arXiv
Your Echos are Heard: Tracking, Profiling, and Ad Targeting in the Amazon Smart Speaker Ecosystem
CRYPTO 2021
Limits on the Adaptive Security of Yao’s Garbling
Euro S&P 2021
Bypassing Memory Safety Mechanisms through Speculative Control Flow Hijacks
IEE S&P 2021
Structural Attacks on Local Routing in Payment Channel Networks
arXiv
Your Echos are Heard: Tracking, Profiling, and Ad Targeting in the Amazon Smart Speaker Ecosystem
CRYPTO 2021
Limits on the Adaptive Security of Yao’s Garbling
Euro S&P 2021
Bypassing Memory Safety Mechanisms through Speculative Control Flow Hijacks
IEE S&P 2021
Structural Attacks on Local Routing in Payment Channel Networks
arXiv
Your Echos are Heard: Tracking, Profiling, and Ad Targeting in the Amazon Smart Speaker Ecosystem
CRYPTO 2021
Limits on the Adaptive Security of Yao’s Garbling
Euro S&P 2021
Bypassing Memory Safety Mechanisms through Speculative Control Flow Hijacks
IEE S&P 2021
Structural Attacks on Local Routing in Payment Channel Networks
arXiv
Your Echos are Heard: Tracking, Profiling, and Ad Targeting in the Amazon Smart Speaker Ecosystem
CRYPTO 2021
Limits on the Adaptive Security of Yao’s Garbling
Euro S&P 2021
Bypassing Memory Safety Mechanisms through Speculative Control Flow Hijacks
IEE S&P 2021
Structural Attacks on Local Routing in Payment Channel Networks
12/8/25
Khoury News
How to protect yourself while shopping online this holiday season
12/3/25
Northeastern Global News
TikTok still delivering self-harm and suicidal content in France, Northeastern research finds
11/21/25
Northeastern Global News
The five crucial ways LLMs can endanger your privacy
11/21/25
Northeastern Global News
After Google and Meta antitrust cases, experts say the courtroom may be the wrong venue for challenging Big Tech
10/20/25
Northeastern Global News
What caused Amazon Web Services to go down? A Northeastern expert explains
10/10/25
Northeastern Global News
Pro-Palestinian posts on TikTok continue to vastly outnumber pro-Israel posts, research shows
9/15/25
CBS News
CBS: What can be done to slow misinformation in the digital age
9/10/25
Khoury News
Khoury researchers find political censorship in Chinese AI model … and explain how to get around it
9/13/25
CNET
No, Your iPhone Isn’t Listening to You. But the Truth Is Even Worse
9/3/25
Wired
Wired: How Disinformation About the Minnesota Shooting Spread Like Wildfire on X
12/8/25
Khoury News
How to protect yourself while shopping online this holiday season
12/3/25
Northeastern Global News
TikTok still delivering self-harm and suicidal content in France, Northeastern research finds
11/21/25
Northeastern Global News
The five crucial ways LLMs can endanger your privacy
11/21/25
Northeastern Global News
After Google and Meta antitrust cases, experts say the courtroom may be the wrong venue for challenging Big Tech
10/20/25
Northeastern Global News
What caused Amazon Web Services to go down? A Northeastern expert explains
10/10/25
Northeastern Global News
Pro-Palestinian posts on TikTok continue to vastly outnumber pro-Israel posts, research shows
9/15/25
CBS News
CBS: What can be done to slow misinformation in the digital age
9/10/25
Khoury News
Khoury researchers find political censorship in Chinese AI model … and explain how to get around it
9/13/25
CNET
No, Your iPhone Isn’t Listening to You. But the Truth Is Even Worse
9/3/25
Wired
Wired: How Disinformation About the Minnesota Shooting Spread Like Wildfire on X
12/8/25
Khoury News
How to protect yourself while shopping online this holiday season
12/3/25
Northeastern Global News
TikTok still delivering self-harm and suicidal content in France, Northeastern research finds
11/21/25
Northeastern Global News
The five crucial ways LLMs can endanger your privacy
11/21/25
Northeastern Global News
After Google and Meta antitrust cases, experts say the courtroom may be the wrong venue for challenging Big Tech
10/20/25
Northeastern Global News
What caused Amazon Web Services to go down? A Northeastern expert explains
10/10/25
Northeastern Global News
Pro-Palestinian posts on TikTok continue to vastly outnumber pro-Israel posts, research shows
9/15/25
CBS News
CBS: What can be done to slow misinformation in the digital age
9/10/25
Khoury News
Khoury researchers find political censorship in Chinese AI model … and explain how to get around it
9/13/25
CNET
No, Your iPhone Isn’t Listening to You. But the Truth Is Even Worse
9/3/25
Wired
Wired: How Disinformation About the Minnesota Shooting Spread Like Wildfire on X
12/8/25
Khoury News
How to protect yourself while shopping online this holiday season
12/3/25
Northeastern Global News
TikTok still delivering self-harm and suicidal content in France, Northeastern research finds
11/21/25
Northeastern Global News
The five crucial ways LLMs can endanger your privacy
11/21/25
Northeastern Global News
After Google and Meta antitrust cases, experts say the courtroom may be the wrong venue for challenging Big Tech
10/20/25
Northeastern Global News
What caused Amazon Web Services to go down? A Northeastern expert explains
10/10/25
Northeastern Global News
Pro-Palestinian posts on TikTok continue to vastly outnumber pro-Israel posts, research shows
9/15/25
CBS News
CBS: What can be done to slow misinformation in the digital age
9/10/25
Khoury News
Khoury researchers find political censorship in Chinese AI model … and explain how to get around it
9/13/25
CNET
No, Your iPhone Isn’t Listening to You. But the Truth Is Even Worse
9/3/25
Wired
Wired: How Disinformation About the Minnesota Shooting Spread Like Wildfire on X
Collaborating with experts in industry, government, and academia worldwide, the Institute’s faculty and students research, develop, and enhance technologies on which the world relies.
Â
Collaborating with experts in industry, government, and academia worldwide, the Institute’s faculty and students research, develop, and enhance technologies on which the world relies.
Â
Collaborating with experts in industry, government, and academia worldwide, the Institute’s faculty and students research, develop, and enhance technologies on which the world relies.
Â
Collaborating with experts in industry, government, and academia worldwide, the Institute’s faculty and students research, develop, and enhance technologies on which the world relies.
Â
Our distinctive approach: Partner with us. Using cutting-edge systems design and data from actual security breaches, we solve urgent cyber challenges and keep societies safely connected.
Our distinctive approach: Partner with us. Using cutting-edge systems design and data from actual security breaches, we solve urgent cyber challenges and keep societies safely connected.
Our distinctive approach: Partner with us. Using cutting-edge systems design and data from actual security breaches, we solve urgent cyber challenges and keep societies safely connected.
Our distinctive approach: Partner with us. Using cutting-edge systems design and data from actual security breaches, we solve urgent cyber challenges and keep societies safely connected.