Cornell University

General Info

Rank: #26 Worldwide
#20 in US
Papers: 92
Number of Researchers: 90
APA
(average papers per authors):
1.0
Country: USA

Activity Map

Contributors

  • Elaine Shi (13 papers)
  • Andrew C. Myers (12 papers)
  • Congzheng Song (5 papers)
  • Ethan Cecchetti (5 papers)
  • Fan Zhang (5 papers)
  • Mu Zhang (4 papers)
  • Stephen Chong (4 papers)
  • Rahul Chatterjee (4 papers)
  • Bijeeta Pal (4 papers)
  • Nirvan Tyagi (4 papers)
  • Krishnaprasad Vikram (3 papers)
  • Aslan Askarov (3 papers)
  • Gookwon Edward Suh (3 papers)
  • Paul Grubbs (3 papers)
  • Harjasleen Malvai (3 papers)
  • Yinglei Wang (2 papers)
  • Wing-kei Yu (2 papers)
  • Edwin Kan (2 papers)
  • Jed Liu (2 papers)
  • Ittay Eyal (2 papers)
  • Hitesh Ballani (2 papers)
  • Danfeng Zhang (2 papers)
  • Robbert van Renesse (2 papers)
  • Mainack Mondal (2 papers)
  • Yin Zhang (2 papers)
  • Armin Namavari (2 papers)
  • Marina Sanusi Bohuk (2 papers)
  • Kenneth Birman (1 papers)
  • Huijia Rachel Lin (1 papers)
  • Rhea Dutta (1 papers)
  • Yue Duan (1 papers)
  • Fred B. Schneider (1 papers)
  • Lantian Zheng (1 papers)
  • Parvathinathan Venkitasubramaniam (1 papers)
  • Lang Tong (1 papers)
  • Michael Clarkson (1 papers)
  • Shuo Wu (1 papers)
  • Greg Malysa (1 papers)
  • G. Edward Su (1 papers)
  • Owen Arden (1 papers)
  • Michael George (1 papers)
  • Sarah Q. Xu (1 papers)
  • Zikai Wen (1 papers)
  • Kevin Sekniqi (1 papers)
  • Mark Zhao (1 papers)
  • Sam Havron (1 papers)
  • Maofan Yin (1 papers)
  • Alexander Frolov (1 papers)
  • Siqiu Yao (1 papers)
  • Haobin Ni (1 papers)
  • Nicola Dell (1 papers)
  • Joseph Y. Halpern (1 papers)
  • Riccardo Pucella (1 papers)
  • Paul Francis (1 papers)
  • Johannes Gehrke (1 papers)
  • Kyle Croman (1 papers)
  • Isaac Sheff (1 papers)
  • Tom Magrino (1 papers)
  • Iddo Bentov (1 papers)
  • Antonio Marcedone (1 papers)
  • Anusha Chowdhury (1 papers)
  • Andrew Ferraiuolo (1 papers)
  • Yuqi Zhao (1 papers)
  • Xiong Fan (1 papers)
  • Joshua Gancher (1 papers)
  • Soumya Basu (1 papers)
  • Emin Gun Sirer (1 papers)
  • Steffen Smolka (1 papers)
  • Nate Foster (1 papers)
  • Lucy Li (1 papers)
  • Jonathan Pang (1 papers)
  • Ariah Klages-Mundt (1 papers)
  • Alexander La Cour (1 papers)
  • Edward Suh (1 papers)
  • Khurram Afridi (1 papers)
  • Yan Ji (1 papers)
  • Paruj Ratanaworabhan (1 papers)
  • Bernard Wong (1 papers)
  • Laure Thompson (1 papers)
  • Robert Escriva (1 papers)
  • Mulong Luo (1 papers)
  • G. Edward Suh (1 papers)
  • Emily Tseng (1 papers)
  • Rachit Agarwal (1 papers)
  • J. Nathan Matias (1 papers)
  • Yiqing Hua (1 papers)
  • Kaishuo Cheng (1 papers)
  • Mor Naaman (1 papers)
  • Thomas Ristenpart (1 papers)
  • Julia Len (1 papers)

