Search Results
USENIX Security '20 - The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis
USENIX Security '20 - An Observational Investigation of Reverse Engineers’ Processes
USENIX Security '20 - Understanding security mistakes developers make: Qualitative analysis...
USENIX Security '20 - The Impact of Ad-Blockers on Product Search and Purchase Behavior
“So-called privacy breeds evil”: Narrative Justifications for Intimate Partner Surveillance in ...
USENIX Security '20 - Fawkes: Protecting Privacy against Unauthorized Deep Learning Models
USENIX Security '20 - PHMon: A Programmable Hardware Monitor and Its Security Use Cases
USENIX Security '20 - Secure parallel computation on national scale volumes of data
USENIX Security '19 - The Spies Hacking our Phones are Going Dark, and We're All in Trouble
USENIX Security '23 - Abuse Vectors: A Framework for Conceptualizing IoT-Enabled Interpersonal Abuse
USENIX Security '19 - 50 Ways to Leak Your Data: An Exploration of Apps'
Care Infrastructures for Digital Security in Intimate Partner Violence