Sebastian Meiser, Debajyoti Das, Moritz Kirschte, Esfandiar Mohammadi, Aniket Kate
Mixnets on a Tightrope: Quantifying the Leakage of Mix Networks Using a Provably Optimal Heuristic Adversary
View More Papers
What Makes Phishing Simulation Campaigns (Un)Acceptable? A Vignette Experiment
Jasmin Schwab (German Aerospace Center (DLR)), Alexander Nussbaum (University of the Bundeswehr Munich), Anastasia Sergeeva (University of Luxembourg), Florian Alt (University of the Bundeswehr Munich and Ludwig Maximilian University of Munich), and Verena Distler (Aalto University)
Read MoreBlindfold: Confidential Memory Management by Untrusted Operating System
Caihua Li (Yale University), Seung-seob Lee (Yale University), Lin Zhong (Yale University)
Read MoreSecurity Signals: Making Web Security Posture Measurable at Scale
Michele Spagnuolo (Google), David Dworken (Google), Artur Janc (Google), Santiago Díaz (Google), Lukas Weichselbaum (Google)
Read More