Papers

"Optimized Rekey for Group Communication Systems"

Kenneth Birman, ... -- NDSS 2000

"IRM Enforcement of Java Stack Inspection"

Fred B. Schneider, ... -- Oakland 2000

"Detecting Backdoors"

Yin Zhang, ... -- Usenix 2000

"Detecting Stepping Stones"

Yin Zhang, ... -- Usenix 2000

"On the relationship between strand spaces and multi-agent systems"

Joseph Y. Halpern, Riccardo Pucella, ... -- CCS 2001

"Using Replication and Partitioning to Build Secure Distributed Systems"

Lantian Zheng, Stephen Chong, Andrew C. Myers, ... -- Oakland 2003

"Security Policies for Downgrading"

Stephen Chong, Andrew C. Myers, ... -- CCS 2004

"RICH: Automatically Protecting Against Integer-Based Vulnerabilities"

Huijia Rachel Lin, ... -- NDSS 2007

"SIF: Enforcing Confidentiality and Integrity in Web Applications"

Stephen Chong, Krishnaprasad Vikram, Andrew C. Myers, ... -- Usenix 2007

"Anonymous Networking with Minimum Latency in Multihop Networks"

Parvathinathan Venkitasubramaniam, Lang Tong, ... -- Oakland 2008

"Civitas: Toward a Secure Voting System"

Michael Clarkson, Stephen Chong, Andrew C. Myers, ... -- Oakland 2008

"Mitigating DNS DoS Attacks"

Hitesh Ballani, Paul Francis, ... -- CCS 2008

"Ripley: automatically securing web 2.0 applications through replicated execution"

Krishnaprasad Vikram, ... -- CCS 2009

"NOZZLE: A Defense Against Heap-spraying Code Injection Attacks"

Paruj Ratanaworabhan, ... -- Usenix 2009

"Locating Prefix Hijackers using LOCK"

Hitesh Ballani, ... -- Usenix 2009

"Predictive black-box mitigation of timing channels"

Aslan Askarov, Danfeng Zhang, Andrew C. Myers, ... -- CCS 2010

"Dude, Where's That IP? Circumventing Measurement-based IP Geolocation"

Bernard Wong, ... -- Usenix 2010

"Predictive Mitigation of Timing Channels in Interactive Systems"

Danfeng Zhang, Aslan Askarov, Andrew C. Myers, ... -- CCS 2011

"Flash Memory for Ubiquitous Hardware Security Functions: True Random Number Generation and Device Fingerprints"

Yinglei Wang, Wing-kei Yu, Shuo Wu, Greg Malysa, G. Edward Su, Edwin Kan, ... -- Oakland 2012

"Sharing Mobile Code Securely With Information Flow Control"

Owen Arden, Michael George, Jed Liu, Krishnaprasad Vikram, Aslan Askarov, Andrew C. Myers, ... -- Oakland 2012

"Non-tracking Web Analytics"

Johannes Gehrke, ... -- CCS 2012

"Hiding Information in Flash Memory"

Yinglei Wang, Wing-kei Yu, Sarah Q. Xu, Edwin Kan, Gookwon Edward Suh, ... -- Oakland 2013

"The Miner's Dilemma"

Ittay Eyal, ... -- Oakland 2015

"Nonoutsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining Coalitions"

Elaine Shi, ... -- CCS 2015

"Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound"

Elaine Shi, ... -- CCS 2015

"Leakage-Abuse Attacks Against Searchable Encryption"

Paul Grubbs, ... -- CCS 2015

"Constants Count: Practical Improvements to Oblivious RAM"

Elaine Shi, ... -- Usenix 2015

"Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts"

Elaine Shi, Zikai Wen, ... -- Oakland 2016

"pASSWORD tYPOS and How to Correct Them Securely"

Rahul Chatterjee, ... -- Oakland 2016

"Town Crier: An Authenticated Data Feed for Smart Contracts"

Fan Zhang, Ethan Cecchetti, Elaine Shi, ... -- CCS 2016

"Breaking web applications built on top of encrypted data"

Paul Grubbs, ... -- CCS 2016

"The Ring of Gyges: Investigating the Future of Criminal Smart Contracts"

