Zobrazeno 1 - 10
of 128
pro vyhledávání: '"MEIKLEJOHN SARAH"'
Autor:
Thomas, Kurt, Kelley, Patrick Gage, Tao, David, Meiklejohn, Sarah, Vallis, Owen, Tan, Shunwen, Bratanič, Blaž, Ferreira, Felipe Tiengo, Eranti, Vijay Kumar, Bursztein, Elie
In this paper, we explore the feasibility of leveraging large language models (LLMs) to automate or otherwise assist human raters with identifying harmful content including hate speech, harassment, violent extremism, and election misinformation. Usin
Externí odkaz:
http://arxiv.org/abs/2406.12800
Autor:
Wei, Miranda, Consolvo, Sunny, Kelley, Patrick Gage, Kohno, Tadayoshi, Matthews, Tara, Meiklejohn, Sarah, Roesner, Franziska, Shelby, Renee, Thomas, Kurt, Umbach, Rebecca
Publikováno v:
Proceedings of the 33rd USENIX Security Symposium (USENIX Security 2024)
Image-based sexual abuse (IBSA), like other forms of technology-facilitated abuse, is a growing threat to people's digital safety. Attacks include unwanted solicitations for sexually explicit images, extorting people under threat of leaking their ima
Externí odkaz:
http://arxiv.org/abs/2406.12161
Autor:
Liu, Enze, Kappos, George, Mugnier, Eric, Invernizzi, Luca, Savage, Stefan, Tao, David, Thomas, Kurt, Voelker, Geoffrey M., Meiklejohn, Sarah
Scams -- fraudulent schemes designed to swindle money from victims -- have existed for as long as recorded history. However, the Internet's combination of low communication cost, global reach, and functional anonymity has allowed scam volumes to reac
Externí odkaz:
http://arxiv.org/abs/2405.09757
Autor:
Thomas, Kurt, Meiklejohn, Sarah, Specter, Michael A., Wang, Xiang, Llorà, Xavier, Somogyi, Stephan, Kleidermacher, David
With the accelerated adoption of end-to-end encryption, there is an opportunity to re-architect security and anti-abuse primitives in a manner that preserves new privacy expectations. In this paper, we consider two novel protocols for on-device block
Externí odkaz:
http://arxiv.org/abs/2304.02810
Autor:
Kappos, George, Yousaf, Haaroon, Stütz, Rainer, Rollet, Sofia, Haslhofer, Bernhard, Meiklejohn, Sarah
One of the defining features of Bitcoin and the thousands of cryptocurrencies that have been derived from it is a globally visible transaction ledger. While Bitcoin uses pseudonyms as a way to hide the identity of its participants, a long line of res
Externí odkaz:
http://arxiv.org/abs/2205.13882
The Web public key infrastructure is essential to providing secure communication on the Internet today, and certificate authorities play a crucial role in this ecosystem by issuing certificates. These authorities may misissue certificates or suffer m
Externí odkaz:
http://arxiv.org/abs/2203.01661
Pyramid schemes are investment scams in which top-level participants in a hierarchical network recruit and profit from an expanding base of defrauded newer participants. Pyramid schemes have existed for over a century, but there have been no in-depth
Externí odkaz:
http://arxiv.org/abs/2105.04380
Autor:
Abraham, Ittai, Jovanovic, Philipp, Maller, Mary, Meiklejohn, Sarah, Stern, Gilad, Tomescu, Alin
We give a protocol for Asynchronous Distributed Key Generation (A-DKG) that is optimally resilient (can withstand $f<\frac{n}{3}$ faulty parties), has a constant expected number of rounds, has $\tilde{O}(n^3)$ expected communication complexity, and a
Externí odkaz:
http://arxiv.org/abs/2102.09041
Autor:
Meiklejohn, Sarah, Kalinnikov, Pavel, Lin, Cindy S., Hutchinson, Martin, Belvin, Gary, Raykova, Mariana, Cutter, Al
In recent years, there has been increasing recognition of the benefits of having services provide auditable logs of data, as demonstrated by the deployment of Certificate Transparency and the development of other transparency projects. Most proposed
Externí odkaz:
http://arxiv.org/abs/2011.04551