George Mason University

General Info

Rank: #36 Worldwide
#25 in US
Papers: 73
Number of Researchers: 53
APA
(average papers per authors):
1.4
Country: USA

Activity Map

Contributors

  • Kun Sun (14 papers)
  • Sushil Jajodia (12 papers)
  • Damon McCoy (10 papers)
  • Angelos Stavrou (5 papers)
  • S. Dov Gordon (5 papers)
  • Sanjeev Setia (4 papers)
  • Duminda Wijesekera (4 papers)
  • Xinyuan Wang (3 papers)
  • Samuel Ranellucci (3 papers)
  • Xuxian Jiang (2 papers)
  • Fengwei Zhang (2 papers)
  • Songqing Chen (2 papers)
  • Hitesh Dharmdasani (2 papers)
  • Foteini Baldimtsi (2 papers)
  • Paul Ammann (2 papers)
  • Daniel A. Menasce (2 papers)
  • Sencun Zhu (2 papers)
  • Mohammad Rezaeirad (2 papers)
  • Sahar Mazloom (2 papers)
  • Phi Hung Le (2 papers)
  • Mingkui Wei (2 papers)
  • Jiang Wang (1 papers)
  • Jackie Jones (1 papers)
  • Charles Smutz (1 papers)
  • Jonathan Katz (1 papers)
  • Jiahao Cao (1 papers)
  • Behnam Omidi (1 papers)
  • Khaled N. Khasawneh (1 papers)
  • Samir Koussih (1 papers)
  • William H. Winsborough (1 papers)
  • Lingyu Wang (1 papers)
  • Khaled Khasawneh (1 papers)
  • Panneer Selvam Santhalingam (1 papers)
  • Parth Pathak (1 papers)
  • Kevin Moran (1 papers)
  • Saket Kaushik (1 papers)
  • Shiping Chen (1 papers)
  • Bo Zhu (1 papers)
  • Lei Zhang (1 papers)
  • Alexander Brodsky (1 papers)
  • Brent Byunghoon Kang (1 papers)
  • Lingguang Lei (1 papers)
  • Tanmoy Chowdhury (1 papers)
  • Emanuela Marasco (1 papers)
  • Shu Wang (1 papers)
  • Xu He (1 papers)
  • Jie Wang (1 papers)
  • Ioanna Karantaidou (1 papers)
  • Giuseppe Ateniese (1 papers)
  • Evgenios M. Kornaropoulos (1 papers)
  • Nathaniel Moyer (1 papers)
  • Xiaokuan Zhang (1 papers)
  • Mohammad Karami (1 papers)

Papers

"Using Model Checking to Analyze Network Vulnerabilities"

Paul Ammann, ... -- Oakland 2000

"Kronos: A Scalable Group Re-Keying Approach for Secure Multicast"

Sanjeev Setia, Samir Koussih, Sushil Jajodia, ... -- Oakland 2000

"Performance of Public Key-Enabled Kerberos Authentication in Large Networks"

Daniel A. Menasce, ... -- Oakland 2001

"Policy algebras for access control: the propositional case"

Duminda Wijesekera, Sushil Jajodia, ... -- CCS 2001

"The performance of public key-enabled kerberos authentication in mobile computing applications"

Daniel A. Menasce, ... -- CCS 2001

"Policy algebras for access control the predicate case"

Duminda Wijesekera, Sushil Jajodia, ... -- CCS 2002

"Scalable, graph-based network vulnerability analysis"

Paul Ammann, Duminda Wijesekera, Saket Kaushik, ... -- CCS 2002

"LEAP: efficient security mechanisms for large-scale distributed sensor networks"

Sencun Zhu, Sanjeev Setia, Sushil Jajodia, ... -- CCS 2003

"Balancing confidentiality and efficiency in untrusted relational DBMSs"

Sushil Jajodia, ... -- CCS 2003

"Safety in Automated Trust Negotiation"

William H. Winsborough, ... -- Oakland 2004

"Securing OLAP Data Cubes Against Privacy Breaches"

Lingyu Wang, Sushil Jajodia, Duminda Wijesekera, ... -- Oakland 2004

"An Interleaved Hop-by-Hop Authentication Scheme for Filtering False Data Injection in Sensor Networks"

