Northeastern University

General Info

Rank: #23 Worldwide
#18 in US
Papers: 99
Number of Researchers: 83
APA
(average papers per authors):
1.2
Country: USA

Activity Map

Contributors

  • Engin Kirda (25 papers)
  • William Robertson (12 papers)
  • Long Lu (12 papers)
  • Alan Mislove (11 papers)
  • Guevara Noubir (9 papers)
  • Christo Wilson (9 papers)
  • Cristina Nita-Rotaru (9 papers)
  • David Choffnes (6 papers)
  • Abhi Shelat (6 papers)
  • Kaan Onarlioglu (5 papers)
  • Sajjad Arshad (5 papers)
  • Aanjhan Ranganathan (5 papers)
  • Matthew Jagielski (5 papers)
  • Alina Oprea (5 papers)
  • Tobias Lauinger (3 papers)
  • Yaohui Chen (3 papers)
  • Michael Weissbacher (3 papers)
  • Alejandro Mera (3 papers)
  • Harshad Sathaye (3 papers)
  • Sashank Narain (3 papers)
  • Jack Doerner (3 papers)
  • Yashvanth Kondi (3 papers)
  • Zhichuang Sun (3 papers)
  • Bo Feng (3 papers)
  • Aldo Cassola (2 papers)
  • Travis Mayberry (2 papers)
  • Erik-Oliver Blass (2 papers)
  • Ahmet Salih Buyukkayhan (2 papers)
  • Jingjing Ren (2 papers)
  • Daniel J. Dubois (2 papers)
  • Giridhari Venkatadri (2 papers)
  • Muhammad Ahmad Bashir (2 papers)
  • Andrea Mambretti (2 papers)
  • Ruimin Sun (2 papers)
  • Collin Mulliner (2 papers)
  • Wil Robertson (2 papers)
  • Eysa Lee (2 papers)
  • Abhi shelat (2 papers)
  • Lucianna Kiffer (2 papers)
  • Jonathan Ullman (2 papers)
  • Ben Weintraub (2 papers)
  • Taejoong Chung (2 papers)
  • Giorgio Severi (2 papers)
  • Bahruz Jabiyev (2 papers)
  • Steven Sprecher (2 papers)
  • Reza Mirzazade Farkhani (2 papers)
  • Mansour Ahmadi (2 papers)
  • Agnes Hui Chan (1 papers)
  • Abdelberi Chaabane (1 papers)
  • Daniel Kostecki (1 papers)
  • Anthony Peterson (1 papers)
  • Changming Liu (1 papers)
  • Yi Hui Chen (1 papers)
  • Gerald LaMountain (1 papers)
  • Pau Closas (1 papers)
  • Triet Vo Huu (1 papers)
  • Kenneth Block (1 papers)
  • James Larisch (1 papers)
  • Yabing Liu (1 papers)
  • Megan Chen (1 papers)
  • abhi shelat (1 papers)
  • Chethan Kamath (1 papers)
  • Norbert Ludant (1 papers)
  • Tien D. Vo-Huu (1 papers)
  • Albert Cheu (1 papers)
  • Max von Hippel (1 papers)
  • Daniel Wichs (1 papers)
  • Tiantian Zhu (1 papers)
  • Yanzhi Wang (1 papers)
  • Rajmohan Rajaraman (1 papers)
  • Amogh Pradeep (1 papers)
  • Jeffrey Champion (1 papers)
  • Niklas Pousette Harger (1 papers)
  • Kaisong Song (1 papers)
  • Amin Kharaz (1 papers)
  • Domien Schepers (1 papers)
  • Matthew Dunn (1 papers)
  • Yukui Luo (1 papers)
  • Xiaolin Xu (1 papers)
  • Ryan Williams (1 papers)
  • Xue Lin (1 papers)
  • Anthony Gavazzi (1 papers)
  • Tommaso Innocenti (1 papers)

Papers

"EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis"

Engin Kirda, ... -- NDSS 2011

"Automated Discovery of Parameter Pollution Vulnerabilities in Web Applications"

Engin Kirda, ... -- NDSS 2011

"PiOS: Detecting Privacy Leaks in iOS Applications"

Engin Kirda, ... -- NDSS 2011

"The Power of Procrastination: Detection and Mitigation of Execution-Stalling Malicious Code"

Engin Kirda, ... -- CCS 2011

"Insights into User Behavior in Dealing with Internet Attacks"

Kaan Onarlioglu, Engin Kirda, ... -- NDSS 2012

"PUBCRAWL: Protecting Users and Businesses from CRAWLers"

Engin Kirda, ... -- Usenix 2012

"A Practical, Targeted, and Stealthy Attack Against WPA Enterprise Authentication"

