Formal CHERI: design-time proof of full-scale architecture security properties (2022)

Will GPT models choke on their own exhaust?

ExtremeBB – Supporting Large-Scale Research into Misogyny and Online Extremism

Formal CHERI: design-time proof of architecture security properties

Data ordering attacks on deep neural networks

European Commission prefers breaking privacy to protecting kids

Arm releases experimental CHERI-enabled Morello board

Security Engineering Course

Rollercoaster: Communicating Efficiently and Anonymously in Large Groups

Trojan Source: Invisible Vulnerabilities

Bugs in Our Pockets?

A new way to detect ‘deepfake’ picture editing

What's Intel SGX Good For?

Contact Tracing in the Real World

Encoding integers in the EMV protocol (2010)

Struck by a Thunderbolt

Making sense of the alleged Supermicro motherboard attack

The two-time pad: midwife of information theory?

Tracing stolen Bitcoin, using a precedent from 1816

Ethical issues in research using datasets of illicit origin

When safety and security become one

Summary of a 4hr conversation between cryptographers and Ed Snowden

There exists a classical model of the photon after all

The pre-play vulnerability in Chip and PIN

Hot or Not: Revealing Hidden Services by their Clock Skew