New York University

General Info

Rank: #40 Worldwide
#29 in US
Papers: 68
Number of Researchers: 65
APA
(average papers per authors):
1.0
Country: USA

Activity Map

Contributors

  • Damon McCoy (18 papers)
  • Yevgeniy Dodis (7 papers)
  • Michael Walfish (6 papers)
  • Brendan Dolan-Gavitt (5 papers)
  • Sherman S.M. Chow (4 papers)
  • David Mazieres (3 papers)
  • Nasir Memon (3 papers)
  • Michael J. Freedman (3 papers)
  • Tobias Lauinger (3 papers)
  • Victor Shoup (3 papers)
  • Justin Cappos (3 papers)
  • Lakshminarayanan Subramanian (2 papers)
  • Helen Nissenbaum (2 papers)
  • Riad S. Wahby (2 papers)
  • Siddharth Garg (2 papers)
  • Ioanna Tzialla (2 papers)
  • Max Howald (2 papers)
  • Sebastian Angel (2 papers)
  • Maxwell Matthaios Aliapoulios (2 papers)
  • Laura Edelson (2 papers)
  • Rachel Greenstadt (2 papers)
  • Marc Waldman (2 papers)
  • Joseph Bonneau (2 papers)
  • Santiago Torres-Arias (2 papers)
  • Anca Ivan (1 papers)
  • Antonio Nicolosi (1 papers)
  • Maxwell Krohn (1 papers)
  • Dennis Shasha (1 papers)
  • Jie-Han Lee (1 papers)
  • Vincent Toubiana (1 papers)
  • Solon Barocas (1 papers)
  • Keith Ross (1 papers)
  • Anastasis Keliris (1 papers)
  • Ninghui Li (1 papers)
  • Periwinkle Doerfler (1 papers)
  • Chau Tran (1 papers)
  • Zhenghao Hu (1 papers)
  • Lenore D. Zuck (1 papers)
  • Shabsi Walfish (1 papers)
  • Nelly Fazio (1 papers)
  • Ashlesh Sharma (1 papers)
  • Dario Fiore (1 papers)
  • Seda Gurses (1 papers)
  • Hossein Siadati (1 papers)
  • Ye Ji (1 papers)
  • Thomas Wies (1 papers)
  • Noah Stephens-Davidowitz (1 papers)
  • Muhammad Yasin (1 papers)
  • Abhrajit Sengupta (1 papers)
  • Mohammed Thari Nabeel (1 papers)
  • Mohammed Ashraf (1 papers)
  • Ozgur Sinanoglu (1 papers)
  • Kevin Gallagher (1 papers)
  • Assimakis A. Kattis (1 papers)
  • Andrew Zitek (1 papers)
  • Michael Spilo (1 papers)
  • Zhen Sun (1 papers)
  • Aurojit Panda (1 papers)
  • Cameron Ballard (1 papers)
  • Rasika Bhalerao (1 papers)
  • Paul Grubbs (1 papers)
  • Arasu Arun (1 papers)
  • Ye Zhang (1 papers)
  • Zekun Shen (1 papers)
  • Ritik Roongta (1 papers)

Papers

"A Practically Implementable and Tractable Delegation Logic"

Ninghui Li, ... -- Oakland 2000

"Publius: A Robust, Tamper-Evident, Censorship-Resistant Web Publishing System"

Marc Waldman, ... -- Usenix 2000

"Tangler: a censorship-resistant publishing system based on document entanglements"

Marc Waldman, David Mazieres, ... -- CCS 2001

"The faithfulness of abstract protocol analysis: message authentication"

Lenore D. Zuck, ... -- CCS 2001

"Tarzan: a peer-to-peer anonymizing network layer"

Michael J. Freedman, ... -- CCS 2002

"Proxy Cryptography Revisited"

Anca Ivan, Yevgeniy Dodis, ... -- NDSS 2003

"Proactive Two-party Signatures for User Authentication"

Antonio Nicolosi, Maxwell Krohn, Yevgeniy Dodis, David Mazieres, ... -- NDSS 2003

"On-the-Fly Verification of Rateless Erasure Codes for Efficient Content Distribution"

Michael J. Freedman, David Mazieres, ... -- Oakland 2004

"Versatile Padding Schemes for Joint Signature and Encryption"

Yevgeniy Dodis, Michael J. Freedman, Shabsi Walfish, ... -- CCS 2004

"ID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption"

