We identify and address two primary challenges for computing on encrypted data in Internet of Things applications: synchronizing encrypted data across devices and selecting an app...
A privacy policy is a statement informing users how their information will be collected, used, and disclosed. Failing to provide a correct privacy policy may result in a fine. Ho...
Anonymity networks such as Tor are a critical privacy-enabling technology. Tor’s hidden services provide both client and server anonymity. They protect the location of the serve...
A general prerequisite for a code reuse attack is that the attacker needs to locate code gadgets that perform the desired operations and then direct the control flow of a vulnerab...
Kangjie Lu, Chengyu Song, Byoungyoung Lee, Simon P...
When data maintained in a decentralized fashion needs to be synchronized or exchanged between different databases, related data sets usually get associated with a unique identi...