arXiv
Your Echos are Heard: Tracking, Profiling, and Ad Targeting in the Amazon Smart Speaker Ecosystem
CRYPTO 2021
Limits on the Adaptive Security of Yao’s Garbling
Euro S&P 2021
Bypassing Memory Safety Mechanisms through Speculative Control Flow Hijacks
IEE S&P 2021
Structural Attacks on Local Routing in Payment Channel Networks
arXiv
Your Echos are Heard: Tracking, Profiling, and Ad Targeting in the Amazon Smart Speaker Ecosystem
CRYPTO 2021
Limits on the Adaptive Security of Yao’s Garbling
Euro S&P 2021
Bypassing Memory Safety Mechanisms through Speculative Control Flow Hijacks
IEE S&P 2021
Structural Attacks on Local Routing in Payment Channel Networks
arXiv
Your Echos are Heard: Tracking, Profiling, and Ad Targeting in the Amazon Smart Speaker Ecosystem
CRYPTO 2021
Limits on the Adaptive Security of Yao’s Garbling
Euro S&P 2021
Bypassing Memory Safety Mechanisms through Speculative Control Flow Hijacks
IEE S&P 2021
Structural Attacks on Local Routing in Payment Channel Networks
arXiv
Your Echos are Heard: Tracking, Profiling, and Ad Targeting in the Amazon Smart Speaker Ecosystem
CRYPTO 2021
Limits on the Adaptive Security of Yao’s Garbling
Euro S&P 2021
Bypassing Memory Safety Mechanisms through Speculative Control Flow Hijacks
IEE S&P 2021
Structural Attacks on Local Routing in Payment Channel Networks
8/17/23
Khoury News
Android browsers threaten user privacy, says Khoury-led international research team
5/30/23
Computing Community Consortium Catalyst
Former CCC Council Member, Kevin Fu, Appointed to White House PCAST Working Group
5/30/23
AAMI Array
Congratulations to the 2023 AAMI Award Winners!
4/24/23
Khoury News
As cyber attacks surge, the Defense Department turns to universities for cybersecurity grads
3/20/23
Khoury News
GPS is critical to modern life. It’s also vulnerable, and this researcher is out to fix that.
2/20/23
The New York Times
It’s Time to Tear Up Big Tech’s Get-Out-of-Jail-Free Card
2/9/23
Boston.com
Is there really such a thing as a private Google search?
1/25/23
Northeastern Global News
Live Nation Entertainment blamed bots for the Taylor Swift ticket fiasco. Is it a legitimate explanation or just an excuse?
1/23/23
Khoury News
He helped establish the medical device security field. Now, Kevin Fu is an ACM Fellow
1/20/23
WCHS TV
T-Mobile breach latest high-profile incident of US consumers having data exposed
8/17/23
Khoury News
Android browsers threaten user privacy, says Khoury-led international research team
5/30/23
Computing Community Consortium Catalyst
Former CCC Council Member, Kevin Fu, Appointed to White House PCAST Working Group
5/30/23
AAMI Array
Congratulations to the 2023 AAMI Award Winners!
4/24/23
Khoury News
As cyber attacks surge, the Defense Department turns to universities for cybersecurity grads
3/20/23
Khoury News
GPS is critical to modern life. It’s also vulnerable, and this researcher is out to fix that.
2/20/23
The New York Times
It’s Time to Tear Up Big Tech’s Get-Out-of-Jail-Free Card
2/9/23
Boston.com
Is there really such a thing as a private Google search?
1/25/23
Northeastern Global News
Live Nation Entertainment blamed bots for the Taylor Swift ticket fiasco. Is it a legitimate explanation or just an excuse?
1/23/23
Khoury News
He helped establish the medical device security field. Now, Kevin Fu is an ACM Fellow
1/20/23
WCHS TV
T-Mobile breach latest high-profile incident of US consumers having data exposed
8/17/23
Khoury News
Android browsers threaten user privacy, says Khoury-led international research team
5/30/23
Computing Community Consortium Catalyst
Former CCC Council Member, Kevin Fu, Appointed to White House PCAST Working Group
5/30/23
AAMI Array
Congratulations to the 2023 AAMI Award Winners!
4/24/23
Khoury News
As cyber attacks surge, the Defense Department turns to universities for cybersecurity grads
3/20/23
Khoury News
GPS is critical to modern life. It’s also vulnerable, and this researcher is out to fix that.
2/20/23
The New York Times
It’s Time to Tear Up Big Tech’s Get-Out-of-Jail-Free Card
2/9/23
Boston.com
Is there really such a thing as a private Google search?
1/25/23
Northeastern Global News
Live Nation Entertainment blamed bots for the Taylor Swift ticket fiasco. Is it a legitimate explanation or just an excuse?
1/23/23
Khoury News
He helped establish the medical device security field. Now, Kevin Fu is an ACM Fellow
1/20/23
WCHS TV
T-Mobile breach latest high-profile incident of US consumers having data exposed
8/17/23
Khoury News
Android browsers threaten user privacy, says Khoury-led international research team
5/30/23
Computing Community Consortium Catalyst
Former CCC Council Member, Kevin Fu, Appointed to White House PCAST Working Group
5/30/23
AAMI Array
Congratulations to the 2023 AAMI Award Winners!
4/24/23
Khoury News
As cyber attacks surge, the Defense Department turns to universities for cybersecurity grads
3/20/23
Khoury News
GPS is critical to modern life. It’s also vulnerable, and this researcher is out to fix that.
2/20/23
The New York Times
It’s Time to Tear Up Big Tech’s Get-Out-of-Jail-Free Card
2/9/23
Boston.com
Is there really such a thing as a private Google search?
1/25/23
Northeastern Global News
Live Nation Entertainment blamed bots for the Taylor Swift ticket fiasco. Is it a legitimate explanation or just an excuse?
1/23/23
Khoury News
He helped establish the medical device security field. Now, Kevin Fu is an ACM Fellow
1/20/23
WCHS TV
T-Mobile breach latest high-profile incident of US consumers having data exposed
Collaborating with experts in industry, government, and academia worldwide, the Institute’s faculty and students research, develop, and enhance technologies on which the world relies.
Â
Collaborating with experts in industry, government, and academia worldwide, the Institute’s faculty and students research, develop, and enhance technologies on which the world relies.
Â
Collaborating with experts in industry, government, and academia worldwide, the Institute’s faculty and students research, develop, and enhance technologies on which the world relies.
Â
Collaborating with experts in industry, government, and academia worldwide, the Institute’s faculty and students research, develop, and enhance technologies on which the world relies.
Â
Our distinctive approach: Partner with us. Using cutting-edge systems design and data from actual security breaches, we solve urgent cyber challenges and keep societies safely connected.
Our distinctive approach: Partner with us. Using cutting-edge systems design and data from actual security breaches, we solve urgent cyber challenges and keep societies safely connected.
Our distinctive approach: Partner with us. Using cutting-edge systems design and data from actual security breaches, we solve urgent cyber challenges and keep societies safely connected.
Our distinctive approach: Partner with us. Using cutting-edge systems design and data from actual security breaches, we solve urgent cyber challenges and keep societies safely connected.