{ROTE}: Rollback protection for trusted execution S Matetic, M Ahmed, K Kostiainen, A Dhar, D Sommer, A Gervais, A Juels, ... 26th USENIX Security Symposium (USENIX Security 17), 1289-1306, 2017 | 291 | 2017 |
Privacy loss classes: The central limit theorem in differential privacy D Sommer, S Meiser, E Mohammadi Cryptology ePrint Archive, 2018 | 95 | 2018 |
Towards probabilistic verification of machine unlearning DM Sommer, L Song, S Wagh, P Mittal arXiv preprint arXiv:2003.04247, 2020 | 75 | 2020 |
Athena: Probabilistic verification of machine unlearning DM Sommer, L Song, S Wagh, P Mittal Proceedings on Privacy Enhancing Technologies, 2022 | 31 | 2022 |
Teaching Authentication in High Schools: Challenges and Lessons Learned E Stobert, E Cavar, L Malisa, D Sommer 2017 USENIX Workshop on Advances in Security Education (ASE 17), 2017 | 7 | 2017 |
Learning numeric optimal differentially private truncated additive mechanisms DM Sommer, L Abfalterer, S Zingg, E Mohammadi arXiv preprint arXiv:2107.12957, 2021 | 5 | 2021 |
ROTE: Rollback protection for trusted execution, 2017 S Matetic, M Ahmed, K Kostiainen, A Dhar, D Sommer, A Gervais, A Juels, ... | 5 | 2017 |
Cyber-Risks in Paper Voting DM Sommer, M Schneider, J Gut, S Capkun arXiv preprint arXiv:1906.07532, 2019 | 3 | 2019 |
Deniable upload and download via passive participation D Sommer, A Dhar, L Malisa, E Mohammadi, D Ronzani, S Capkun 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2019 | 2 | 2019 |
Hacking in the blind:(almost) invisible runtime user interface attacks L Malisa, K Kostiainen, T Knell, D Sommer, S Capkun Cryptographic Hardware and Embedded Systems–CHES 2017: 19th International …, 2017 | 2 | 2017 |
CoverUp: Privacy Through" Forced" Participation in Anonymous Communication Networks D Sommer, A Dhar, L Malisa, E Mohammadi, D Ronzani, S Capkun Cryptology ePrint Archive, 2017 | 2 | 2017 |
Fighting Uphill Battles: Improvements in Personal Data Privacy DM Sommer ETH Zurich, 2021 | 1 | 2021 |
Teaching authentication as a life skill E Stobert, E Cavar, L Malisa, D Sommer IEEE Security & Privacy 16 (5), 82-85, 2018 | 1 | 2018 |
Hacking in the blind:(almost) invisible runtime ui attacks on safety-critical terminals L Malisa, K Kostiainen, T Knell, D Sommer, S Capkun arXiv preprint arXiv:1604.04723, 2016 | 1 | 2016 |
PrivacyBuDe: Privacy Buckets Demo Tight Differential Privacy Guarantees made Simple D Sommer, S Meiser, E Mohammadi Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | | 2018 |
PrivacyBuDe D Sommer, S Meiser, E Mohammadi Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | | 2018 |
CoverUp D Sommer, A Dhar, L Malisa, E Mohammadi, D Ronzani, S Capkun Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017 | | 2017 |