean Luc Watson

272 SneakyPrompt Jailbreaking Text to image Generative Models Yuchen Yang