Recent talks

Extraction of Complex DNN Models: Real Threat or Boogeyman (slides, version of August 2022, [pdf], [slideshow])
Confidence in AI systems: Can we trust AI-based systems? (slides, version of August 2022, [pdf], [slideshow])
Hardware-assisted Run-time Protection: on balancing security and deployability (slides, version of October 2021, [pdf], [slideshow])
Hardware-assisted Run-time Protection (slides, version of August 2021, [pdf], [slideshow])
Security, Privacy, and Machine Learning (slides, version of January 2020, [pdf], [slideshow])
Trustworthy & Accountable Function-as-a-Service (slides, version of January 2020, [pdf], [slideshow])
Hardware-assisted Trusted Execution Environments: Look Back, Look Ahead (slides, version of November 2019, [pdf], [slideshow])
Common-sense applications of hardware-based trusted execution environments (slides, version of July 2019, [pdf], [slideshow])
Securing Cloud-assisted Services (slides, version of June 2019, [pdf], [slide show])
The Undeniable Truth: How Remote Attestation Circumvents Deniability Guarantees in Secure Messaging Protocols (slides, version of May 2019, [pdf], [slideshow])
Can Blockchains be made better using hardware-assisted security (slides, version of September 2018, [pdf],[slide show])
Machine learning in the presence of adversaries [slides version of April 2018]


Last modified: Mon, 12 Sep 2022 21:32:25 +0300