Schedule
March 19, 2025
Deterministic Client: Enforcing Determinism on Untrusted Machine Code
Zachary Yedida
March 12, 2025
Samplable Anonymous Aggregation for Private Federated Data Analysis
Kunal Talwar
March 05, 2025
Making the Case for Network Observation
Jackson Sippe
February 19, 2025
HateDay: Insights from a Global Hate Speech Dataset Representative of a Day on Twitter
Manuel Tonneau
February 12, 2025
What’s new about the Great Firewall of China?
Alex Zhang
January 29, 2025
My Journey and Perspective on Internet Censorship in China
Toby
January 22, 2025
Using SBOMs to Mitigate the Lemons Market
L Jean Camp
January 15, 2025
GGFAST: Automating Generation of Flexible Network Traffic Classifiers
Julien Piet
January 08, 2025
Fingerprinting at the Frontier: How Edge Cases and Ambiguities can help Identify and Attribute Targeted Digital Attacks Against Civil Society
Bill Marczak
December 18, 2024
Protecting the Vulnerable: Child Safety and Misinformation in the Digital Age
Ihsan Ayyub Qazi
December 11, 2024
RTL2MμPATH: Multi-μPATH Synthesis with Applications to Hardware Security Verification.
Yao Hsiao
December 04, 2024
Computer Security: The Mess We're In, How We Got Here, and What to Do About It
Alan Karp
November 20, 2024
Privacy in Web Advertising: Opportunities, Challenges, and a Call to Action
Roxana Geambasu
November 06, 2024
Vision Paper:Proof-Carrying Code Completions(PC3)
Parnian Kamran
October 23, 2024
Verifying complex elections
Vanessa Teague
October 09, 2024
Counterexamples in Safe Rust
Muhammad Hassnain
October 02, 2024
Designing for Security and Privacy beyond WEIRD
Taha
August 07, 2024
Peer2PIR: Private queries for IPFS
Miti Mazmudar
July 24, 2024
Jolt: Proof Systems for Real-world Programs
Arasu Arun
June 26, 2024
Real-World Opportunities and Challenges in Deploying Anonymous Analytics
Tanya Verma
June 05, 2024
Practical Online Learning of In-Network ML Models with Labeling Agents
Qizheng Zhang
May 29, 2024
Social Lunch
May 22, 2024
Designing protocols that actually get deployed
Eric Rescorla
May 15, 2024
VerITAS: Verifying Image Transformations at Scale
Trisha Datta
May 08, 2024
May 01, 2024
Sidekick: In-Network Assistance for Secure End-to-End Transport Protocols
Gina Yuan
April 24, 2024
The best cyber professionals are unicorns. Some methods for growing unicorns
Richard Buckland
April 17, 2024
The Mythical LLM-Month: Creating Trustworthy Copilots for Cybersecurity
Claudionor Coelho
April 10, 2024
Creating a Hobby ISP: Connecting to the Internet
Ian Foster
April 03, 2024