Tariq Elahi
Ensuring Safety and Facilitating Research on the Live Tor Network
View More Papers
Towards Automatic and Precise Heap Layout Manipulation for General-Purpose...
Runhao Li (National University of Defense Technology), Bin Zhang (National University of Defense Technology), Jiongyi Chen (National University of Defense Technology), Wenfeng Lin (National University of Defense Technology), Chao Feng (National University of Defense Technology), Chaojing Tang (National University of Defense Technology)
Read MoreREDsec: Running Encrypted Discretized Neural Networks in Seconds
Lars Wolfgang Folkerts (University of Delaware), Charles Gouert (University of Delaware), Nektarios Georgios Tsoutsos (University of Delaware)
Read MoreParakeet: Practical Key Transparency for End-to-End Encrypted Messaging
Harjasleen Malvai (UIUC/IC3), Lefteris Kokoris-Kogias (IST Austria), Alberto Sonnino (Mysten Labs), Esha Ghosh (Microsoft Research), Ercan Oztürk (Meta), Kevin Lewi (Meta), Sean Lawlor (Meta)
Read More