| | Three Paper Thursday: Subverting Neural Networks via Adversarial Reprogramming (lightbluetouchpaper.org) |
|
1 point by etiam on Jan 28, 2021 | past
|
| | Hey Alexa what did I just type? (lightbluetouchpaper.org) |
|
4 points by fanf2 on Dec 2, 2020 | past
|
| | Three Paper Thursday: Attacking Machine Vision Models in Real Life (lightbluetouchpaper.org) |
|
3 points by pabs3 on Nov 19, 2020 | past
|
| | SRI and Cambridge release CHERI software stack for Arm Morello (lightbluetouchpaper.org) |
|
2 points by transpute on Oct 31, 2020 | past
|
| | SRI and Cambridge release CHERI software stack for ARM Morello (lightbluetouchpaper.org) |
|
1 point by pabs3 on Oct 30, 2020 | past
|
| | SRI and Cambridge release CHERI software stack for Arm Morello (lightbluetouchpaper.org) |
|
5 points by zxombie on Oct 29, 2020 | past
|
| | A measurement of link rot: 57% (lightbluetouchpaper.org) |
|
1 point by etiam on Sept 4, 2020 | past
|
| | Cambridge Cybercrime Centre: Covid Briefing Papers – Light Blue Touchpaper (lightbluetouchpaper.org) |
|
1 point by gnufx on July 7, 2020 | past
|
| | How to Jam Neural Networks (lightbluetouchpaper.org) |
|
1 point by based2 on June 14, 2020 | past
|
| | How to Jam Neural Networks (lightbluetouchpaper.org) |
|
2 points by etiam on June 9, 2020 | past
|
| | Vulnerabilities We’ve got vulnerabilities here See? Nobody cares (lightbluetouchpaper.org) |
|
1 point by etiam on May 28, 2020 | past
|
| | Will we ever get IoT security right? (lightbluetouchpaper.org) |
|
3 points by etiam on May 14, 2020 | past
|
| | What's Intel SGX Good For? (lightbluetouchpaper.org) |
|
86 points by vladivstok on May 8, 2020 | past | 55 comments
|
| | What’s Intel SGX Good For? (lightbluetouchpaper.org) |
|
1 point by etiam on May 7, 2020 | past
|
| | Three Paper Thursday: Adversarial ML, Humans and Everything in Between (lightbluetouchpaper.org) |
|
1 point by etiam on April 16, 2020 | past
|
| | Contact Tracing in the Real World (lightbluetouchpaper.org) |
|
118 points by nmjenkins on April 12, 2020 | past | 80 comments
|
| | Identifying Unintended Harms of Cybersecurity Countermeasures (lightbluetouchpaper.org) |
|
2 points by inetsee on Feb 17, 2020 | past
|
| | Encoding integers in the EMV protocol (2010) (lightbluetouchpaper.org) |
|
14 points by DyslexicAtheist on Dec 28, 2019 | past
|
| | Rental Scams (lightbluetouchpaper.org) |
|
3 points by fredley on Nov 28, 2019 | past
|
| | Digital Security by Design: A £190M Research Programme Around Arm’s Morello (lightbluetouchpaper.org) |
|
2 points by timthorn on Nov 27, 2019 | past
|
| | UKRI Digital Security by Design: An Experimental ARMv8-A CPU with Cheri Support (lightbluetouchpaper.org) |
|
1 point by zxombie on Oct 21, 2019 | past
|
| | Online suicide games: a form of digital self-harm or a myth? (lightbluetouchpaper.org) |
|
2 points by sohkamyung on Oct 11, 2019 | past
|
| | Calibration Fingerprint Attacks for Smartphones (lightbluetouchpaper.org) |
|
3 points by inflatableDodo on Sept 1, 2019 | past
|
| | The Lifetime of an Android API Vulnerability (lightbluetouchpaper.org) |
|
2 points by sohkamyung on July 11, 2019 | past
|
| | Security Engineering: Third Edition (lightbluetouchpaper.org) |
|
3 points by walterbell on May 18, 2019 | past
|
| | Security Engineering: Third Edition (lightbluetouchpaper.org) |
|
6 points by sohkamyung on May 18, 2019 | past
|
| | Security Engineering: 3rd Edition by Ross Anderson — Who is the Opponent? (lightbluetouchpaper.org) |
|
3 points by fredley on May 17, 2019 | past
|
| | Could a gaming app steal your bank PIN? (lightbluetouchpaper.org) |
|
1 point by Slump on April 9, 2019 | past
|
| | Struck by a Thunderbolt (lightbluetouchpaper.org) |
|
156 points by lainon on Feb 26, 2019 | past | 61 comments
|
| | Financial Cryptography 2019 (lightbluetouchpaper.org) |
|
3 points by lainon on Feb 18, 2019 | past
|
|
|
More |