From Confidential Computing to Zero Trust, Come Along for the (Bumpy?) RideMengmei YeSandhya Koteshwaraet al.2024MICRO 2024
MoJE: Mixture of Jailbreak Experts, Naive Tabular Classifiers as Guard for Prompt AttacksGiandomenico CornacchiaKieran Fraseret al.2024AIES 2024
Password-Protected Key Retrieval with(out) HSM ProtectionSebastian FallerTobias Handirket al.2024CCS 2024
Crossing Shifted Moats: Replacing Old Bridges with New Tunnels to Confidential ContainersRay ValdezMd Salman Ahmedet al.2024CCS 2024
Understanding Legal Professionals’ Practices and Expectations in Data Breach Incident ReportingEce GumuselYue Xiaoet al.2024CCS 2024
The LaZer Library: Lattice-Based Zero Knowledge and Succinct Proofs for Quantum-Safe PrivacyVadim LyubashevskyGregor Seileret al.2024CCS 2024
Manipulating OpenFlow Link Discovery Packet Forwarding for Topology PoisoningMingming ChenTom La Portaet al.2024CCS 2024