Andrew Paverd

Orcid: 0000-0003-2188-5285

Affiliations:
  • Microsoft Research Ltd,Cambridge, UK
  • Aalto University
  • University of Oxford (former)


According to our database1, Andrew Paverd authored at least 53 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Trustworthy AI Using Confidential Federated Learning.
Commun. ACM, September, 2024

Trustworthy AI using Confidential Federated Learning: Federated learning and confidential computing are not competing technologies.
ACM Queue, 2024

Permissive Information-Flow Analysis for Large Language Models.
CoRR, 2024

Are you still on track!? Catching LLM Task Drift with Activations.
CoRR, 2024

Closed-Form Bounds for DP-SGD against Record-level Inference.
Proceedings of the 33rd USENIX Security Symposium, 2024

2023
On the Efficacy of Differentially Private Few-shot Image Classification.
Trans. Mach. Learn. Res., 2023

Maatphor: Automated Variant Analysis for Prompt Injection Attacks.
CoRR, 2023

Rethinking Privacy in Machine Learning Pipelines from an Information Flow Control Perspective.
CoRR, 2023

An Empirical Study & Evaluation of Modern CAPTCHAs.
Proceedings of the 32nd USENIX Security Symposium, 2023

SoK: Let the Privacy Games Begin! A Unified Treatment of Data Inference Privacy in Machine Learning.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

VICEROY: GDPR-/CCPA-compliant Enforcement of Verifiable Accountless Consumer Requests.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Bayesian Estimation of Differential Privacy.
Proceedings of the International Conference on Machine Learning, 2023

2022
Dropbear: Machine Learning Marketplaces made Trustworthy with Byzantine Model Agreement.
CoRR, 2022

CTR: Checkpoint, Transfer, and Restore for Secure Enclaves.
CoRR, 2022

Pre-hijacked accounts: An Empirical Study of Security Failures in User Account Creation on the Web.
Proceedings of the 31st USENIX Security Symposium, 2022

2021
CACTI: Captcha Avoidance via Client-side TEE Integration.
Proceedings of the 30th USENIX Security Symposium, 2021

Grey-box Extraction of Natural Language Models.
Proceedings of the 38th International Conference on Machine Learning, 2021

2020
Analyzing Information Leakage of Updates to Natural Language Models.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Smart Grid Metering Networks: A Survey on Security, Privacy and Open Research Issues.
IEEE Commun. Surv. Tutorials, 2019

Sustainable Security & Safety: Challenges and Opportunities.
Proceedings of the 4th International Workshop on Security and Dependability of Critical Embedded Real-Time Systems, 2019

HardScope: Hardening Embedded Systems Against Data-Oriented Attacks.
Proceedings of the 56th Annual Design Automation Conference 2019, 2019

S-FaaS: Trustworthy and Accountable Function-as-a-Service using Intel SGX.
Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop, 2019

PDoT: private DNS-over-TLS with TEE support.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Toward Linux kernel memory safety.
Softw. Pract. Exp., 2018

OmniShare: Encrypted Cloud Storage for the Multi-Device Era.
IEEE Internet Comput., 2018

Mitigating Branch-Shadowing Attacks on Intel SGX using Control Flow Randomization.
CoRR, 2018

Using SafeKeeper to Protect Web Passwords.
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018

SafeKeeper: Protecting Web Passwords using Trusted Execution Environments.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

Migrating SGX Enclaves with Persistent State.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

Keys in the Clouds: Auditable Multi-device Access to Cryptographic Credentials.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Security in Automotive Networks: Lightweight Authentication and Authorization.
ACM Trans. Design Autom. Electr. Syst., 2017

Auditable De-anonymization in V2X Communication.
J. ICT Stand., 2017

Towards Linux Kernel Memory Safety.
CoRR, 2017

Protecting Web Passwords from Rogue Servers using Trusted Execution Environments.
CoRR, 2017

HardScope: Thwarting DOP with Hardware-assisted Run-time Scope Enforcement.
CoRR, 2017

A framework for application partitioning using trusted execution environments.
Concurr. Comput. Pract. Exp., 2017

Formal Analysis of V2X Revocation Protocols.
Proceedings of the Security and Trust Management - 13th International Workshop, 2017

LO-FAT: Low-Overhead Control Flow ATtestation in Hardware.
Proceedings of the 54th Annual Design Automation Conference, 2017

The Circle Game: Scalable Private Membership Test Using Trusted Hardware.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Trustworthy and Secure Service-Oriented Architecture for the Internet of Things.
CoRR, 2016

Applying the Trustworthy Remote Entity to Privacy-Preserving Multiparty Computation: Requirements and Criteria for Large-Scale Applications.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016

Exploring the use of Intel SGX for Secure Many-Party Applications.
Proceedings of the 1st Workshop on System Software for Trusted Execution, 2016

Protecting Password Databases using Trusted Hardware.
Proceedings of the 1st Workshop on System Software for Trusted Execution, 2016

Invited - Things, trouble, trust: on building trust in IoT systems.
Proceedings of the 53rd Annual Design Automation Conference, 2016

C-FLAT: Control-Flow Attestation for Embedded Systems Software.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
OmniShare: Securely Accessing Encrypted Cloud Storage from Multiple Authorized Devices.
CoRR, 2015

2014
Security and Privacy in Smart Grid Demand Response Systems.
Proceedings of the Smart Grid Security - Second International Workshop, 2014

Privacy-enhanced bi-directional communication in the Smart Grid using trusted computing.
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014

Characteristic-based security analysis of personal networks.
Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2014

2013
Towards Enhancing Web Application Security Using Trusted Execution.
Proceedings of the Workshop on Web Applications and Secure Hardware (WASH'13), 2013

2012
Hardware Security for Device Authentication in the Smart Grid.
Proceedings of the Smart Grid Security - First International Workshop, 2012

Personal PKI for the Smart Device Era.
Proceedings of the Public Key Infrastructures, Services and Applications, 2012

2011
Mobile device-based cellular network coverage analysis using crowd sourcing.
Proceedings of EUROCON 2011, 2011


  Loading...