arXiv
Your Echos are Heard: Tracking, Profiling, and Ad Targeting in the Amazon Smart Speaker Ecosystem
CRYPTO 2021
Limits on the Adaptive Security of Yao’s Garbling
Euro S&P 2021
Bypassing Memory Safety Mechanisms through Speculative Control Flow Hijacks
IEE S&P 2021
Structural Attacks on Local Routing in Payment Channel Networks
Piotr Sapienzyki speaks at EU Parliament hearing on transparency of political advertising
Cristina Nita-Rotaru wins SACMAT’22 test of time award
Woodrow Hartzog Appointed to Facial Recognition Technology Commission
David Choffnes, Alan Mislove recognized as ACM senior members
arXiv
Your Echos are Heard: Tracking, Profiling, and Ad Targeting in the Amazon Smart Speaker Ecosystem
CRYPTO 2021
Limits on the Adaptive Security of Yao’s Garbling
Euro S&P 2021
Bypassing Memory Safety Mechanisms through Speculative Control Flow Hijacks
IEE S&P 2021
Structural Attacks on Local Routing in Payment Channel Networks
Piotr Sapienzyki speaks at EU Parliament hearing on transparency of political advertising
Cristina Nita-Rotaru wins SACMAT’22 test of time award
Woodrow Hartzog Appointed to Facial Recognition Technology Commission
David Choffnes, Alan Mislove recognized as ACM senior members
arXiv
Your Echos are Heard: Tracking, Profiling, and Ad Targeting in the Amazon Smart Speaker Ecosystem
CRYPTO 2021
Limits on the Adaptive Security of Yao’s Garbling
Euro S&P 2021
Bypassing Memory Safety Mechanisms through Speculative Control Flow Hijacks
IEE S&P 2021
Structural Attacks on Local Routing in Payment Channel Networks
Piotr Sapienzyki speaks at EU Parliament hearing on transparency of political advertising
Cristina Nita-Rotaru wins SACMAT’22 test of time award
Woodrow Hartzog Appointed to Facial Recognition Technology Commission
David Choffnes, Alan Mislove recognized as ACM senior members
arXiv
Your Echos are Heard: Tracking, Profiling, and Ad Targeting in the Amazon Smart Speaker Ecosystem
CRYPTO 2021
Limits on the Adaptive Security of Yao’s Garbling
Euro S&P 2021
Bypassing Memory Safety Mechanisms through Speculative Control Flow Hijacks
IEE S&P 2021
Structural Attacks on Local Routing in Payment Channel Networks
Piotr Sapienzyki speaks at EU Parliament hearing on transparency of political advertising
Cristina Nita-Rotaru wins SACMAT’22 test of time award
Woodrow Hartzog Appointed to Facial Recognition Technology Commission
David Choffnes, Alan Mislove recognized as ACM senior members
7/31/22
The Wall Street Journal
Why you should or shouldn’t buy a home security camera
7/25/22
Khoury News
Internet connection or diversity — for this researcher, it’s all about access
4/28/22
The Verge
Researchers find Amazon uses Alexa voice data to target you with ads
4/14/22
News @ Northeastern
What the $600M cryptocurrency heist means for future of blockchain security
3/9/22
Khoury News
Accountable AI: senior policy researcher Amba Kak brings new expertise to the Cybersecurity and Privacy Institute
12/16/21
News @ Northeastern
How to Stay Safe While Online Shopping For The Holidays
11/19/21
Reuters
Amazon wages secret war on Americans’ privacy, documents show
11/9/21
News@Northeastern
Facebook Isn’t Shutting Down Its Facial Recognition System After All
10/13/21
Khoury News
Studio apartment or research lab? Inside Khoury College’s cybersecurity and privacy research
7/31/22
The Wall Street Journal
Why you should or shouldn’t buy a home security camera
7/25/22
Khoury News
Internet connection or diversity — for this researcher, it’s all about access
4/28/22
The Verge
Researchers find Amazon uses Alexa voice data to target you with ads
4/14/22
News @ Northeastern
What the $600M cryptocurrency heist means for future of blockchain security
3/9/22
Khoury News
Accountable AI: senior policy researcher Amba Kak brings new expertise to the Cybersecurity and Privacy Institute
12/16/21
News @ Northeastern
How to Stay Safe While Online Shopping For The Holidays
11/19/21
Reuters
Amazon wages secret war on Americans’ privacy, documents show
11/9/21
News@Northeastern
Facebook Isn’t Shutting Down Its Facial Recognition System After All
10/13/21
Khoury News
Studio apartment or research lab? Inside Khoury College’s cybersecurity and privacy research
7/31/22
The Wall Street Journal
Why you should or shouldn’t buy a home security camera
7/25/22
Khoury News
Internet connection or diversity — for this researcher, it’s all about access
4/28/22
The Verge
Researchers find Amazon uses Alexa voice data to target you with ads
4/14/22
News @ Northeastern
What the $600M cryptocurrency heist means for future of blockchain security
3/9/22
Khoury News
Accountable AI: senior policy researcher Amba Kak brings new expertise to the Cybersecurity and Privacy Institute
12/16/21
News @ Northeastern
How to Stay Safe While Online Shopping For The Holidays
11/19/21
Reuters
Amazon wages secret war on Americans’ privacy, documents show
11/9/21
News@Northeastern
Facebook Isn’t Shutting Down Its Facial Recognition System After All
10/13/21
Khoury News
Studio apartment or research lab? Inside Khoury College’s cybersecurity and privacy research
7/31/22
The Wall Street Journal
Why you should or shouldn’t buy a home security camera
7/25/22
Khoury News
Internet connection or diversity — for this researcher, it’s all about access
4/28/22
The Verge
Researchers find Amazon uses Alexa voice data to target you with ads
4/14/22
News @ Northeastern
What the $600M cryptocurrency heist means for future of blockchain security
3/9/22
Khoury News
Accountable AI: senior policy researcher Amba Kak brings new expertise to the Cybersecurity and Privacy Institute
12/16/21
News @ Northeastern
How to Stay Safe While Online Shopping For The Holidays
11/19/21
Reuters
Amazon wages secret war on Americans’ privacy, documents show
11/9/21
News@Northeastern
Facebook Isn’t Shutting Down Its Facial Recognition System After All
10/13/21
Khoury News
Studio apartment or research lab? Inside Khoury College’s cybersecurity and privacy research
Collaborating with experts in industry, government, and academia worldwide, the Institute’s faculty and students research, develop, and enhance technologies on which the world relies.
Â
Collaborating with experts in industry, government, and academia worldwide, the Institute’s faculty and students research, develop, and enhance technologies on which the world relies.
Â
Collaborating with experts in industry, government, and academia worldwide, the Institute’s faculty and students research, develop, and enhance technologies on which the world relies.
Â
Collaborating with experts in industry, government, and academia worldwide, the Institute’s faculty and students research, develop, and enhance technologies on which the world relies.
Â
Our distinctive approach: Partner with us. Using cutting-edge systems design and data from actual security breaches, we solve urgent cyber challenges and keep societies safely connected.
Our distinctive approach: Partner with us. Using cutting-edge systems design and data from actual security breaches, we solve urgent cyber challenges and keep societies safely connected.
Our distinctive approach: Partner with us. Using cutting-edge systems design and data from actual security breaches, we solve urgent cyber challenges and keep societies safely connected.
Our distinctive approach: Partner with us. Using cutting-edge systems design and data from actual security breaches, we solve urgent cyber challenges and keep societies safely connected.