The Internet of Things (IoT) market is rapidly growing and is expected t...
Our modern world relies on a growing number of interconnected and intera...
Federated Learning (FL) has become very popular since it enables clients...
Satellite Internet plays an increasingly important role in geopolitical
...
ChatGPT has become a global sensation. As ChatGPT and other Large Langua...
IoT application domains, device diversity and connectivity are rapidly
g...
Voltage Fault Injection (VFI), also known as power glitching, has proven...
Mobile applications are widely used for online services sharing a large
...
Federated learning (FL) allows participants to jointly train a machine
l...
With 1.3 billion users, Instagram (IG) has also become a business tool. ...
Fuzzing is an automated software testing technique broadly adopted by th...
Federated Learning (FL) is a scheme for collaboratively training Deep Ne...
Smart contracts enable users to execute payments depending on complex pr...
Cloud computing has emerged as a corner stone of today's computing lands...
We address the challenging problem of efficient trust establishment in
c...
The COVID-19 pandemic has caused many countries to deploy novel digital
...
The increasing complexity of modern processors poses many challenges to
...
Federated Learning (FL) allows multiple clients to collaboratively train...
Shared cache resources in multi-core processors are vulnerable to cache
...
In the area of Internet of Things (IoT) voice assistants have become an
...
Ethereum smart contracts are automated decentralized applications on the...
Recently, a number of backdoor attacks against Federated Learning (FL) h...
Security architectures providing Trusted Execution Environments (TEEs) h...
In their continuous growth and penetration into new markets, Field
Progr...
In this work, we provide an industry research view for approaching the
d...
Performing machine learning tasks in mobile applications yields a challe...
Manufacturers of smart home Internet of Things (IoT) devices are increas...
Contact tracing apps running on mobile devices promise to reduce the man...
Fault-injection attacks have been proven in the past to be a reliable wa...
Autonomous collaborative networks of devices are emerging in numerous
do...
Modern multi-core processors share cache resources for maximum cache
uti...
We present ARM2GC, a novel secure computation framework based on Yao's
G...
Cyber-physical control systems, such as industrial control systems (ICS)...
In this paper, we take a deep dive into microarchitectural security from...
The emerging Internet of Things (IoT) drastically increases the number o...
A myriad of IoT devices such as bulbs, switches, speakers in a smart hom...
Secure firmware update is an important stage in the IoT device life-cycl...
IoT devices are being widely deployed. Many of them are vulnerable due t...
IoT devices are being widely deployed. Many of them are vulnerable due t...
In order to limit the damage of malware on Mac OS X and iOS, Apple uses
...