Elaine Shi, ... -- CCS 2016

"The Honey Badger of BFT Protocols"

Kyle Croman, Elaine Shi, ... -- CCS 2016

"Safe Serializable Secure Scheduling: Transactions and the Trade-off Between Security and Consistency"

Isaac Sheff, Tom Magrino, Jed Liu, Andrew C. Myers, Robbert van Renesse, ... -- CCS 2016

"Amortizing Secure Computation with Penalties"

Iddo Bentov, ... -- CCS 2016

"Stealing Machine Learning Models via Prediction APIs"

Fan Zhang, ... -- Usenix 2016

"HOP: Hardware makes Obfuscation Practical"

Elaine Shi, ... -- NDSS 2017

"Leakage-Abuse Attacks on Order-Revealing Encryption"

Kevin Sekniqi, ... -- Oakland 2017

"Membership Inference Attacks against Machine Learning Models"

Congzheng Song, ... -- Oakland 2017

"Machine Learning Models that Remember Too Much"

Congzheng Song, ... -- CCS 2017

"Nonmalleable Information Flow Control"

Ethan Cecchetti, Andrew C. Myers, ... -- CCS 2017

"Practical Secure Aggregation for Privacy-Preserving Machine Learning"

Antonio Marcedone, ... -- CCS 2017

"Solidus: Confidential Distributed Ledger Transactions via PVORM"

Ethan Cecchetti, Fan Zhang, Elaine Shi, ... -- CCS 2017

"The TypTop System: Personalized Typo-tolerant Password Checking"

Anusha Chowdhury, ... -- CCS 2017

"Vale: Verifying High-Performance Cryptographic Assembly Code"

Laure Thompson, ... -- Usenix 2017

"REM: Resource-Efficient Mining for Blockchains"

Fan Zhang, Ittay Eyal, Robert Escriva, Robbert van Renesse, ... -- Usenix 2017

"Things You May Not Know About Android (Un)Packers: A Systematic Study based on Whole-System Emulation."

Mu Zhang, ... -- NDSS 2018

"Towards a Timely Causality Analysis for Enterprise Security."

Mu Zhang, ... -- NDSS 2018

"FPGA-Based Remote Power Side-Channel Attacks"

Mark Zhao, Gookwon Edward Suh, ... -- Oakland 2018

"The Spyware Used in Intimate Partner Violence"

Sam Havron, ... -- Oakland 2018

"xJsnark: A Framework for Efficient Verifiable Computation"

Elaine Shi, ... -- Oakland 2018

"HyperFlow: A High-Assurance Processor Architecture for Practical Timing-Safe Information Flow Security"

Andrew Ferraiuolo, Yuqi Zhao, Andrew C. Myers, Gookwon Edward Suh, ... -- CCS 2018

"NodeMerge: Template Based Efficient Data Reduction For Big-Data Causality Analysis"

Mu Zhang, ... -- CCS 2018

"Symbolic Proofs for Lattice-Based Cryptography"

Xiong Fan, Joshua Gancher, Elaine Shi, ... -- CCS 2018

"BurnBox: Self-Revocable Encryption in a World Of Compelled Access"

Nirvan Tyagi, ... -- Usenix 2018

"Balancing Image Privacy and Usability with Thumbnail-Preserving Encryption"

Rhea Dutta, ... -- NDSS 2019

"Beyond Credential Stuffing: Password Similarity Models using Neural Networks"

Bijeeta Pal, Rahul Chatterjee, ... -- Oakland 2019

"Exploiting Unintended Feature Leakage in Collaborative Learning"

Congzheng Song, ... -- Oakland 2019

"Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks"

Paul Grubbs, ... -- Oakland 2019

"Towards Automated Safety Vetting of PLC Code in Real-World Plants"

Mu Zhang, Elaine Shi, ... -- Oakland 2019

"Efficient Verifiable Secret Sharing with Share Recovery in BFT Protocols"

Soumya Basu, Emin Gun Sirer, ... -- CCS 2019

"Moving Beyond Set-It-And-Forget-It Privacy Settings on Social Media"

