Search results

    Product Privacy Journey: Towards a Product Centric Privacy Engineering FrameworkPEPR '20Igor Trindade Oliveira
    Responsible Design through Experimentation: Learnings from LinkedInPEPR '20Guillaume Saint-Jacques
    A Differentially Private Data Analytics API at ScalePEPR '20Ryan Rogers
    Wikipedia and the Lean Data DietPEPR '20Nuria Ruiz
    Privacy Professional Boss ModePEPR '20
    Privacy in DeploymentPEPR '20Patricia Thaine, Pieter Luitjens, Parinaz Sobhani
    Design of a Privacy Infrastructure for the Internet of ThingsPEPR '20Norman Sadeh
    A Backdoor by Any Other Name, and How to Stop ItPEPR '20Maximillian Hunter
    Building an Effective Feedback Loop for Your Privacy Program through Privacy Incident ResponsePEPR '20Sri Pravallika Maddipati
    When Things Go WrongPEPR '20Lea Kissner
    Assessing Privacy Risk with the IPA TriadPEPR '20Mark Funk
    Engineering Ethics into the NIST Privacy FrameworkPEPR '20R. Jason Cronk
    Taking Responsibility for Someone Else's Code: Studying the Privacy Behaviors of Mobile Apps at ScalePEPR '20Serge Egelman
    When Engineers and Lawyers Talk: Right-Sizing Your Data Protection Risk ProfilePEPR '20Rafae Bhatti
    AURORA: Statistical Crash Analysis for Automated Root Cause ExplanationUSENIX Security '20Tim Blazytko, Moritz Schlögel, Cornelius Aschermann, Ali Abbasi, Joel Frank, Simon Wörner, Thorsten Holz
    Shim Shimmeny: Evaluating the Security and Privacy Contributions of Link Shimming in the Modern WebUSENIX Security '20Frank Li
    Everything Old is New Again: Binary Security of WebAssemblyUSENIX Security '20Daniel Lehmann, Johannes Kinder, Michael Pradel
    SmartVerif: Push the Limit of Automation Capability of Verifying Security Protocols by Dynamic StrategiesUSENIX Security '20Yan Xiong, Cheng Su, Wenchao Huang, Fuyou Miao, Wansen Wang, Hengyi Ouyang
    BigMAC: Fine-Grained Policy Analysis of Android FirmwareUSENIX Security '20Grant Hernandez, Dave (Jing) Tian, Anurag Swarnim Yadav, Byron J. Williams, Kevin R.B. Butler
    PhishTime: Continuous Longitudinal Measurement of the Effectiveness of Anti-phishing BlacklistsUSENIX Security '20Adam Oest, Yeganeh Safaei, Penghui Zhang, Brad Wardman, Kevin Tyers, Yan Shoshitaishvili, Adam Doupé
    See No Evil: Phishing for Permissions with False TransparencyUSENIX Security '20Güliz Seray Tuncay, Jingyu Qian, Carl A. Gunter
    A different cup of TI? The added value of commercial threat intelligenceUSENIX Security '20Xander Bouwman, Harm Griffioen, Jelle Egbers, Christian Doerr, Bram Klievink, Michel van Eeten
    HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution EnvironmentsUSENIX Security '20Ghada Dessouky, Tommaso Frassetto, Ahmad-Reza Sadeghi
    TPM-FAIL: TPM meets Timing and Lattice AttacksUSENIX Security '20Daniel Moghimi, Berk Sunar, Thomas Eisenbarth, Nadia Heninger
    CopyCat: Controlled Instruction-Level Attacks on EnclavesUSENIX Security '20Daniel Moghimi, Jo Van Bulck, Nadia Heninger, Frank Piessens, Berk Sunar