Aldo Cassola, William Robertson, Engin Kirda, Guevara Noubir, ... -- NDSS 2013

"Clickonomics: Determining the Effect of Anti-Piracy Measures for One-Click Hosting"

Tobias Lauinger, Kaan Onarlioglu, Engin Kirda, ... -- NDSS 2013

"PrivExec: Private Execution as an Operating System Service"

Kaan Onarlioglu, Collin Mulliner, William Robertson, Engin Kirda, ... -- Oakland 2013

"Security Analysis of Pseudo-Random Number Generators with Input: /dev/random is not Robust"

Daniel Wichs, ... -- CCS 2013

"You Are How You Click: Clickstream Analysis for Sybil Detection"

Christo Wilson, ... -- Usenix 2013

"Efficient Private File Retrieval by Combining ORAM and PIR"

Travis Mayberry, Erik-Oliver Blass, Agnes Hui Chan, ... -- NDSS 2014

"Hidden GEMs: Automated Discovery of Access Control Vulnerabilities in Graphical User Interfaces"

Collin Mulliner, William Robertson, Engin Kirda, ... -- Oakland 2014

"AutoCog: Measuring the Description-to-permission Fidelity in Android Applications"

Tiantian Zhu, ... -- CCS 2014

"Toward Robust Hidden Volumes using Write-Only Oblivious RAM"

Erik-Oliver Blass, Travis Mayberry, Guevara Noubir, Kaan Onarlioglu, ... -- CCS 2014

"A Look at Targeted Attacks Through the Lense of an NGO"

Engin Kirda, ... -- Usenix 2014

"Towards Detecting Anomalous User Behavior in Online Social Networks"

Alan Mislove, ... -- Usenix 2014

"Authenticating Privately over Public Hotspots"

Aldo Cassola, Guevara Noubir, ... -- CCS 2015

"ZigZag: Automatically Hardening Web Applications Against Client-side Validation Vulnerabilities"

Michael Weissbacher, William Robertson, Engin Kirda, ... -- Usenix 2015

"CrossFire: An Analysis of Firefox Extension-Reuse Vulnerabilities"

Ahmet Salih Buyukkayhan, Kaan Onarlioglu, William Robertson, Engin Kirda, ... -- NDSS 2016

"Inferring User Routes and Locations using Zero-Permission Mobile Sensors"

Sashank Narain, Triet Vo Huu, Kenneth Block, Guevara Noubir, ... -- Oakland 2016

"LAVA: Large-scale Automated Vulnerability Addition"

Engin Kirda, Andrea Mambretti, Wil Robertson, ... -- Oakland 2016

"TriggerScope: Towards Detecting Logic Bombs in Android Applications"

William Robertson, Engin Kirda, ... -- Oakland 2016

"Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem"

Taejoong Chung, David Choffnes, Alan Mislove, Christo Wilson, ... -- CCS 2016

"UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware"

Amin Kharaz, Sajjad Arshad, William Robertson, Engin Kirda, ... -- Usenix 2016

"Caught Red Handed: Tracing Information Flows Between Ad Exchanges Using Retargeted Ads"

Muhammad Ahmad Bashir, Sajjad Arshad, William Robertson, Christo Wilson, ... -- Usenix 2016

"Thou Shalt Not Depend on Me: Analysing the Use of Outdated JavaScript Libraries on the Web"

Tobias Lauinger, Abdelberi Chaabane, Sajjad Arshad, William Robertson, Christo Wilson, Engin Kirda, ... -- NDSS 2017

"FBS-Radar: Uncovering Fake Base Stations at Scale in the Wild"

Christo Wilson, ... -- NDSS 2017

"CRLite: A Scalable System for Pushing All TLS Revocations to All Browsers"

James Larisch, David Choffnes, Alan Mislove, Christo Wilson, ... -- Oakland 2017

"SymCerts: Practical Symbolic Execution For Exposing Noncompliance in X.509 Certificate Validation Implementations"

Cristina Nita-Rotaru, ... -- Oakland 2017

"Full accounting for verifiable outsourcing"

Abhi Shelat, ... -- CCS 2017

"Rise of the HaCRS: Augmenting Autonomous Cyber Reasoning Systems with Human Assistance"

Michael Weissbacher, ... -- CCS 2017

"Scaling ORAM for Secure Computation"

Jack Doerner, Abhi Shelat, ... -- CCS 2017

"Identifier Binding Attacks and Defenses in Software-Defined Networks"

Cristina Nita-Rotaru, ... -- Usenix 2017

"Game of Registrars: An Empirical Analysis of Post-Expiration Domain Name Takeovers"

Tobias Lauinger, Ahmet Salih Buyukkayhan, Wil Robertson, ... -- Usenix 2017

"A Longitudinal, End-to-End View of the DNSSEC Ecosystem"

Taejoong Chung, David Choffnes, Alan Mislove, Christo Wilson, ... -- Usenix 2017

"Automated Attack Discovery in TCP Congestion Control Using a Model-guided Approach."

