Paper-Conference

Efficient Storage Integrity in Adversarial Settings
Secure IP Address Allocation at Cloud Scale
Characterizing the Modification Space of Signature IDS Rules
The Space of Adversarial Strategies
Building a Privacy-Preserving Smart Camera System
On the Robustness of Domain Constraints