We present eclipse attacks on bitcoin's peer-to-peer network. Our attack allows an adversary controlling a sufficient number of IP addresses to monopolize all connections to and from a victim bitcoin node. The attacker...
We present eclipse attacks on bitcoin's peer-to-peer network. Our attack allows an adversary controlling a sufficient number of IP addresses to monopolize all connections to and from a victim bitcoin node. The attacker...
This series is student-run and initiated.
The Introductory Lectures on Security and Privacy is a seminar series for undergraduate students interested in learning about the different fields of Cybersecurity....
This series is student-run and initiated.
The Introductory Lectures on Security and Privacy is a seminar series for undergraduate students interested in learning about the different fields of Cybersecurity....
This series is student-run and initiated.
The Introductory Lectures on Security and Privacy is a seminar series for undergraduate students interested in learning about the different fields of Cybersecurity....
This is a great time to consider a career as a cyber security professional. Experts in cyber security are among the most sought-after professionals in the tech sector. But, what does that mean and how do you prepare...
University of North Carolina at Chapel Hill
Computer Science
Abstract: Due to the massive adoption of computing platforms that consolidate potentially distrustful tenants' applications on common hardware---...
Over the last decade, differential privacy (DP) has emerged as the standard privacy notion for research in privacy-preserving data analysis and publishing. However, there is an ongoing debate about the meaning and value...
As a class meeting of CS391L Computer Crime Law, we will be watching the movie "CitizenFour". Since the movie may be of broader interest, CS students are invited to join the class meeting in CS151 on that day. The movie...
The treatment of privacy in data analysis has taken a dramatic shift a little more than a decade ago - as failures of traditional privacy preserving techniques were beginning to accumulate, a theoretical, foundational...
Abstract: The problem of analyzing collections of sensitive personal information while providing privacy is decades old. A recent foundational examination of this problem has yielded differential privacy, a robust formal...