David Choffnes, Alan Mislove, Cristina Nita-Rotaru, ... -- NDSS 2018

"Bug Fixes, Improvements, ... and Privacy Leaks - A Longitudinal Study of PII Leaks Across Android App Versions."

Jingjing Ren, Daniel J. Dubois, David Choffnes, ... -- NDSS 2018

"InstaGuard: Instantly Deployable Hot-patches for Vulnerable System Programs on Android."

Yaohui Chen, Long Lu, ... -- NDSS 2018

"Investigating Ad Transparency Mechanisms in Social Media: A Case Study of Facebooks Explanations."

Giridhari Venkatadri, Alan Mislove, ... -- NDSS 2018

"Compiler-assisted Code Randomization"

Yaohui Chen, Long Lu, ... -- Oakland 2018

"Doubly-efficient zkSNARKs without trusted setup"

Abhi Shelat, ... -- Oakland 2018

"Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning"

Matthew Jagielski, Alina Oprea, Cristina Nita-Rotaru, ... -- Oakland 2018

"Privacy Risks with Facebook's PII-based Targeting: Auditing a Data Broker's Advertising Interface"

Giridhari Venkatadri, Yabing Liu, Alan Mislove, ... -- Oakland 2018

"Secure Two-party Threshold ECDSA from ECDSA Assumptions"

Jack Doerner, Yashvanth Kondi, Eysa Lee, Abhi shelat, ... -- Oakland 2018

"Surveylance: Automatically Detecting Online Survey Scams"

William Robertson, Engin Kirda, ... -- Oakland 2018

"PrinTracker: Fingerprinting 3D Printers using Commodity Scanners"

Yanzhi Wang, ... -- CCS 2018

"Cross-App Poisoning in Software-Defined Networking"

Cristina Nita-Rotaru, ... -- CCS 2018

"A better method to analyze blockchain consistency"

Lucianna Kiffer, Abhi Shelat, Rajmohan Rajaraman, ... -- CCS 2018

"Web's Sixth Sense: A Study of Scripts Accessing Smartphone Sensors"

Amogh Pradeep, ... -- CCS 2018

"An Empirical Study of Web Resource Manipulation in Real-world Mobile Applications"

Long Lu, ... -- Usenix 2018

"A First Look into the Facebook Advertising Ecosystem"

Alan Mislove, ... -- NDSS 2019

"Quantity vs. Quality: Evaluating User Interest Profiles Using Ad Preference Managers"

Muhammad Ahmad Bashir, Christo Wilson, ... -- NDSS 2019

"Blind Certificate Authorities"

Abhi Shelat, ... -- Oakland 2019

"Dominance as a New Trusted Computing Primitive for the Internet of Things"

Zhichuang Sun, ... -- Oakland 2019

"Security of GPS/INS based On-road Location Tracking Systems"

Sashank Narain, Aanjhan Ranganathan, Guevara Noubir, ... -- Oakland 2019

"Threshold ECDSA from ECDSA Assumptions"

Jack Doerner, Yashvanth Kondi, Eysa Lee, Abhi shelat, ... -- Oakland 2019

"Securely Sampling Biased Coins with Applications to Differential Privacy"

Jeffrey Champion, Abhi Shelat, Jonathan Ullman, ... -- CCS 2019

"You Are Who You Appear to Be: A Longitudinal Study of Domain Impersonation in TLS Certificates"

Alan Mislove, ... -- CCS 2019

"A Billion Open Interfaces for Eve and Mallory: MitM, DoS, and Tracking Attacks on iOS and macOS Through Apple Wireless Direct Link"

Sashank Narain, Guevara Noubir, ... -- Usenix 2019

"Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks"

Matthew Jagielski, Alina Oprea, Cristina Nita-Rotaru, ... -- Usenix 2019

"Wireless Attacks on Aircraft Instrument Landing Systems"

Harshad Sathaye, Domien Schepers, Aanjhan Ranganathan, Guevara Noubir, ... -- Usenix 2019

"Reading the Tea leaves: A Comparative Analysis of Threat Intelligence"

Matthew Dunn, ... -- Usenix 2019

"FlowPrint: Semi-Supervised Mobile-App Fingerprinting on Encrypted Network Traffic"

Jingjing Ren, Daniel J. Dubois, David Choffnes, ... -- NDSS 2020

"HotFuzz: Discovering Algorithmic Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing"

