arXiv
Your Echos are Heard: Tracking, Profiling, and Ad Targeting in the Amazon Smart Speaker Ecosystem
CRYPTO 2021
Limits on the Adaptive Security of Yao’s Garbling
Euro S&P 2021
Bypassing Memory Safety Mechanisms through Speculative Control Flow Hijacks
IEE S&P 2021
Structural Attacks on Local Routing in Payment Channel Networks
arXiv
Your Echos are Heard: Tracking, Profiling, and Ad Targeting in the Amazon Smart Speaker Ecosystem
CRYPTO 2021
Limits on the Adaptive Security of Yao’s Garbling
Euro S&P 2021
Bypassing Memory Safety Mechanisms through Speculative Control Flow Hijacks
IEE S&P 2021
Structural Attacks on Local Routing in Payment Channel Networks
arXiv
Your Echos are Heard: Tracking, Profiling, and Ad Targeting in the Amazon Smart Speaker Ecosystem
CRYPTO 2021
Limits on the Adaptive Security of Yao’s Garbling
Euro S&P 2021
Bypassing Memory Safety Mechanisms through Speculative Control Flow Hijacks
IEE S&P 2021
Structural Attacks on Local Routing in Payment Channel Networks
arXiv
Your Echos are Heard: Tracking, Profiling, and Ad Targeting in the Amazon Smart Speaker Ecosystem
CRYPTO 2021
Limits on the Adaptive Security of Yao’s Garbling
Euro S&P 2021
Bypassing Memory Safety Mechanisms through Speculative Control Flow Hijacks
IEE S&P 2021
Structural Attacks on Local Routing in Payment Channel Networks
11/3/23
Khoury News
Mynatt, Choffnes welcome NYT’s Kashmir Hill for a chat on the end — and the future — of privacy
10/25/23
Northeastern Global News
The smart home tech inside your home is less secure than you think, new Northeastern research finds
8/17/23
Khoury News
Android browsers threaten user privacy, says Khoury-led international research team
5/30/23
Computing Community Consortium Catalyst
Former CCC Council Member, Kevin Fu, Appointed to White House PCAST Working Group
5/30/23
AAMI Array
Congratulations to the 2023 AAMI Award Winners!
4/24/23
Khoury News
As cyber attacks surge, the Defense Department turns to universities for cybersecurity grads
3/20/23
Khoury News
GPS is critical to modern life. It’s also vulnerable, and this researcher is out to fix that.
2/20/23
The New York Times
It’s Time to Tear Up Big Tech’s Get-Out-of-Jail-Free Card
2/9/23
Boston.com
Is there really such a thing as a private Google search?
1/25/23
Northeastern Global News
Live Nation Entertainment blamed bots for the Taylor Swift ticket fiasco. Is it a legitimate explanation or just an excuse?
11/3/23
Khoury News
Mynatt, Choffnes welcome NYT’s Kashmir Hill for a chat on the end — and the future — of privacy
10/25/23
Northeastern Global News
The smart home tech inside your home is less secure than you think, new Northeastern research finds
8/17/23
Khoury News
Android browsers threaten user privacy, says Khoury-led international research team
5/30/23
Computing Community Consortium Catalyst
Former CCC Council Member, Kevin Fu, Appointed to White House PCAST Working Group
5/30/23
AAMI Array
Congratulations to the 2023 AAMI Award Winners!
4/24/23
Khoury News
As cyber attacks surge, the Defense Department turns to universities for cybersecurity grads
3/20/23
Khoury News
GPS is critical to modern life. It’s also vulnerable, and this researcher is out to fix that.
2/20/23
The New York Times
It’s Time to Tear Up Big Tech’s Get-Out-of-Jail-Free Card
2/9/23
Boston.com
Is there really such a thing as a private Google search?
1/25/23
Northeastern Global News
Live Nation Entertainment blamed bots for the Taylor Swift ticket fiasco. Is it a legitimate explanation or just an excuse?
11/3/23
Khoury News
Mynatt, Choffnes welcome NYT’s Kashmir Hill for a chat on the end — and the future — of privacy
10/25/23
Northeastern Global News
The smart home tech inside your home is less secure than you think, new Northeastern research finds
8/17/23
Khoury News
Android browsers threaten user privacy, says Khoury-led international research team
5/30/23
Computing Community Consortium Catalyst
Former CCC Council Member, Kevin Fu, Appointed to White House PCAST Working Group
5/30/23
AAMI Array
Congratulations to the 2023 AAMI Award Winners!
4/24/23
Khoury News
As cyber attacks surge, the Defense Department turns to universities for cybersecurity grads
3/20/23
Khoury News
GPS is critical to modern life. It’s also vulnerable, and this researcher is out to fix that.
2/20/23
The New York Times
It’s Time to Tear Up Big Tech’s Get-Out-of-Jail-Free Card
2/9/23
Boston.com
Is there really such a thing as a private Google search?
1/25/23
Northeastern Global News
Live Nation Entertainment blamed bots for the Taylor Swift ticket fiasco. Is it a legitimate explanation or just an excuse?
11/3/23
Khoury News
Mynatt, Choffnes welcome NYT’s Kashmir Hill for a chat on the end — and the future — of privacy
10/25/23
Northeastern Global News
The smart home tech inside your home is less secure than you think, new Northeastern research finds
8/17/23
Khoury News
Android browsers threaten user privacy, says Khoury-led international research team
5/30/23
Computing Community Consortium Catalyst
Former CCC Council Member, Kevin Fu, Appointed to White House PCAST Working Group
5/30/23
AAMI Array
Congratulations to the 2023 AAMI Award Winners!
4/24/23
Khoury News
As cyber attacks surge, the Defense Department turns to universities for cybersecurity grads
3/20/23
Khoury News
GPS is critical to modern life. It’s also vulnerable, and this researcher is out to fix that.
2/20/23
The New York Times
It’s Time to Tear Up Big Tech’s Get-Out-of-Jail-Free Card
2/9/23
Boston.com
Is there really such a thing as a private Google search?
1/25/23
Northeastern Global News
Live Nation Entertainment blamed bots for the Taylor Swift ticket fiasco. Is it a legitimate explanation or just an excuse?
Collaborating with experts in industry, government, and academia worldwide, the Institute’s faculty and students research, develop, and enhance technologies on which the world relies.
Â
Collaborating with experts in industry, government, and academia worldwide, the Institute’s faculty and students research, develop, and enhance technologies on which the world relies.
Â
Collaborating with experts in industry, government, and academia worldwide, the Institute’s faculty and students research, develop, and enhance technologies on which the world relies.
Â
Collaborating with experts in industry, government, and academia worldwide, the Institute’s faculty and students research, develop, and enhance technologies on which the world relies.
Â
Our distinctive approach: Partner with us. Using cutting-edge systems design and data from actual security breaches, we solve urgent cyber challenges and keep societies safely connected.
Our distinctive approach: Partner with us. Using cutting-edge systems design and data from actual security breaches, we solve urgent cyber challenges and keep societies safely connected.
Our distinctive approach: Partner with us. Using cutting-edge systems design and data from actual security breaches, we solve urgent cyber challenges and keep societies safely connected.
Our distinctive approach: Partner with us. Using cutting-edge systems design and data from actual security breaches, we solve urgent cyber challenges and keep societies safely connected.