All Stories

  1. On Hyperparameters and Backdoor-Resistance in Horizontal Federated Learning
  2. Defying the Odds: Solana's Unexpected Resilience in Spite of the Security Challenges Faced by Developers
  3. No Forking Way: Detecting Cloning Attacks on Intel SGX Applications
  4. Fuzz on the Beach: Fuzzing Solana Smart Contracts
  5. On the Challenges of Detecting Side-Channel Attacks in SGX
  6. Mitosis: Practically Scaling Permissioned Blockchains
  7. Regulating Storage Overhead in Existing PoW-based Blockchains
  8. Towards Secure and Scalable Blockchain Technologies
  9. On the Security of Randomized Defenses Against Adversarial Samples
  10. CCSW'17
  11. Securing Cloud Data under Key Exposure
  12. Towards Scalable and Private Industrial Blockchains
  13. Sharing Proofs of Retrievability across Tenants
  14. Reconciling Security and Functional Requirements in Multi-tenant Clouds
  15. On the Security and Scalability of Bitcoin's Blockchain
  16. On the Security and Performance of Proof of Work Blockchains
  17. On the Fingerprinting of Software-Defined Networks
  18. Cases for Including a Reference Monitor to SDN
  19. On Information Leakage in Deduplicated Storage Systems
  20. Fingerprinting Software-Defined Networks
  21. Tampering with the Delivery of Blocks and Transactions in Bitcoin
  22. Transparent Data Deduplication in the Cloud
  23. Commune
  24. Misbehavior in Bitcoin
  25. Towards an access control scheme for accessing flows in SDN
  26. Ripple: Overview and Outlook
  27. Secure Erasure and Code Update in Legacy Sensors
  28. Enabling Anonymous Authorization and Rewarding in the Smart Grid
  29. On the privacy provisions of Bloom filters in lightweight bitcoin clients
  30. Outsourced Proofs of Retrievability
  31. Microcomputations as Micropayments in Web-based Services
  32. Is Bitcoin a Decentralized Currency?
  33. Towards a Richer Set of Services in Software-Defined Networks
  34. Hiding Transaction Amounts and Balances in Bitcoin
  35. PrivLoc: Preventing Location Tracking in Geofencing Services
  36. Privacy-Friendly Planning of Energy Distribution in Smart Grids
  37. Access control for SDN controllers
  38. Towards Trustworthy Network Measurements
  39. Privacy-friendly tasking and trading of energy in smart grids
  40. PoWerStore
  41. Evaluating User Privacy in Bitcoin
  42. Double-spending fast payments in bitcoin
  43. Privacy-preserving outsourcing of brute-force key searches
  44. Pay as you browse
  45. Enabling secure VM-vTPM migration in private clouds
  46. Integrity Regions: Authentication through Presence in Wireless Networks
  47. Low-Cost Client Puzzles Based on Modular Exponentiation
  48. Small Coalitions: Lightweight Collaboration for Efficient P2P Downloads
  49. Secure Remote Execution of Sequential Computations
  50. On the Security of Bottleneck Bandwidth Estimation Techniques
  51. A Secure Hybrid Reputation Management System for Super-Peer Networks
  52. SuperTrust
  53. SuperTrust – A Secure and Efficient Framework for Handling Trust in Super Peer Networks