TBA
View More Papers
SpecTaint: Speculative Taint Analysis for Discovering Spectre Gadgets
Zhenxiao Qi (UC Riverside), Qian Feng (Baidu USA), Yueqiang Cheng (NIO Security Research), Mengjia Yan (MIT), Peng Li (ByteDance), Heng Yin (UC Riverside), Tao Wei (Ant Group)
Read MoreLaKSA: A Probabilistic Proof-of-Stake Protocol
Daniel Reijsbergen (Singapore University of Technology and Design), Pawel Szalachowski (Singapore University of Technology and Design), Junming Ke (University of Tartu), Zengpeng Li (Singapore University of Technology and Design), Jianying Zhou (Singapore University of Technology and Design)
Read MoreUser Expectations and Understanding of Encrypted DNS Settings
Alexandra Nisenoff, Nick Feamster, Madeleine A Hoofnagle†, Sydney Zink. (University of Chicago and †Northwestern)
Read MorePrivacyFlash Pro: Automating Privacy Policy Generation for Mobile Apps
Sebastian Zimmeck (Wesleyan University), Rafael Goldstein (Wesleyan University), David Baraka (Wesleyan University)
Read More