Homomorphically securing ai at the edgeJakob NauckeHamish Huntet al.2019AIChallengeIoT/ACM SenSys 2019
Smotherspectre: Exploiting speculative execution through port contentionAtri BhattacharyyaAlessandro Sorniottiet al.2019CCS 2019
Trusted computing meets blockchain: Rollback attacks and a solution for hyperledger fabricMarcus BrandenburgerChristian Cachinet al.2019SRDS 2019
TrusTFS: An SGX-enabled Stackable File System FrameworkTânia EstevesRicardo Macedoet al.2019SRDSW 2019
An Extensible De-Identification Framework for Privacy Protection of Unstructured Health Information: Creating Sustainable Privacy InfrastructuresStefano BraghinJoao Bettencourt-Silvaet al.2019MEDINFO 2019
Anti-Money Laundering in Bitcoin: Experimenting with Graph Convolutional Networks for Financial ForensicsMark WeberGiacomo Domeniconiet al.2019KDD 2019
Algebraic Techniques for Short(er) Exact Lattice-Based Zero-Knowledge ProofsJonathan BootleVadim Lyubashevskyet al.2019CRYPTO 2019
On Efficiently Processing Workflow Provenance Queries in SparkRajmohan CPranay Kumar Lohiaet al.2019ICDCS 2019
AnonTokens: tracing re-identification attacks through decoy recordsSpiros AntonatosStefano Braghinet al.2019arXiv
Memory Categorization: Separating Attacker-Controlled DataMatthias NeugschwandtnerAlessandro Sorniottiet al.2019DIMVA 2019