arXiv
Your Echos are Heard: Tracking, Profiling, and Ad Targeting in the Amazon Smart Speaker Ecosystem
CRYPTO 2021
Limits on the Adaptive Security of Yao’s Garbling
Euro S&P 2021
Bypassing Memory Safety Mechanisms through Speculative Control Flow Hijacks
IEE S&P 2021
Structural Attacks on Local Routing in Payment Channel Networks
arXiv
Your Echos are Heard: Tracking, Profiling, and Ad Targeting in the Amazon Smart Speaker Ecosystem
CRYPTO 2021
Limits on the Adaptive Security of Yao’s Garbling
Euro S&P 2021
Bypassing Memory Safety Mechanisms through Speculative Control Flow Hijacks
IEE S&P 2021
Structural Attacks on Local Routing in Payment Channel Networks
arXiv
Your Echos are Heard: Tracking, Profiling, and Ad Targeting in the Amazon Smart Speaker Ecosystem
CRYPTO 2021
Limits on the Adaptive Security of Yao’s Garbling
Euro S&P 2021
Bypassing Memory Safety Mechanisms through Speculative Control Flow Hijacks
IEE S&P 2021
Structural Attacks on Local Routing in Payment Channel Networks
arXiv
Your Echos are Heard: Tracking, Profiling, and Ad Targeting in the Amazon Smart Speaker Ecosystem
CRYPTO 2021
Limits on the Adaptive Security of Yao’s Garbling
Euro S&P 2021
Bypassing Memory Safety Mechanisms through Speculative Control Flow Hijacks
IEE S&P 2021
Structural Attacks on Local Routing in Payment Channel Networks
1/25/23
Northeastern Global News
Live Nation Entertainment blamed bots for the Taylor Swift ticket fiasco. Is it a legitimate explanation or just an excuse?
1/23/23
Khoury News
He helped establish the medical device security field. Now, Kevin Fu is an ACM Fellow
1/20/23
WCHS TV
T-Mobile breach latest high-profile incident of US consumers having data exposed
1/19/23
Northeastern Global News
Professor headed to White House, will oversee implementation of AI ‘bill of rights’
1/18/23
ProPublica
Websites Selling Abortion Pills Are Sharing Sensitive Data With Google
1/3/23
CNET
Look Out for These 3 Red Flags Before Downloading an App Over the Holidays
12/21/22
Politico
Data brokers raise privacy concerns — but get millions from the federal government
10/27/22
Northeastern Global News
Facebook Segments Ads by Race and Age Based on Photos Whether Advertisers Want It or Not, Study Says
9/9/22
Lifewire
New Wi-Fi 6E Routers Could Be Disastrous for Mission-Critical Services
7/31/22
The Wall Street Journal
Why you should or shouldn’t buy a home security camera
7/25/22
Khoury News
Internet connection or diversity — for this researcher, it’s all about access
1/25/23
Northeastern Global News
Live Nation Entertainment blamed bots for the Taylor Swift ticket fiasco. Is it a legitimate explanation or just an excuse?
1/23/23
Khoury News
He helped establish the medical device security field. Now, Kevin Fu is an ACM Fellow
1/20/23
WCHS TV
T-Mobile breach latest high-profile incident of US consumers having data exposed
1/19/23
Northeastern Global News
Professor headed to White House, will oversee implementation of AI ‘bill of rights’
1/18/23
ProPublica
Websites Selling Abortion Pills Are Sharing Sensitive Data With Google
1/3/23
CNET
Look Out for These 3 Red Flags Before Downloading an App Over the Holidays
12/21/22
Politico
Data brokers raise privacy concerns — but get millions from the federal government
10/27/22
Northeastern Global News
Facebook Segments Ads by Race and Age Based on Photos Whether Advertisers Want It or Not, Study Says
9/9/22
Lifewire
New Wi-Fi 6E Routers Could Be Disastrous for Mission-Critical Services
7/31/22
The Wall Street Journal
Why you should or shouldn’t buy a home security camera
7/25/22
Khoury News
Internet connection or diversity — for this researcher, it’s all about access
1/25/23
Northeastern Global News
Live Nation Entertainment blamed bots for the Taylor Swift ticket fiasco. Is it a legitimate explanation or just an excuse?
1/23/23
Khoury News
He helped establish the medical device security field. Now, Kevin Fu is an ACM Fellow
1/20/23
WCHS TV
T-Mobile breach latest high-profile incident of US consumers having data exposed
1/19/23
Northeastern Global News
Professor headed to White House, will oversee implementation of AI ‘bill of rights’
1/18/23
ProPublica
Websites Selling Abortion Pills Are Sharing Sensitive Data With Google
1/3/23
CNET
Look Out for These 3 Red Flags Before Downloading an App Over the Holidays
12/21/22
Politico
Data brokers raise privacy concerns — but get millions from the federal government
10/27/22
Northeastern Global News
Facebook Segments Ads by Race and Age Based on Photos Whether Advertisers Want It or Not, Study Says
9/9/22
Lifewire
New Wi-Fi 6E Routers Could Be Disastrous for Mission-Critical Services
7/31/22
The Wall Street Journal
Why you should or shouldn’t buy a home security camera
7/25/22
Khoury News
Internet connection or diversity — for this researcher, it’s all about access
1/25/23
Northeastern Global News
Live Nation Entertainment blamed bots for the Taylor Swift ticket fiasco. Is it a legitimate explanation or just an excuse?
1/23/23
Khoury News
He helped establish the medical device security field. Now, Kevin Fu is an ACM Fellow
1/20/23
WCHS TV
T-Mobile breach latest high-profile incident of US consumers having data exposed
1/19/23
Northeastern Global News
Professor headed to White House, will oversee implementation of AI ‘bill of rights’
1/18/23
ProPublica
Websites Selling Abortion Pills Are Sharing Sensitive Data With Google
1/3/23
CNET
Look Out for These 3 Red Flags Before Downloading an App Over the Holidays
12/21/22
Politico
Data brokers raise privacy concerns — but get millions from the federal government
10/27/22
Northeastern Global News
Facebook Segments Ads by Race and Age Based on Photos Whether Advertisers Want It or Not, Study Says
9/9/22
Lifewire
New Wi-Fi 6E Routers Could Be Disastrous for Mission-Critical Services
7/31/22
The Wall Street Journal
Why you should or shouldn’t buy a home security camera
7/25/22
Khoury News
Internet connection or diversity — for this researcher, it’s all about access
Collaborating with experts in industry, government, and academia worldwide, the Institute’s faculty and students research, develop, and enhance technologies on which the world relies.
Â
Collaborating with experts in industry, government, and academia worldwide, the Institute’s faculty and students research, develop, and enhance technologies on which the world relies.
Â
Collaborating with experts in industry, government, and academia worldwide, the Institute’s faculty and students research, develop, and enhance technologies on which the world relies.
Â
Collaborating with experts in industry, government, and academia worldwide, the Institute’s faculty and students research, develop, and enhance technologies on which the world relies.
Â
Our distinctive approach: Partner with us. Using cutting-edge systems design and data from actual security breaches, we solve urgent cyber challenges and keep societies safely connected.
Our distinctive approach: Partner with us. Using cutting-edge systems design and data from actual security breaches, we solve urgent cyber challenges and keep societies safely connected.
Our distinctive approach: Partner with us. Using cutting-edge systems design and data from actual security breaches, we solve urgent cyber challenges and keep societies safely connected.
Our distinctive approach: Partner with us. Using cutting-edge systems design and data from actual security breaches, we solve urgent cyber challenges and keep societies safely connected.