arXiv
Your Echos are Heard: Tracking, Profiling, and Ad Targeting in the Amazon Smart Speaker Ecosystem
CRYPTO 2021
Limits on the Adaptive Security of Yao’s Garbling
Euro S&P 2021
Bypassing Memory Safety Mechanisms through Speculative Control Flow Hijacks
IEE S&P 2021
Structural Attacks on Local Routing in Payment Channel Networks
arXiv
Your Echos are Heard: Tracking, Profiling, and Ad Targeting in the Amazon Smart Speaker Ecosystem
CRYPTO 2021
Limits on the Adaptive Security of Yao’s Garbling
Euro S&P 2021
Bypassing Memory Safety Mechanisms through Speculative Control Flow Hijacks
IEE S&P 2021
Structural Attacks on Local Routing in Payment Channel Networks
arXiv
Your Echos are Heard: Tracking, Profiling, and Ad Targeting in the Amazon Smart Speaker Ecosystem
CRYPTO 2021
Limits on the Adaptive Security of Yao’s Garbling
Euro S&P 2021
Bypassing Memory Safety Mechanisms through Speculative Control Flow Hijacks
IEE S&P 2021
Structural Attacks on Local Routing in Payment Channel Networks
arXiv
Your Echos are Heard: Tracking, Profiling, and Ad Targeting in the Amazon Smart Speaker Ecosystem
CRYPTO 2021
Limits on the Adaptive Security of Yao’s Garbling
Euro S&P 2021
Bypassing Memory Safety Mechanisms through Speculative Control Flow Hijacks
IEE S&P 2021
Structural Attacks on Local Routing in Payment Channel Networks
4/28/22
The Verge
Researchers find Amazon uses Alexa voice data to target you with ads
4/14/22
News @ Northeastern
What the $600M cryptocurrency heist means for future of blockchain security
3/9/22
Khoury News
Accountable AI: senior policy researcher Amba Kak brings new expertise to the Cybersecurity and Privacy Institute
12/16/21
News @ Northeastern
How to Stay Safe While Online Shopping For The Holidays
11/19/21
Reuters
Amazon wages secret war on Americans’ privacy, documents show
11/9/21
News@Northeastern
Facebook Isn’t Shutting Down Its Facial Recognition System After All
10/13/21
Khoury News
Studio apartment or research lab? Inside Khoury College’s cybersecurity and privacy research
10/7/21
News @ Northeastern
Institute members awarded $15.7 million grant from the NSF
9/29/21
Washington Post
The fight to get tech giants to reveal their data is coming to a head in Congress
4/28/22
The Verge
Researchers find Amazon uses Alexa voice data to target you with ads
4/14/22
News @ Northeastern
What the $600M cryptocurrency heist means for future of blockchain security
3/9/22
Khoury News
Accountable AI: senior policy researcher Amba Kak brings new expertise to the Cybersecurity and Privacy Institute
12/16/21
News @ Northeastern
How to Stay Safe While Online Shopping For The Holidays
11/19/21
Reuters
Amazon wages secret war on Americans’ privacy, documents show
11/9/21
News@Northeastern
Facebook Isn’t Shutting Down Its Facial Recognition System After All
10/13/21
Khoury News
Studio apartment or research lab? Inside Khoury College’s cybersecurity and privacy research
10/7/21
News @ Northeastern
Institute members awarded $15.7 million grant from the NSF
9/29/21
Washington Post
The fight to get tech giants to reveal their data is coming to a head in Congress
4/28/22
The Verge
Researchers find Amazon uses Alexa voice data to target you with ads
4/14/22
News @ Northeastern
What the $600M cryptocurrency heist means for future of blockchain security
3/9/22
Khoury News
Accountable AI: senior policy researcher Amba Kak brings new expertise to the Cybersecurity and Privacy Institute
12/16/21
News @ Northeastern
How to Stay Safe While Online Shopping For The Holidays
11/19/21
Reuters
Amazon wages secret war on Americans’ privacy, documents show
11/9/21
News@Northeastern
Facebook Isn’t Shutting Down Its Facial Recognition System After All
10/13/21
Khoury News
Studio apartment or research lab? Inside Khoury College’s cybersecurity and privacy research
10/7/21
News @ Northeastern
Institute members awarded $15.7 million grant from the NSF
9/29/21
Washington Post
The fight to get tech giants to reveal their data is coming to a head in Congress
4/28/22
The Verge
Researchers find Amazon uses Alexa voice data to target you with ads
4/14/22
News @ Northeastern
What the $600M cryptocurrency heist means for future of blockchain security
3/9/22
Khoury News
Accountable AI: senior policy researcher Amba Kak brings new expertise to the Cybersecurity and Privacy Institute
12/16/21
News @ Northeastern
How to Stay Safe While Online Shopping For The Holidays
11/19/21
Reuters
Amazon wages secret war on Americans’ privacy, documents show
11/9/21
News@Northeastern
Facebook Isn’t Shutting Down Its Facial Recognition System After All
10/13/21
Khoury News
Studio apartment or research lab? Inside Khoury College’s cybersecurity and privacy research
10/7/21
News @ Northeastern
Institute members awarded $15.7 million grant from the NSF
9/29/21
Washington Post
The fight to get tech giants to reveal their data is coming to a head in Congress
Collaborating with experts in industry, government, and academia worldwide, the Institute’s faculty and students research, develop, and enhance technologies on which the world relies.
Â
Collaborating with experts in industry, government, and academia worldwide, the Institute’s faculty and students research, develop, and enhance technologies on which the world relies.
Â
Collaborating with experts in industry, government, and academia worldwide, the Institute’s faculty and students research, develop, and enhance technologies on which the world relies.
Â
Collaborating with experts in industry, government, and academia worldwide, the Institute’s faculty and students research, develop, and enhance technologies on which the world relies.
Â
Our distinctive approach: Partner with us. Using cutting-edge systems design and data from actual security breaches, we solve urgent cyber challenges and keep societies safely connected.
Our distinctive approach: Partner with us. Using cutting-edge systems design and data from actual security breaches, we solve urgent cyber challenges and keep societies safely connected.
Our distinctive approach: Partner with us. Using cutting-edge systems design and data from actual security breaches, we solve urgent cyber challenges and keep societies safely connected.
Our distinctive approach: Partner with us. Using cutting-edge systems design and data from actual security breaches, we solve urgent cyber challenges and keep societies safely connected.