All Stories

  1. Trustworthy AI Using Confidential Federated Learning
  2. Securing DNS resolvers using Trusted Execution Environments
  3. Analyzing Information Leakage of Updates to Natural Language Models
  4. Smart Grid Metering Networks: A Survey on Security, Privacy and Open Research Issues
  5. Toward Linux kernel memory safety
  6. Keys in the Clouds
  7. OmniShare: Encrypted Cloud Storage for the Multi-Device Era
  8. Migrating SGX Enclaves with Persistent State
  9. Mitigating Branch-Shadowing Attacks on Intel SGX using Control Flow Randomization
  10. SafeKeeper
  11. Using SafeKeeper to Protect Web Passwords
  12. LO-FAT
  13. A framework for application partitioning using trusted execution environments
  14. The Circle Game
  15. Security in Automotive Networks
  16. Auditable De-anonymization in V2X Communication
  17. Formal Analysis of V2X Revocation Protocols
  18. Exploring the use of Intel SGX for Secure Many-Party Applications
  19. Protecting Password Databases using Trusted Hardware
  20. C-FLAT
  21. Applying the Trustworthy Remote Entity to Privacy-Preserving Multiparty Computation: Requirements and Criteria for Large-Scale Applications
  22. Invited - Things, trouble, trust
  23. Privacy-enhanced bi-directional communication in the Smart Grid using trusted computing
  24. Characteristic-based security analysis of personal networks
  25. Security and Privacy in Smart Grid Demand Response Systems
  26. Hardware Security for Device Authentication in the Smart Grid
  27. Personal PKI for the Smart Device Era
  28. Mobile device-based cellular network coverage analysis using crowd sourcing