Zobrazeno 1 - 10
of 928
pro vyhledávání: '"Specter, Michael"'
Large language models (LLMs) such as those embedded in 'chatbots' are accelerating and democratizing research by providing comprehensible information and expertise from many different fields. However, these models may also confer easy access to dual-
Externí odkaz:
http://arxiv.org/abs/2306.03809
Autor:
Thomas, Kurt, Meiklejohn, Sarah, Specter, Michael A., Wang, Xiang, Llorà, Xavier, Somogyi, Stephan, Kleidermacher, David
With the accelerated adoption of end-to-end encryption, there is an opportunity to re-architect security and anti-abuse primitives in a manner that preserves new privacy expectations. In this paper, we consider two novel protocols for on-device block
Externí odkaz:
http://arxiv.org/abs/2304.02810
Autor:
Specter, Michael A.
Recent history is littered with examples of software vendors betraying user trust, exposing the public to exploitable code, data leaks, and invasive privacy practices. Undirected security research may be insufficient for preventing such foreseeable a
Externí odkaz:
https://hdl.handle.net/1721.1/140067
The security of the Internet rests on a small number of open-source cryptographic libraries: a vulnerability in any one of them threatens to compromise a significant percentage of web traffic. Despite this potential for security impact, the character
Externí odkaz:
http://arxiv.org/abs/2107.04940
Autor:
Meklenburg, John, Specter, Michael, Wentz, Michael, Balakrishnan, Hari, Chandrakasan, Anantha, Cohn, John, Hatke, Gary, Ivers, Louise, Rivest, Ronald, Sussman, Gerald Jay, Weitzner, Daniel
Throughout the course of the COVID-19 pandemic, several countries have developed and released contact tracing and exposure notification smartphone applications (apps) to help slow the spread of the disease. To support such apps, Apple and Google have
Externí odkaz:
http://arxiv.org/abs/2012.04770
Email breaches are commonplace, and they expose a wealth of personal, business, and political data that may have devastating consequences. The current email system allows any attacker who gains access to your email to prove the authenticity of the st
Externí odkaz:
http://arxiv.org/abs/1904.06425
Autor:
Mayrhofer, René, Stoep, Jeffrey Vander, Brubaker, Chad, Hackborn, Dianne, Bonné, Bram, Tuncay, Güliz Seray, Jover, Roger Piqueras, Specter, Michael A.
Publikováno v:
ACM Transactions on Privacy and Security, Volume 24, Issue 3, Article No. 19, 2021, pp 1-35
Android is the most widely deployed end-user focused operating system. With its growing set of use cases encompassing communication, navigation, media consumption, entertainment, finance, health, and access to sensors, actuators, cameras, or micropho
Externí odkaz:
http://arxiv.org/abs/1904.05572
Autor:
Specter, Michael Alan
Thesis: S.M. in Technology and Policy, Massachusetts Institute of Technology, Institute for Data, Systems, and Society, Technology and Policy Program, 2016.
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineerin
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineerin
Externí odkaz:
http://hdl.handle.net/1721.1/104028
There has recently been a surge of work in explanatory artificial intelligence (XAI). This research area tackles the important problem that complex machines and algorithms often cannot provide insights into their behavior and thought processes. XAI a
Externí odkaz:
http://arxiv.org/abs/1806.00069
Autor:
SPECTER, MICHAEL
Publikováno v:
New Yorker. 6/14/2021, Vol. 97 Issue 16, p62-68. 7p. 1 Black and White Photograph, 2 Cartoon or Caricatures.