" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences

D Olszewski, A Lu, C Stillman, K Warren… - Proceedings of the …, 2023 - dl.acm.org
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …

Sok: data sovereignty

J Ernstberger, J Lauinger, F Elsheimy… - 2023 IEEE 8th …, 2023 - ieeexplore.ieee.org
Society appears to be on the verge of recognizing the need for control over sensitive data in
modern web applications. Recently, many systems claim to give control to individuals …

RuleKeeper: GDPR-aware personal data compliance for web frameworks

M Ferreira, T Brito, JF Santos… - 2023 IEEE Symposium …, 2023 - ieeexplore.ieee.org
Pressured by existing regulations such as the EU GDPR, online services must advertise a
personal data protection policy declaring the types and purposes of collected personal data …

PACTA: An IoT Data Privacy Regulation Compliance Scheme Using TEE and Blockchain

Y Zhang, J Yang, H Lei, Z Bao, N Lu… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
Despite the existence of data privacy regulations, such as the general data protection
regulation (GDPR), data leaks in the Internet of Things (IoT) still occur and cause significant …

Sesame: Practical End-to-End Privacy Compliance with Policy Containers and Privacy Regions

K Dak Albab, A Agvanian, A Aby, C Tiffany… - Proceedings of the …, 2024 - dl.acm.org
Web applications are governed by privacy policies, but developers lack practical
abstractions to ensure that their code actually abides by these policies. This leads to …

RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections

K Zeng, Z Lin, K Lu, X **ng, R Wang, A Doupé… - Proceedings of the …, 2023 - dl.acm.org
Leveraging a control flow hijacking primitive (CFHP) to gain root privileges is critical to
attackers striving to exploit Linux kernel vulnerabilities. Such attack has become increasingly …

Enforcing the GDPR

F Hublet, D Basin, S Krstić - European Symposium on Research in …, 2023 - Springer
Violations of data protection laws such as the General Data Protection Regulation (GDPR)
are ubiquitous. Currently, building IT support to implement such laws is difficult and the …

PrivacyOracle: Configuring Sensor Privacy Firewalls with Large Language Models in Smart Built Environments

B Wang, LA Garcia, M Srivastava - 2024 IEEE Security and …, 2024 - ieeexplore.ieee.org
Modern smart buildings and environments rely on sensory infrastructure to capture and
process information about their inhabitants. However, it remains challenging to ensure that …

SoK: Technical implementation and human impact of internet privacy regulations

E Birrell, J Rodolitz, A Ding, J Lee… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Growing recognition of the potential for exploitation of personal data and of the shortcomings
of prior privacy regimes has led to the passage of a multitude of new privacy regulations …

Cohere: Managing differential privacy in large scale systems

N Küchler, E Opel, H Lycklama, A Viand… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
The need for a privacy management layer in today's systems started to manifest with the
emergence of new systems for privacy-preserving analytics and privacy compliance. As a …