| {ROTE}: Rollback protection for trusted execution S Matetic, M Ahmed, K Kostiainen, A Dhar, D Sommer, A Gervais, A Juels, ... 26th USENIX Security Symposium (USENIX Security 17), 1289-1306, 2017 | 320 | 2017 |
| Privacy loss classes: The central limit theorem in differential privacy D Sommer, S Meiser, E Mohammadi Cryptology ePrint Archive, 2018 | 109 | 2018 |
| Towards probabilistic verification of machine unlearning DM Sommer, L Song, S Wagh, P Mittal arXiv preprint arXiv:2003.04247, 2020 | 95 | 2020 |
| Athena: Probabilistic verification of machine unlearning DM Sommer, L Song, S Wagh, P Mittal Proceedings on Privacy Enhancing Technologies, 2022 | 52 | 2022 |
| Teaching Authentication in High Schools: Challenges and Lessons Learned E Stobert, E Cavar, L Malisa, D Sommer 2017 USENIX Workshop on Advances in Security Education (ASE 17), 2017 | 7 | 2017 |
| Learning numeric optimal differentially private truncated additive mechanisms DM Sommer, L Abfalterer, S Zingg, E Mohammadi arXiv preprint arXiv:2107.12957, 2021 | 5 | 2021 |
| ROTE: Rollback protection for trusted execution, 2017 S Matetic, M Ahmed, K Kostiainen, A Dhar, D Sommer, A Gervais, A Juels, ... | 5 | 2017 |
| Cyber-Risks in Paper Voting DM Sommer, M Schneider, J Gut, S Capkun arXiv preprint arXiv:1906.07532, 2019 | 3 | 2019 |
| Hacking in the blind:(almost) invisible runtime user interface attacks L Malisa, K Kostiainen, T Knell, D Sommer, S Capkun International Conference on Cryptographic Hardware and Embedded Systems, 468-489, 2017 | 3 | 2017 |
| Fighting Uphill Battles: Improvements in Personal Data Privacy DM Sommer ETH Zurich, 2021 | 2 | 2021 |
| Deniable upload and download via passive participation D Sommer, A Dhar, L Malisa, E Mohammadi, D Ronzani, S Capkun 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2019 | 2 | 2019 |
| CoverUp: Privacy Through" Forced" Participation in Anonymous Communication Networks D Sommer, A Dhar, L Malisa, E Mohammadi, D Ronzani, S Capkun Cryptology ePrint Archive, 2017 | 2 | 2017 |
| Teaching authentication as a life skill E Stobert, E Cavar, L Malisa, D Sommer IEEE Security & Privacy 16 (5), 82-85, 2018 | 1 | 2018 |
| Hacking in the blind:(almost) invisible runtime ui attacks on safety-critical terminals L Malisa, K Kostiainen, T Knell, D Sommer, S Capkun arXiv preprint arXiv:1604.04723, 2016 | 1 | 2016 |
| PrivacyBuDe: Privacy Buckets Demo Tight Differential Privacy Guarantees made Simple D Sommer, S Meiser, E Mohammadi Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | | 2018 |
| PrivacyBuDe D Sommer, S Meiser, E Mohammadi Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | | 2018 |
| CoverUp D Sommer, A Dhar, L Malisa, E Mohammadi, D Ronzani, S Capkun Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017 | | 2017 |