Nelly Fazio, Yevgeniy Dodis, ... -- CCS 2004

"Privacy and Contextual Integrity: Framework and Applications"

Helen Nissenbaum, ... -- Oakland 2006

"Stateful Public-Key Cryptosystems: How to Encrypt with One 160-bit Exponentiation"

Victor Shoup, ... -- CCS 2006

"Robust Receipt-Free Election System with Ballot Secrecy and Verifiability"

Sherman S.M. Chow, ... -- NDSS 2008

"The Blind Stone Tablet: Outsourcing Durability to Untrusted Parties"

Dennis Shasha, ... -- NDSS 2009

"Two-Party Computation Model for Privacy-Preserving Queries over Distributed Databases"

Sherman S.M. Chow, Jie-Han Lee, Lakshminarayanan Subramanian, ... -- NDSS 2009

"Improving privacy and security in multi-authority attribute-based encryption"

Sherman S.M. Chow, ... -- CCS 2009

"Anonymous credentials on a standard java card"

Victor Shoup, ... -- CCS 2009

"Adnostic: Privacy Preserving Targeted Advertising"

Vincent Toubiana, Helen Nissenbaum, Solon Barocas, ... -- NDSS 2010

"Practical leakage-resilient identity-based encryption from simple assumptions"

Sherman S.M. Chow, Yevgeniy Dodis, ... -- CCS 2010

"PaperSpeckle: Microscopic fingerprinting of paper"

Ashlesh Sharma, Lakshminarayanan Subramanian, ... -- CCS 2011

"Publicly Verifiable Delegation of Large Polynomials and Matrix Computations, with Applications"

Dario Fiore, ... -- CCS 2012

"Security Analysis of Pseudo-Random Number Generators with Input: /dev/random is not Robust"

Yevgeniy Dodis, ... -- CCS 2013

"FPDetective: Dusting the Web for Fingerprinters"

Seda Gurses, ... -- CCS 2013

"Efficient RAM and control flow in verifiable outsourced computation"

Riad S. Wahby, Michael Walfish, ... -- NDSS 2015

"Integrated Circuit (IC) Decamouflaging: Reverse Engineering Camouflaged ICs within Minutes (Not Years)"

Siddharth Garg, ... -- NDSS 2015

"LAVA: Large-scale Automated Vulnerability Addition"

Brendan Dolan-Gavitt, ... -- Oakland 2016

"Verifiable ASICs"

Riad S. Wahby, Max Howald, Siddharth Garg, Michael Walfish, ... -- Oakland 2016

"On omitting commits and committing omissions: preventing git metadata tampering that (re)introduces software vulnerabilities"

Santiago Torres-Arias, Justin Cappos, ... -- Usenix 2016

"Investigating Commercial Pay-Per-Install and the Distribution of Unwanted Software"

Damon McCoy, ... -- Usenix 2016

"Defending against malicious peripherals with Cinch"

Sebastian Angel, Max Howald, Michael Spilo, Zhen Sun, Michael Walfish, ... -- Usenix 2016

"You've Got Vulnerability: Exploring Effective Vulnerability Notifications"

Damon McCoy, ... -- Usenix 2016

"Internet-scale Probing of CPS: Inference, Characterization and Orchestration Analysis"

Nasir Memon, ... -- NDSS 2017

"To Catch a Ratter: Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild"

Damon McCoy, ... -- Oakland 2017

"Under the Shadow of Sunshine: Understanding and Detecting Bulletproof Hosting on Legitimate Service Provider Networks"

Damon McCoy, ... -- Oakland 2017

"Detecting Structurally Anomalous Logins Within Enterprise Networks"

Hossein Siadati, Nasir Memon, ... -- CCS 2017

"Full accounting for verifiable outsourcing"

Ye Ji, Michael Walfish, Thomas Wies, ... -- CCS 2017

"Implementing BP-Obfuscation Using Graph-Induced Encoding"

Victor Shoup, Noah Stephens-Davidowitz, ... -- CCS 2017

"Provably-Secure Logic Locking: From Theory To Practice"

Muhammad Yasin, Abhrajit Sengupta, Mohammed Thari Nabeel, Mohammed Ashraf, Ozgur Sinanoglu, ... -- CCS 2017

"CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds"

Justin Cappos, ... -- Usenix 2017

"Smoke Screener or Straight Shooter: Detecting Elite Sybil Attacks in User-Review Social Networks."