Andrea Mambretti, Sajjad Arshad, Michael Weissbacher, William Robertson, Engin Kirda, ... -- NDSS 2020

"Even Black Cats Cannot Stay Hidden in the Dark: Full-band De-anonymization of Bluetooth Classic Devices"

Guevara Noubir, ... -- Oakland 2020

"FlyClient: Super-Light Clients for Cryptocurrencies"

Lucianna Kiffer, ... -- Oakland 2020

"OAT: Attesting Operation Integrity of Embedded Devices"

Zhichuang Sun, Bo Feng, Long Lu, ... -- Oakland 2020

"SAVIOR: Towards Bug-Driven Hybrid Testing"

Yaohui Chen, Long Lu, ... -- Oakland 2020

"Cached and Confused: Web Cache Deception in the Wild"

Sajjad Arshad, Engin Kirda, William Robertson, ... -- Usenix 2020

"P2IM: Scalable and Hardware-independent Firmware Testing via Automatic Peripheral Interface Modeling"

Bo Feng, Alejandro Mera, Long Lu, ... -- Usenix 2020

"High Accuracy and High Fidelity Extraction of Neural Networks"

Matthew Jagielski, ... -- Usenix 2020

"More than a Fair Share: Network Data Remanence Attacks against Secret Sharing-based Schemes"

Daniel Kostecki, Anthony Peterson, Cristina Nita-Rotaru, ... -- NDSS 2021

"KUBO: Precise and Scalable Detection of User-triggerable Undefined Behavior Bugs in OS Kernel"

Changming Liu, Long Lu, ... -- NDSS 2021

"DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis"

Alejandro Mera, Bo Feng, Long Lu, Engin Kirda, ... -- Oakland 2021

"Diogenes: Lightweight Scalable RSA Modulus Generation with a Dishonest Majority"

Megan Chen, abhi shelat, ... -- Oakland 2021

"Keep the Dirt: Tainted TreeKEM, Adaptively and Actively Secure Continuous Group Key Agreement"

Chethan Kamath, ... -- Oakland 2021

"Linking Bluetooth LE & Classic and Implications for Privacy-Preserving Bluetooth-Based Protocols"

Norbert Ludant, Tien D. Vo-Huu, Guevara Noubir, ... -- Oakland 2021

"Manipulation Attacks in Local Differential Privacy"

Albert Cheu, Jonathan Ullman, ... -- Oakland 2021

"Proactive Threshold Wallets with Offline Devices"

Yashvanth Kondi, ... -- Oakland 2021

"Subpopulation Data Poisoning Attacks"

Matthew Jagielski, Giorgio Severi, Niklas Pousette Harger, Alina Oprea, ... -- CCS 2021

"HTTP Request Smuggling with Differential Fuzzing"

Bahruz Jabiyev, Steven Sprecher, Engin Kirda, ... -- CCS 2021

"PTAuth: Temporal Memory Safety via Robust Points-to Authentication"

Reza Mirzazade Farkhani, Mansour Ahmadi, Long Lu, ... -- Usenix 2021

"Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers"

Giorgio Severi, Alina Oprea, ... -- Usenix 2021

"Deep-Dup: An Adversarial Weight Duplication Attack Framework to Crush Deep Neural Network in Multi-Tenant FPGA"

Yukui Luo, Xiaolin Xu, ... -- Usenix 2021

"Mind Your Weight(s): A Large-scale Study on Insufficient Machine Learning Model Protection in Mobile Apps"

Zhichuang Sun, Ruimin Sun, Long Lu, Alan Mislove, ... -- Usenix 2021

"Finding Bugs Using Your Own Code: Detecting Functionally-similar yet Inconsistent Code"

Mansour Ahmadi, Reza Mirzazade Farkhani, Ryan Williams, Long Lu, ... -- Usenix 2021

"Extracting Training Data from Large Language Models"

Matthew Jagielski, Alina Oprea, ... -- Usenix 2021

"Dirty Road Can Attack: Security of Deep Learning based Automated Lane Centering under Physical-World Attack"

Xue Lin, ... -- Usenix 2021

"D-Box: DMA-enabled compartmentalization for embedded applications"

Alejandro Mera, Yi Hui Chen, Ruimin Sun, Engin Kirda, Long Lu, ... -- NDSS 2022

"SemperFi: Anti-spoofing GPS Receiver for UAVs"

Harshad Sathaye, Gerald LaMountain, Pau Closas, Aanjhan Ranganathan, ... -- NDSS 2022

"V-Range: Enabling Secure Ranging in 5G Wireless Networks"

Aanjhan Ranganathan, ... -- NDSS 2022

"Automated Attack Synthesis by Extracting Finite State Machines from Protocol Specification Documents"

Max von Hippel, