‘Hey mum, I dropped my phone down the toilet’: Investigating Hi Mum and Dad SMS Scams in the UK
SMS fraud has surged in recent years. Detection techniques have improved along with the fraud, necessitating harder-to-detect fraud techniques. We study one of these where scammers send an SMS to the victim addressing mum or…
zk-promises: Anonymous Moderation, Reputation, & Blocking from Anonymous Credentials with Callbacks
Anonymity is essential for free speech and expressing dissent, but platform moderators need ways to police bad actors. For anonymous clients, this may involve banning their accounts, docking their reputation, or updating their state in…
More is Less: Extra Features in Contactless Payments Break Security
The EMV contactless payment system has many independent parties: payment providers, terminal companies, smartphone companies, banks and regulators. EMVCo publishes a 15 book specification that these companies use to operate together. However, many of these…
Ordered Consensus with Equal Opportunity
Six Years of Rowhammer: Breakthroughs and Future Directions
This talk presents the work done over the past six years as part of Project STEMA at Microsoft. STEMA stands for Secure, Trusted, and Enhanced Memory for Azure. We discuss our journey in understanding Rowhammer…
Crescent library brings privacy to digital identity systems
Crescent helps make digital IDs private by preventing tracking across uses while letting users only disclose what’s necessary from their credentials.
Pre-USENIX Security Mini-Conference
This is an invite-only event, unless you are a Microsoft employee. You must have received an invitation email from the organizers to register and attend. This is not an official USENIX Security-affiliated event. The event…
Project Roma
Deterministic security for AI agents AI agents perform consequential actions while processing data from various sources, including trusted collaborators and the public Web. It is crucial that AI agents handle this data with care: confidential…
Project Ire autonomously identifies malware at scale
Designed to classify software without context, Project Ire replicates the gold standard in malware analysis through reverse engineering. It streamlines a complex, expert-driven process, making large-scale malware detection faster & more consistent.