In a couple of years, "study items" for the 6G security standard will be set. Security issues not included in these study items are unlikely to be standardized and patched even in 6G. Therefore, before these study items are set, the security research community needs to put in ...
Online platforms have a wealth of data, run countless experiments and use industrial-scale algorithms to optimize user experience. Despite this, many users seem to regret the time they spend on these platforms. One possible explanation is that incentives ...
Computer security is traditionally about the protection of technology, whereas trust and safety efforts focus on preventing technology abuse from harming people. In this talk, we'll explore the interplay between security and tech abuse, and make the case ...
In the public debate around privacy and the data economy, several claims have been made concerning the benefits that multiple stakeholders may accrue from the collection and analysis of consumer data. How many of those claims are empirically validated by ...
The Arbitrum blockchain protocol started as a Princeton University research project, and has grown into a robust community hosting hundred of applications and over 600,000 monthly users. Along the way, the system has evolved through at least three generations ...