Search
Search Results
-
Blockchain Technology Accelerating Industry 4.0
Competitive industrial environments impose significant requirements on data sharing as well as the accountability and verifiability of related... -
Blockchain Technology for E-Governance Applications
Blockchain technology or distributed ledger technology since its inception as a cryptocurrency platform has captured the imagination of computer... -
Decentralized Identity Management and Blockchains: Design Patterns and Architectures
Securely and efficiently managing digital identities is a pre-requisite to enabling prosperous digital service economy underpinned by trust. The... -
COBRA: Comparison-Optimal Betting for Risk-Limiting Audits
Risk-limiting audits (RLAs) can provide routine, affirmative evidence that reported election outcomes are correct by checking a random sample of cast... -
Consolidation of Ground Truth Sets for Weakness Detection in Smart Contracts
Smart contracts are small programs on the blockchain that often handle valuable assets. Vulnerabilities in smart contracts can be costly, as time has... -
Publicly Verifiable Auctions with Privacy
Online auctions have a steadily growing market size, creating billions of US dollars in sales value every year. To ensure fairness and auditability... -
Uniswap Liquidity Provision: An Online Learning Approach
Uniswap v3 is a decentralized exchange (DEX) that allows liquidity providers to allocate funds more efficiently by specifying an active price... -
The Hidden Shortcomings of (D)AOs – An Empirical Study of On-Chain Governance
Decentralized autonomous organizations (DAOs) are a recent innovation in organizational structures, which are already widely used in the blockchain... -
The Principal–Agent Problem in Liquid Staking
Proof-of-stake systems require stakers to lock up their funds in order to participate in consensus validation. This leads to capital inefficiency, as... -
The Current Era of Chatbots
In this chapter we’re moving on from the fundamentals of chatbots right to the cutting edge. Chatbots are no longer a mere scientific curiosity or... -
Chatbots as Villains: The Antisocial Uses of AI
There’s no denying chatbots and artificial intelligence are a powerful phenomenon. So far we have mostly discussed their positive impact on the... -
Enforcing the GDPR
Violations of data protection laws such as the General Data Protection Regulation (GDPR) are ubiquitous. Currently, building IT support to implement... -
FSmell: Recognizing Inline Function in Binary Code
Function recognition is one of the most critical tasks in binary analysis and reverse engineering. However, the recognition of inline functions still... -
Hiding Your Signals: A Security Analysis of PPG-Based Biometric Authentication
Recently, physiological signal-based biometric systems have received wide attention. Photoplethysmogram (PPG) signal is easy to measure, making it... -
Evaluating the Security Posture of 5G Networks by Combining State Auditing and Event Monitoring
5G network technology is being rapidly adopted in various critical infrastructures, mainly due to its unique benefits (e.g., higher throughput, lower... -
Tactics for Account Access Graphs
Account access graphs have been proposed as a way to model relationships between user credentials, accounts, and methods of access; they capture both... -
Intelligent Zigbee Protocol Fuzzing via Constraint-Field Dependency Inference
Zigbee is one of the global most popular IoT standards widely deployed by millions of devices and customers. Its fast market growth also incentivizes... -
Efficient Pruning for Machine Learning Under Homomorphic Encryption
Privacy-preserving machine learning (PPML) solutions are gaining widespread popularity. Among these, many rely on homomorphic encryption (HE) that... -
AttnCall: Refining Indirect Call Targets in Binaries with Attention
Accurate Control Flow Graphs are crucial for effective binary program analysis, while solving indirect function call targets is its major challenge.... -
You Reset I Attack! A Master Password Guessing Attack Against Honey Password Vaults
It is natural for Internet users to use a password vault to encrypt and manage numerous passwords with a master password. Using one to rule all that...