Lachlan J. Gunn

Orcid: 0000-0003-1767-7897

According to our database1, Lachlan J. Gunn authored at least 22 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Laminator: Verifiable ML Property Cards using Hardware-assisted Attestations.
CoRR, 2024

BliMe: Verifiably Secure Outsourced Computation with Hardware-Enforced Taint Tracking.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

Data-Oblivious ML Accelerators Using Hardware Security Extensions.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2024

2022
Hardware Platform Security for Mobile Devices.
Found. Trends Priv. Secur., 2022

Towards cryptographically-authenticated in-memory data structures.
Proceedings of the IEEE Secure Development Conference, 2022

2021
PACStack: an Authenticated Call Stack.
Proceedings of the 30th USENIX Security Symposium, 2021

GrandDetAuto: Detecting Malicious Nodes in Large-Scale Autonomous Networks.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021

2020
Linear measurements from nonlinear sensors: Identifying distortion with incidental noise.
IEEE Instrum. Meas. Mag., 2020

2019
Circumventing Cryptographic Deniability with Remote Attestation.
Proc. Priv. Enhancing Technol., 2019

SADAN: Scalable Adversary Detection in Autonomous Networks.
CoRR, 2019

Game theoretical modelling of network/cyber security [Review paper].
CoRR, 2019

Game Theoretical Modelling of Network/Cybersecurity.
IEEE Access, 2019

Making Speculative BFT Resilient with Trusted Monotonic Counters.
Proceedings of the 38th Symposium on Reliable Distributed Systems, 2019

2018
On The Use of Remote Attestation to Break and Repair Deniability.
IACR Cryptol. ePrint Arch., 2018

Anomaly Detection in Satellite Communications Systems using LSTM Networks.
Proceedings of the 2018 Military Communications and Information Systems Conference, 2018

2016
Verifying Public Keys without Trust: How Anonymity Can Guarantee Data Integrity.
CoRR, 2016

2015
A New Transient Attack on the Kish Key Distribution System.
IEEE Access, 2015

2014
Simplified Three-Cornered-Hat Technique for Frequency Stability Measurements.
IEEE Trans. Instrum. Meas., 2014

Geometric Algebra for Electrical and Electronic Engineers.
Proc. IEEE, 2014

A directional coupler attack against the Kish key distribution system.
CoRR, 2014

Real-time compensation of static distortion by measurement of differential noise gain.
Proceedings of the 2014 IEEE Workshop on Signal Processing Systems, 2014

2013
Physical-layer encryption on the public internet: a stochastic approach to the Kish-Sethuraman cipher.
CoRR, 2013


  Loading...