" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …
seemingly contradictory results and expands the boundaries of known discoveries …
Sok: data sovereignty
Society appears to be on the verge of recognizing the need for control over sensitive data in
modern web applications. Recently, many systems claim to give control to individuals …
modern web applications. Recently, many systems claim to give control to individuals …
RuleKeeper: GDPR-aware personal data compliance for web frameworks
Pressured by existing regulations such as the EU GDPR, online services must advertise a
personal data protection policy declaring the types and purposes of collected personal data …
personal data protection policy declaring the types and purposes of collected personal data …
PACTA: An IoT Data Privacy Regulation Compliance Scheme Using TEE and Blockchain
Despite the existence of data privacy regulations, such as the general data protection
regulation (GDPR), data leaks in the Internet of Things (IoT) still occur and cause significant …
regulation (GDPR), data leaks in the Internet of Things (IoT) still occur and cause significant …
Sesame: Practical End-to-End Privacy Compliance with Policy Containers and Privacy Regions
Web applications are governed by privacy policies, but developers lack practical
abstractions to ensure that their code actually abides by these policies. This leads to …
abstractions to ensure that their code actually abides by these policies. This leads to …
RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections
Leveraging a control flow hijacking primitive (CFHP) to gain root privileges is critical to
attackers striving to exploit Linux kernel vulnerabilities. Such attack has become increasingly …
attackers striving to exploit Linux kernel vulnerabilities. Such attack has become increasingly …
Enforcing the GDPR
Violations of data protection laws such as the General Data Protection Regulation (GDPR)
are ubiquitous. Currently, building IT support to implement such laws is difficult and the …
are ubiquitous. Currently, building IT support to implement such laws is difficult and the …
PrivacyOracle: Configuring Sensor Privacy Firewalls with Large Language Models in Smart Built Environments
Modern smart buildings and environments rely on sensory infrastructure to capture and
process information about their inhabitants. However, it remains challenging to ensure that …
process information about their inhabitants. However, it remains challenging to ensure that …
SoK: Technical implementation and human impact of internet privacy regulations
E Birrell, J Rodolitz, A Ding, J Lee… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Growing recognition of the potential for exploitation of personal data and of the shortcomings
of prior privacy regimes has led to the passage of a multitude of new privacy regulations …
of prior privacy regimes has led to the passage of a multitude of new privacy regulations …
Cohere: Managing differential privacy in large scale systems
The need for a privacy management layer in today's systems started to manifest with the
emergence of new systems for privacy-preserving analytics and privacy compliance. As a …
emergence of new systems for privacy-preserving analytics and privacy compliance. As a …