Mainack Mondal, ... -- CCS 2019

"Multisketches: Practical Secure Sketches Using Off-the-Shelf Biometric Matching Algorithms"

Rahul Chatterjee, ... -- CCS 2019

"Oh, the Places You've Been! User Reactions to Longitudinal Transparency About Third-Party Web Tracking and Inferencing"

Mainack Mondal, ... -- CCS 2019

"PIEs: Public Incompressible Encodings for Decentralized Storage"

Ethan Cecchetti, ... -- CCS 2019

"Proof-Carrying Network Code"

Steffen Smolka, Nate Foster, ... -- CCS 2019

"Protocols for Checking Compromised Credentials"

Lucy Li, Bijeeta Pal, Rahul Chatterjee, ... -- CCS 2019

"SEEMless: Secure End-to-End Encrypted Messaging with less Trust"

Harjasleen Malvai, ... -- CCS 2019

"Traceback for End-to-End Encrypted Messaging"

Nirvan Tyagi, ... -- CCS 2019

"DeepBinDiff: Learning Program-Wide Code Representations for Binary Diffing"

Yue Duan, ... -- NDSS 2020

"Path Oblivious Heap: Optimal and Practical Oblivious Priority Queue"

Elaine Shi, ... -- Oakland 2020

"Sync HotStuff: Simple and Practical Synchronous State Machine Replication"

Maofan Yin, ... -- Oakland 2020

"DECO: Liberating Web Data Using Decentralized Oracles for TLS"

Fan Zhang, Harjasleen Malvai, ... -- CCS 2020

"BDoS: Blockchain Denial-of-Service Attacks"

Jonathan Pang, Ariah Klages-Mundt, ... -- CCS 2020

"Information Leakage in Embedding Models"

Congzheng Song, ... -- CCS 2020

"Stealthy Tracking of Autonomous Vehicles with Cache Side Channels"

Mulong Luo, Andrew C. Myers, G. Edward Suh, ... -- Usenix 2020

"The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums"

Emily Tseng, ... -- Usenix 2020

"Pancake: Frequency Smoothing for Encrypted Data Stores"

Rachit Agarwal, ... -- Usenix 2020

"CanDID: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance, and Accountability"

Harjasleen Malvai, Alexander Frolov, ... -- Oakland 2021

"Compositional Security for Reentrant Applications"

Ethan Cecchetti, Siqiu Yao, Haobin Ni, Andrew C. Myers, ... -- Oakland 2021

"SoK: Hate, Harassment, and the Changing Landscape of Online Abuse"

Nicola Dell, ... -- Oakland 2021

"Wireless Charging Power Side-Channel Attacks"

Alexander La Cour, Edward Suh, Khurram Afridi, ... -- CCS 2021

"Generalized Proof of Liabilities"

Yan Ji, ... -- CCS 2021

"Adapting Security Warnings to Counter Online Disinformation"

J. Nathan Matias, ... -- Usenix 2021

"You Autocomplete Me: Poisoning Vulnerabilities in Neural Code Completion"

Congzheng Song, ... -- Usenix 2021

"Searching Encrypted Data with Size-Locked Indexes"

Armin Namavari, ... -- Usenix 2021

"SoK: Authentication in Augmented and Virtual Reality"

Bijeeta Pal, ... -- Oakland 2022

"VeRSA: Verifiable Registries with Efficient Client Audits from RSA Authenticated Dictionaries"

Nirvan Tyagi, ... -- CCS 2022

"Increasing Adversarial Uncertainty to Scale Private Similarity Testing"

Yiqing Hua, Armin Namavari, Kaishuo Cheng, Mor Naaman, Thomas Ristenpart, ... -- Usenix 2022

"Orca: Blocklisting in Sender-Anonymous Messaging"

Nirvan Tyagi, Julia Len, ... -- Usenix 2022

"Might I Get Pwned: A Second Generation Compromised Credential Checking Service"

Bijeeta Pal, Marina Sanusi Bohuk, ... -- Usenix 2022

"Gossamer: Securely Measuring Password-based Logins"

Marina Sanusi Bohuk, ... -- Usenix 2022