TBA
View More Papers
Detecting DolphinAttacks Based on Microphone Array
Guoming Zhang, Xiaoyu Ji (Zhejiang University)
Read MorePhantomCache: Obfuscating Cache Conflicts with Localized Randomization
Qinhan Tan (Zhejiang University), Zhihua Zeng (Zhejiang University), Kai Bu (Zhejiang University), Kui Ren (Zhejiang University)
Read MoreBitcontracts: Supporting Smart Contracts in Legacy Blockchains
Karl Wüst (ETH Zurich), Loris Diana (ETH Zurich), Kari Kostiainen (ETH Zurich), Ghassan Karame (NEC Labs), Sinisa Matetic (ETH Zurich), Srdjan Capkun (ETH Zurich)
Read MoreWhen DNS Goes Dark: Understanding Privacy and Shaping Policy...
Vijay k. Gurbani and Cynthia Hood ( Illinois Institute of Technology), Anita Nikolich (University of Illinois), Henning Schulzrinne (Columbia University) and Radu State (University of Luxembourg)
Read More