David M. Sommer
David M. Sommer
System Security Group, ETH Zürich
Geverifieerd e-mailadres voor inf.ethz.ch
Titel
Geciteerd door
Geciteerd door
Jaar
{ROTE}: Rollback protection for trusted execution
S Matetic, M Ahmed, K Kostiainen, A Dhar, D Sommer, A Gervais, A Juels, ...
26th {USENIX} Security Symposium ({USENIX} Security 17), 1289-1306, 2017
1282017
Privacy loss classes: The central limit theorem in differential privacy
DM Sommer, S Meiser, E Mohammadi
Proceedings on privacy enhancing technologies 2019 (2), 245-269, 2019
112019
Towards probabilistic verification of machine unlearning
DM Sommer, L Song, S Wagh, P Mittal
arXiv preprint arXiv:2003.04247, 2020
82020
ROTE: Rollback protection for trusted execution, 2017
S Matetic, M Ahmed, K Kostiainen, A Dhar, D Sommer, A Gervais, A Juels, ...
52017
Teaching Authentication in High Schools: Challenges and Lessons Learned
E Stobert, E Cavar, L Malisa, D Sommer
2017 {USENIX} Workshop on Advances in Security Education ({ASE} 17), 2017
42017
CoverUp: Privacy Through" Forced" Participation in Anonymous Communication Networks.
DM Sommer, A Dhar, L Malisa, E Mohammadi, D Ronzani, S Capkun
IACR Cryptol. ePrint Arch. 2017, 191, 2017
22017
Teaching authentication as a life skill
E Stobert, E Cavar, L Malisa, D Sommer
IEEE Security & Privacy 16 (5), 82-85, 2018
12018
Hacking in the blind:(almost) invisible runtime ui attacks on safety-critical terminals
L Malisa, K Kostiainen, T Knell, D Sommer, S Capkun
arXiv preprint arXiv:1604.04723, 2016
12016
Cyber-Risks in Paper Voting
DM Sommer, M Schneider, J Gut, S Capkun
arXiv preprint arXiv:1906.07532, 2019
2019
Deniable upload and download via passive participation
D Sommer, A Dhar, L Malisa, E Mohammadi, D Ronzani, S Capkun
16th {USENIX} Symposium on Networked Systems Design and Implementation …, 2019
2019
PrivacyBuDe: Privacy Buckets Demo Tight Differential Privacy Guarantees made Simple
D Sommer, S Meiser, E Mohammadi
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
2018
Hacking in the Blind:(Almost) Invisible Runtime User Interface Attacks
L Malisa, K Kostiainen, T Knell, D Sommer, S Capkun
International Conference on Cryptographic Hardware and Embedded Systems, 468-489, 2017
2017
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–12