SRI International

General Info

Rank: #62 Worldwide
#41 in US
Papers: 48
Number of Researchers: 27
APA
(average papers per authors):
1.8
Country: USA

Activity Map

Contributors

  • Vinod Yegneswaran (14 papers)
  • Phillip Porras (12 papers)
  • Brent Waters (11 papers)
  • Peter G. Neumann (5 papers)
  • Drew Dean (4 papers)
  • Karim Eldefrawy (4 papers)
  • Martin Fong (3 papers)
  • Ashish Gehani (3 papers)
  • Jonathan Millen (3 papers)
  • Brooks Davis (3 papers)
  • Patrick Lincoln (3 papers)
  • Steven Cheung (2 papers)
  • Gabriela Ciocarlie (2 papers)
  • Vitaly Shmatikov (2 papers)
  • Mabry Tyson (1 papers)
  • Keith Skinner (1 papers)
  • Harald Ruess (1 papers)
  • Bruno Dutertre (1 papers)
  • Valentin Crettaz (1 papers)
  • Nirav Dave (1 papers)
  • Mariana Raykova (1 papers)
  • Linda Briesemeister (1 papers)
  • Stephane Graham-Lengrand (1 papers)
  • Vitor Pereira (1 papers)
  • Jian Zhang (1 papers)
  • Hassen Saidi (1 papers)
  • Hassaan Irshad (1 papers)

Papers

"Protocol-Independent Secrecy"

Jonathan Millen, Harald Ruess, ... -- Oakland 2000

"Efficient Fault-Tolerant Certificate Revocation"

Patrick Lincoln, Jonathan Millen, ... -- CCS 2000

"Constraint solving for bounded-process cryptographic protocol analysis"

Jonathan Millen, Vitaly Shmatikov, ... -- CCS 2001

"Intrusion-Tolerant Enclaves"

Bruno Dutertre, Valentin Crettaz, ... -- Oakland 2002

"Self-Healing Key Distribution with Revocation"

Drew Dean, ... -- Oakland 2002

"Setuid Demystified"

Drew Dean, ... -- Usenix 2002

"Model Checking One Million Lines of C Code"

Drew Dean, ... -- NDSS 2004

"Fixing Races for Fun and Profit: How to Use access(2)"

Drew Dean, ... -- Usenix 2004

"Privacy-Preserving Sharing and Correlation of Security Alerts"

Patrick Lincoln, Phillip Porras, Vitaly Shmatikov, ... -- Usenix 2004

"New Constructions and Practical Applications for Private Stream Searching (Extended Abstract)"

Brent Waters, ... -- Oakland 2006

"A Fully Collusion Resistant Broadcast, Trace, and Revoke System"

Brent Waters, ... -- CCS 2006

"Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data"

Brent Waters, ... -- CCS 2006

"Secure Attribute-Based Systems"

Brent Waters, ... -- CCS 2006

"Forward Secure Signatures with Untrusted Update"

Brent Waters, ... -- CCS 2006

"Cryptographic Methods for Storing Ballots on a Voting Machine"

Brent Waters, ... -- NDSS 2007

"Ciphertext-Policy Attribute-Based Encryption"

Brent Waters, ... -- Oakland 2007

"Attribute-Based Encryption with Non-Monotonic Access Structures"

Brent Waters, ... -- CCS 2007

"Harvesting Verifiable Challenges from Oblivious Online Sources"

Brent Waters, ... -- CCS 2007

"BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation"

Phillip Porras, Vinod Yegneswaran, Martin Fong, ... -- Usenix 2007

"Analysis-Resistant Malware"

Brent Waters, ... -- NDSS 2008

"Black Box Accountable Authority Identity-Based Encryption"

Brent Waters, ... -- CCS 2008

"Highly Predictive Blacklisting"

Phillip Porras, Jian Zhang, ... -- Usenix 2008

"BLADE: an attack-agnostic approach for preventing drive-by malware infections"

Vinod Yegneswaran, Phillip Porras, ... -- CCS 2010

"PathCutter: Severing the Self-Propagation Path of XSS JavaScript Worms in Social Web Networks"

