2024
Trustworthy AI Using Confidential Federated Learning.
Commun. ACM, September, 2024
Trustworthy AI using Confidential Federated Learning: Federated learning and confidential computing are not competing technologies.
ACM Queue, 2024
ExclaveFL: Providing Transparency to Federated Learning using Exclaves.
CoRR, 2024
Permissive Information-Flow Analysis for Large Language Models.
CoRR, 2024
Are you still on track!? Catching LLM Task Drift with Activations.
CoRR, 2024
Closed-Form Bounds for DP-SGD against Record-level Inference.
Proceedings of the 33rd USENIX Security Symposium, 2024
2023
On the Efficacy of Differentially Private Few-shot Image Classification.
Trans. Mach. Learn. Res., 2023
Maatphor: Automated Variant Analysis for Prompt Injection Attacks.
CoRR, 2023
Rethinking Privacy in Machine Learning Pipelines from an Information Flow Control Perspective.
CoRR, 2023
An Empirical Study & Evaluation of Modern CAPTCHAs.
Proceedings of the 32nd USENIX Security Symposium, 2023
SoK: Let the Privacy Games Begin! A Unified Treatment of Data Inference Privacy in Machine Learning.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
VICEROY: GDPR-/CCPA-compliant Enforcement of Verifiable Accountless Consumer Requests.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Bayesian Estimation of Differential Privacy.
Proceedings of the International Conference on Machine Learning, 2023
2022
Dropbear: Machine Learning Marketplaces made Trustworthy with Byzantine Model Agreement.
CoRR, 2022
CTR: Checkpoint, Transfer, and Restore for Secure Enclaves.
CoRR, 2022
Pre-hijacked accounts: An Empirical Study of Security Failures in User Account Creation on the Web.
Proceedings of the 31st USENIX Security Symposium, 2022
2021
PDoT: Private DNS-over-TLS with TEE Support.
DTRAP, 2021
CACTI: Captcha Avoidance via Client-side TEE Integration.
Proceedings of the 30th USENIX Security Symposium, 2021
Grey-box Extraction of Natural Language Models.
Proceedings of the 38th International Conference on Machine Learning, 2021
2020
Analyzing Information Leakage of Updates to Natural Language Models.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
Smart Grid Metering Networks: A Survey on Security, Privacy and Open Research Issues.
IEEE Commun. Surv. Tutorials, 2019
Sustainable Security & Safety: Challenges and Opportunities.
Proceedings of the 4th International Workshop on Security and Dependability of Critical Embedded Real-Time Systems, 2019
HardScope: Hardening Embedded Systems Against Data-Oriented Attacks.
Proceedings of the 56th Annual Design Automation Conference 2019, 2019
S-FaaS: Trustworthy and Accountable Function-as-a-Service using Intel SGX.
Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop, 2019
2018
Toward Linux kernel memory safety.
Softw. Pract. Exp., 2018
OmniShare: Encrypted Cloud Storage for the Multi-Device Era.
IEEE Internet Comput., 2018
Mitigating Branch-Shadowing Attacks on Intel SGX using Control Flow Randomization.
CoRR, 2018
Using SafeKeeper to Protect Web Passwords.
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018
SafeKeeper: Protecting Web Passwords using Trusted Execution Environments.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018
Migrating SGX Enclaves with Persistent State.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018
Keys in the Clouds: Auditable Multi-device Access to Cryptographic Credentials.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
2017
Security in Automotive Networks: Lightweight Authentication and Authorization.
ACM Trans. Design Autom. Electr. Syst., 2017
Auditable De-anonymization in V2X Communication.
J. ICT Stand., 2017
Towards Linux Kernel Memory Safety.
CoRR, 2017
Protecting Web Passwords from Rogue Servers using Trusted Execution Environments.
CoRR, 2017
HardScope: Thwarting DOP with Hardware-assisted Run-time Scope Enforcement.
CoRR, 2017
A framework for application partitioning using trusted execution environments.
Concurr. Comput. Pract. Exp., 2017
Formal Analysis of V2X Revocation Protocols.
Proceedings of the Security and Trust Management - 13th International Workshop, 2017
LO-FAT: Low-Overhead Control Flow ATtestation in Hardware.
Proceedings of the 54th Annual Design Automation Conference, 2017
The Circle Game: Scalable Private Membership Test Using Trusted Hardware.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
2016
Trustworthy and Secure Service-Oriented Architecture for the Internet of Things.
CoRR, 2016
Applying the Trustworthy Remote Entity to Privacy-Preserving Multiparty Computation: Requirements and Criteria for Large-Scale Applications.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016
Exploring the use of Intel SGX for Secure Many-Party Applications.
Proceedings of the 1st Workshop on System Software for Trusted Execution, 2016
Protecting Password Databases using Trusted Hardware.
Proceedings of the 1st Workshop on System Software for Trusted Execution, 2016
Invited - Things, trouble, trust: on building trust in IoT systems.
Proceedings of the 53rd Annual Design Automation Conference, 2016
C-FLAT: Control-Flow Attestation for Embedded Systems Software.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
OmniShare: Securely Accessing Encrypted Cloud Storage from Multiple Authorized Devices.
CoRR, 2015
2014
Security and Privacy in Smart Grid Demand Response Systems.
Proceedings of the Smart Grid Security - Second International Workshop, 2014
Privacy-enhanced bi-directional communication in the Smart Grid using trusted computing.
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014
Characteristic-based security analysis of personal networks.
Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2014
2013
Towards Enhancing Web Application Security Using Trusted Execution.
Proceedings of the Workshop on Web Applications and Secure Hardware (WASH'13), 2013
2012
Hardware Security for Device Authentication in the Smart Grid.
Proceedings of the Smart Grid Security - First International Workshop, 2012
Personal PKI for the Smart Device Era.
Proceedings of the Public Key Infrastructures, Services and Applications, 2012
2011
Mobile device-based cellular network coverage analysis using crowd sourcing.
Proceedings of EUROCON 2011, 2011