Sebastian Meiser, Debajyoti Das, Moritz Kirschte, Esfandiar Mohammadi, Aniket Kate
Mixnets on a Tightrope: Quantifying the Leakage of Mix Networks Using a Provably Optimal Heuristic Adversary
View More Papers
Home Shield IoT Traffic Analyzer: A Comprehensive Analysis of...
Dhananjai Bajpai (Marquette University), Keyang Yu (Marquette University)
Read MoreToo Subtle to Notice: Investigating Executable Stack Issues in...
Hengkai Ye (The Pennsylvania State University), Hong Hu (The Pennsylvania State University)
Read MoreDeanonymizing Device Identities via Side-channel Attacks in Exclusive-use IoTs...
Christopher Ellis (The Ohio State University), Yue Zhang (Drexel University), Mohit Kumar Jangid (The Ohio State University), Shixuan Zhao (The Ohio State University), Zhiqiang Lin (The Ohio State University)
Read MoreMTZK: Testing and Exploring Bugs in Zero-Knowledge (ZK) Compilers
Dongwei Xiao (The Hong Kong University of Science and Technology), Zhibo Liu (The Hong Kong University of Science and Technology), Yiteng Peng (The Hong Kong University of Science and Technology), Shuai Wang (The Hong Kong University of Science and Technology)
Read More