Sencun Zhu, Sanjeev Setia, Sushil Jajodia, ... -- Oakland 2004

"Tracking Anonymous Peer-to-Peer VoIP Calls on the Internet"

Xinyuan Wang, Shiping Chen, Sushil Jajodia, ... -- CCS 2005

"Providing Witness Anonymity in Peer-to-Peer Systems"

Bo Zhu, Sanjeev Setia, Sushil Jajodia, ... -- CCS 2006

"Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems"

Xinyuan Wang, Sushil Jajodia, ... -- Oakland 2007

"Stealthy Malware Detection Through VMM-Based 'Out-of-the-Box' Semantic View Reconstruction"

Xuxian Jiang, Xinyuan Wang, ... -- CCS 2007

"Information Disclosure under Realistic Assumptions: Privacy versus Optimality"

Lei Zhang, Sushil Jajodia, Alexander Brodsky, ... -- CCS 2007

"Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution"

Xuxian Jiang, ... -- NDSS 2008

"Casting out Demons: Sanitizing Training Data for Anomaly Sensors"

Angelos Stavrou, ... -- Oakland 2008

"Assessing Query Privileges via Safe and Efficient Permission Composition"

Sushil Jajodia, ... -- CCS 2008

"SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes"

Kun Sun, Jiang Wang, Fengwei Zhang, Angelos Stavrou, ... -- NDSS 2012

"Chrome Extensions: Threat Analysis and Countermeasures"

Songqing Chen, ... -- NDSS 2012

"Priceless: The Role of Payments in Abuse-advertised Goods"

Damon McCoy, Hitesh Dharmdasani, ... -- CCS 2012

"Manufacturing Compromise: The Emergence of Exploit-as-a-Service"

Damon McCoy, ... -- CCS 2012

"Vigilare: Toward Snoop-based Kernel Integrity Monitor"

Brent Byunghoon Kang, ... -- CCS 2012

"PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs"

Damon McCoy, ... -- Usenix 2012

"Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse"

Damon McCoy, ... -- Usenix 2013

"Scambaiter: Understanding Targeted Nigerian Scams on Craigslist"

Jackie Jones, Damon McCoy, ... -- NDSS 2014

"Botcoin: Monetizing Stolen Cycles"

Hitesh Dharmdasani, Damon McCoy, ... -- NDSS 2014

"Doppelganger Finder: Taking Stylometry To The Underground"

Damon McCoy, ... -- Oakland 2014

"Dialing Back Abuse on Phone Verified Accounts"

Damon McCoy, ... -- CCS 2014

"Characterizing Large-Scale Click Fraud in ZeroAccess"

Damon McCoy, ... -- CCS 2014

"Ad Injection at Scale: Assessing Deceptive Advertisement Modifications"

Damon McCoy, ... -- Oakland 2015

"Using Hardware Features for Increased Debugging Transparency"

Fengwei Zhang, Angelos Stavrou, ... -- Oakland 2015

"When a Tree Falls: Using Diversity in Ensemble Classifiers to Identify Evasion in Malware Detectors"

Charles Smutz, Angelos Stavrou, ... -- NDSS 2016

"You've Got Vulnerability: Exploring Effective Vulnerability Notifications"

Mohammad Karami, ... -- Usenix 2016

"TumbleBit: An Untrusted Bitcoin-Compatible Anonymous Payment Hub"

Foteini Baldimtsi, ... -- NDSS 2017

"To Catch a Ratter: Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild"

Mohammad Rezaeirad, ... -- Oakland 2017

"Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation"

Samuel Ranellucci, ... -- CCS 2017

"Global-Scale Secure Multiparty Computation"

Samuel Ranellucci, ... -- CCS 2017

"Vulnerable Implicit Service: A Revisit"

Lingguang Lei, Kun Sun, ... -- CCS 2017

"Secure Computation with Differentially Private Access Patterns"

Sahar Mazloom, S. Dov Gordon, ... -- CCS 2018

"Schrödinger's RAT: Profiling the Stakeholders in the Remote Access Trojan Ecosystem"

Mohammad Rezaeirad, ... -- Usenix 2018

"End-Users Get Maneuvered: Empirical Analysis of Redirection Hijacking in Content Delivery Networks"

Angelos Stavrou, ... -- Usenix 2018

"Multisketches: Practical Secure Sketches Using Off-the-Shelf Biometric Matching Algorithms"

Tanmoy Chowdhury, Emanuela Marasco, ... -- CCS 2019

"Stormy: Statistics in Tor by Measuring Securely"

S. Dov Gordon, ... -- CCS 2019

"Two-party Private Set Intersection with an Untrusted Third Party."