Keith Ross, ... -- NDSS 2018

"Doubly-efficient zkSNARKs without trusted setup"

Ioanna Tzialla, Michael Walfish, ... -- Oakland 2018

"PIR with Compressed Queries and Amortized Query Processing"

Sebastian Angel, ... -- Oakland 2018

"The Spyware Used in Intimate Partner Violence"

Periwinkle Doerfler, Damon McCoy, ... -- Oakland 2018

"Tracking Ransomware End-to-end"

Maxwell Matthaios Aliapoulios, Damon McCoy, ... -- Oakland 2018

"Detecting User Experience Issues of the Tor Browser In The Wild"

Kevin Gallagher, Brendan Dolan-Gavitt, Damon McCoy, Nasir Memon, ... -- CCS 2018

"Schrödinger's RAT: Profiling the Stakeholders in the Remote Access Trojan Ecosystem"

Damon McCoy, ... -- Usenix 2018

"ICSREF: A Framework for Automated Reverse Engineering of Industrial Control Systems Binaries"

Anastasis Keliris, ... -- NDSS 2019

"Clinical Computer Security for Victims of Intimate Partner Violence"

Damon McCoy, ... -- Usenix 2019

"Reading the Tea leaves: A Comparative Analysis of Threat Intelligence"

Damon McCoy, ... -- Usenix 2019

"Platforms in Everything: Analyzing Ground-Truth Data on the Anatomy and Economics of Bullet-Proof Hosting"

Damon McCoy, ... -- Usenix 2019

"in-toto: providing farm-to-table security properties for bits and bytes"

Santiago Torres-Arias, Justin Cappos, ... -- Usenix 2019

"A Security Analysis of the Facebook Ad Library"

Laura Edelson, Tobias Lauinger, Damon McCoy, ... -- Oakland 2020

"Are Anonymity-Seekers Just Like Everybody Else? An Analysis of Contributions to Wikipedia from Tor"

Chau Tran, Rachel Greenstadt, ... -- Oakland 2020

"Automatic Uncovering of Hidden Behaviors from Input Validation in Mobile Apps"

Brendan Dolan-Gavitt, ... -- Oakland 2020

"The Many Kinds of Creepware Used for Interpersonal Attacks"

Damon McCoy, ... -- Oakland 2020

"The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums"

Rachel Greenstadt, Damon McCoy, ... -- Usenix 2020

"SoK: Hate, Harassment, and the Changing Landscape of Online Abuse"

Damon McCoy, ... -- Oakland 2021

"Modular Design of Secure Group Messaging Protocols and the Security of MLS"

Yevgeniy Dodis, ... -- CCS 2021

"Cerebro: A Platform for Multi-Party Cryptographic Collaborative Learning"

Aurojit Panda, ... -- Usenix 2021

"Swiped: Analyzing Ground-truth Data of a Marketplace for Stolen Debit and Credit Cards"

Maxwell Matthaios Aliapoulios, Cameron Ballard, Rasika Bhalerao, Tobias Lauinger, Damon McCoy, ... -- Usenix 2021

"Transparency Dictionaries with Succinct Proofs of Correct Operation"

Ioanna Tzialla, ... -- NDSS 2022

"IRQDebloat: Reducing Driver Attack Surface in Embedded Devices"

Zhenghao Hu, Brendan Dolan-Gavitt, ... -- Oakland 2022

"RedShift: Transparent SNARKs from List Polynomial Commitments"

Assimakis A. Kattis, ... -- CCS 2022

"VeRSA: Verifiable Registries with Efficient Client Audits from RSA Authenticated Dictionaries"

Andrew Zitek, Joseph Bonneau, ... -- CCS 2022

"Cart-ology: Intercepting Targeted Advertising via Ad Network Identity Entanglement"

Damon McCoy, ... -- CCS 2022

"An Audit of Facebook's Political Ad Policy Enforcement"

Laura Edelson, Damon McCoy, Tobias Lauinger, ... -- Usenix 2022

"Zero-Knowledge Middleboxes"

Paul Grubbs, Arasu Arun, Ye Zhang, Joseph Bonneau, Michael Walfish, ... -- Usenix 2022

"Drifuzz: Harvesting Bugs in Device Drivers from Golden Seeds"

Zekun Shen, Ritik Roongta, Brendan Dolan-Gavitt, ... -- Usenix 2022