Presentations

file

Visible to the public WiP: Client Side Protections Against Rogue JavaScript

With more dynamic technologies being deployed, developers continue to make websites more reactive and add more features. An unintended side effect of these new capabilities is the opportunity to abuse the privacy and security of users. At the same time, targeted advertising profits off the collection of users’ data, which provides little incentive to prevent third-parties from amassing such data.

file

Visible to the public Keynote Presentation - Working with academia at the UK National Cyber Security Centre

Paul has worked in cryptography and hardware security since graduating with a degree in mathematics in 2001. He has represented the NCSC and its predecessor organisation in various standards bodies, including the Trusted Computing Group, Global Platform and FIDO.

file

Visible to the public ZeRØ: Zero-Overhead Resilient Operation Under Pointer Integrity Attacks

ABSTRACT

file

Visible to the public Verified Hardware/Software Co-Assurance: Enhancing Safety and Security for Critical Systems

Abstract:

file

Visible to the public Uighurs and Facial Recognition Technology.pdf

ABSTRACT

How do Chinese facial surveillance companies use ethnic clashes in the province of Xinjiang to increase their economic gains?

file

Visible to the public On Managing Vulnerabilities in AI/ML Systems

Abstract