|
To make their services more user friendly, online social media platforms automatically identify text that corresponds to URLs and render it as clickable links. In this paper, we show that the…
name
Beliz Kaleli Date
February 12th, 2021
|
|
name
Phani Vadrevu Date
January 29th, 2021
|
|
Zero-Knowledge (ZK) Proofs are important cryptographic objects that allow an untrusted prover to demonstrate to an untrusted verifier the truth of some statement while revealing nothing additional.…
name
David Heath Date
February 5th, 2021
|
|
In this talk I discuss research which focuses on designing systems needed to secure democracy and democratic political institutions, such as elections, in the interconnected digital world of the…
name
Lefteris Anastasopoulos Date
January 15th, 2021
|
|
Privacy is a multi-faceted challenge for organizations – to be successful, they must take a holistic approach to protecting the personal data and information of all stakeholders. Privacy…
name
Evan Wm Glover Date
November 20th, 2020
|
|
5G NR mmWave opens doors to vast amounts of network capacity, fiber-like speeds and ultra-low latencies that promise to bring new and enhanced experiences to the masses, as well as inherent security…
name
Henry Tong, Larry LaMont Date
October 23rd, 2020
|
|
Cloud FPGAs have been gaining popularity in recent years due to the ability of users to request FPGA resources quickly, flexibly, and on-demand. However, as public cloud providers make FPGAs…
name
Jakub Szefer Date
November 13th, 2020
|
|
name
Youngwook Do Date
November 6th, 2020
|
|
The rapid growth of online advertising has fueled the growth of ad-blocking software, such as new ad-blocking and privacy-oriented browsers or browser extensions. In response, both ad publishers and…
name
Karthika Subramani Date
October 30th, 2020
|
|
Attack surface reduction through the removal of unnecessary application features and code is a promising technique for improving security without incurring any additional overhead. Recent software…
name
Seyedhamed Ghavamnia Date
October 16th, 2020
|
|
name
Peter Swire Date
October 9th, 2020
|
|
Code reuse attacks have been a threat to software security since the introduction of non-executable memory protections. Despite significant advances in various types of additional defenses, such as…
name
Shachee Mishra Date
October 2nd, 2020
|
|
Many consumers today are increasingly concerned about IoT security and privacy. There is much media hype about home cameras being hacked or voice assistants eavesdropping on conversations. However,…
name
Danny Y. Huang Date
September 25th, 2020
|
|
Mobile browsers have become one of the main mediators of our online activities. However, as web pages continue to increase in size and streaming media on-the-go has become commonplace, mobile data…
name
Brian Kondracki Date
September 18th, 2020
|
|
Researchers and censoring regimes have long engaged in a cat-and-mouse game, leading to increasingly sophisticated censorship techniques and methods to evade them. Unfortunately, censors have long…
name
Kevin Bock Date
September 11th, 2020
|
|
1:00-2:15pm – Session 4 Yanni Loukissas, Ph.D. All Data Are Local Swati Gupta - Mathematics of Fair Selection Algorithms Library Host - Ameet Doshi
name
Yanni Loukissas, Swati Gupta, Ameet Doshi Date
August 27th, 2020
|