Vinod Yegneswaran, Phillip Porras, ... -- NDSS 2012

"StegoTorus: A Camouflage Proxy for the Tor Anonymity System"

Vinod Yegneswaran, Linda Briesemeister, Steven Cheung, ... -- CCS 2012

"Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks"

Patrick Lincoln, ... -- Usenix 2012

"Aurasium: Practical Policy Enforcement for Android Applications"

Hassen Saidi, ... -- Usenix 2012

"FRESCO: Modular Composable Security Services for Software-Defined Networks"

Phillip Porras, Vinod Yegneswaran, Martin Fong, Mabry Tyson, ... -- NDSS 2013

"Clear and Present Data: Opaque Traffic and its Security Implications for the Future"

Phillip Porras, ... -- NDSS 2013

"AVANT-GUARD: Scalable and Vigilant Switch Flow Management in Software-Defined Networks"

Vinod Yegneswaran, Phillip Porras, ... -- CCS 2013

"Rosemary: A Robust, Secure, and High-performance Network Operating System"

Phillip Porras, Vinod Yegneswaran, ... -- CCS 2014

"EKHunter: A Counter-Offensive Toolkit for Exploit Kit Infiltration"

Phillip Porras, Vinod Yegneswaran, ... -- NDSS 2015

"P2C: Understanding Output Data Files via On-the-Fly Transformation from Producer to Consumer Executions"

Vinod Yegneswaran, ... -- NDSS 2015

"Securing the Software Defined Network Control Layer"

Phillip Porras, Martin Fong, Vinod Yegneswaran, Steven Cheung, Keith Skinner, ... -- NDSS 2015

"CHERI: A Hybrid Capability-System Architecture for Scalable Software Compartmentalization"

Peter G. Neumann, Nirav Dave, Brooks Davis, ... -- Oakland 2015

"Clean Application Compartmentalization with SOAAP"

Brooks Davis, Peter G. Neumann, ... -- CCS 2015

"Revisiting Square-Root ORAM: Efficient Random Access in Multi-Party Computation"

Mariana Raykova, ... -- Oakland 2016

"DELTA: A Security Assessment Framework for Software-Defined Networks"

Vinod Yegneswaran, Phillip Porras, ... -- NDSS 2017

"MCI : Modeling-based Causality Inference in Audit Logging for Attack Investigation."

Gabriela Ciocarlie, Ashish Gehani, Vinod Yegneswaran, ... -- NDSS 2018

"Thunderclap: Exploiting the Attack Surface of Operating-System IOMMU Protection with DMA from Malicious Peripherals"

Peter G. Neumann, ... -- NDSS 2019

"A High-Assurance Evaluator for Machine-Checked Secure Multiparty Computation"

Karim Eldefrawy, ... -- CCS 2019

"VRASED: A Verified Hardware/Software Co-Design for Remote Attestation"

Karim Eldefrawy, ... -- Usenix 2019

"Cornucopia: Temporal Safety for CHERI Heaps"

Brooks Davis, Peter G. Neumann, ... -- Oakland 2020

"Rigorous Engineering for Hardware Security: Formal Modelling and Proof in the CHERI Design and Implementation Process"

Peter G. Neumann, ... -- Oakland 2020

"APEX: A Verified Architecture for Proofs of Execution on Remote Devices under Full Software Compromise"

Karim Eldefrawy, ... -- Usenix 2020

"ALchemist: Fusing Application and Audit Logs for Precise Attack Provenance without Instrumentation"

Gabriela Ciocarlie, Vinod Yegneswaran, Ashish Gehani, ... -- NDSS 2021

"Machine-checked ZKP for NP relations: Formally Verified Security Proofs and Implementations of MPC-in-the-Head"

Karim Eldefrawy, Stephane Graham-Lengrand, Vitor Pereira, ... -- CCS 2021

"CLARION: Sound and Clear Provenance Tracking for Microservice Deployments"

Hassaan Irshad, Ashish Gehani, Vinod Yegneswaran, ... -- Usenix 2021