All Stories

  1. Attestable Builds: Compiling Verifiable Binaries on Untrusted Systems using Trusted Execution Environments
  2. Which traps attract computer hackers? Which don't?
  3. Extending Cloud Build Systems to Eliminate Transitive Trust
  4. Adversary Models for Mobile Device Authentication
  5. Analyzing inconsistencies in the Tor consensus
  6. DAMFA: Decentralized Anonymous Multi-Factor Authentication
  7. Optimal derotation of shared acceleration time series by determining relative spatial alignment
  8. A Survey of User Interaction for Spontaneous Device Association