Phi Hung Le, Samuel Ranellucci, S. Dov Gordon, ... -- CCS 2019

"The CrossPath Attack: Disrupting the SDN Control Channel via Shared Links"

Kun Sun, ... -- Usenix 2019

"Adversarial Classification Under Differential Privacy"

Jonathan Katz, ... -- NDSS 2020

"When Match Fields Do Not Need to Match: Buffered Packets Hijacking in SDN"

Jiahao Cao, Kun Sun, ... -- NDSS 2020

"SPECCFI: Mitigating Spectre Attacks Using CFI Imformed Speculation"

Khaled Khasawneh, ... -- Oakland 2020

"When the Differences in Frequency Domain are Compensated: Understanding and Defeating Modulated Replay Attacks on Automatic Speech Recognition"

Shu Wang, Xu He, Kun Sun, ... -- CCS 2020

"Off-Path TCP Exploits of the Mixed IPID Assignment"

Kun Sun, ... -- CCS 2020

"Cache-in-the-Middle (CITM) Attacks : Manipulating Sensitive Data in Isolated Execution Environments"

Jie Wang, Kun Sun, ... -- CCS 2020

"Secure parallel computation on national scale volumes of data"

Sahar Mazloom, Phi Hung Le, S. Dov Gordon, ... -- Usenix 2020

"Locating the Security Patches for Disclosed OSS Vulnerabilities with Vulnerability-Commit Correlation Ranking"

Kun Sun, ... -- CCS 2021

"SyncAttack: Double-spending in Bitcoin Without Mining Power"

Songqing Chen, ... -- CCS 2021

"Warmonger: Inflicting Denial-of-Service via Serverless Functions in the Cloud"

Mingkui Wei, ... -- CCS 2021

"Compressed Oblivious Encoding for Homomorphically Encrypted Search"

S. Dov Gordon, ... -- CCS 2021

"A Hard Label Black-box Adversarial Attack Against Graph Neural Networks"

Kun Sun, ... -- CCS 2021

"Domain Shadowing: Leveraging Content Delivery Networks for Robust Blocking-Resistant Communications"

Mingkui Wei, ... -- Usenix 2021

"Repttack: Exploiting Cloud Schedulers to Guide Co-Location Attacks"

Behnam Omidi, Khaled N. Khasawneh, ... -- NDSS 2022

"PMTUD is not Panacea: Revisiting IP Fragmentation Attacks against TCP"

Kun Sun, ... -- NDSS 2022

"AccEar: Accelerometer Acoustic Eavesdropping with Unconstrained Vocabulary"

Panneer Selvam Santhalingam, Parth Pathak, ... -- Oakland 2022

"Why Crypto-detectors Fail: A Systematic Evaluation of Cryptographic Misuse Detection Techniques"

Kevin Moran, ... -- Oakland 2022

"Batching, Aggregation, and Zero-Knowledge Proofs in Bilinear Accumulators"

Ioanna Karantaidou, Foteini Baldimtsi, ... -- CCS 2022

"Eluding Secure Aggregation in Federated Learning via Model Inconsistency"

Giuseppe Ateniese, ... -- CCS 2022

"Leakage Inversion: Towards Quantifying Privacy in Searchable Encryption"

Evgenios M. Kornaropoulos, Nathaniel Moyer, ... -- CCS 2022

"Narrator: Secure and Practical State Continuity for Trusted Execution in the Cloud"

Xiaokuan Zhang, ... -- CCS 2022

"Ready Raider One: Exploring the Misuse of Cloud Gaming Services"

Kun Sun, ... -- CCS 2022

"Exploring the Unchartered Space of Container Registry Typosquatting"

Kun Sun, ... -- Usenix 2022

"RapidPatch: Firmware Hotpatching for Real-Time Embedded Devices"

Kun Sun, ... -- Usenix 2022

"Off-Path Network Traffic Manipulation via Revitalized ICMP Redirect Attacks"

Kun Sun, ... -- Usenix 2022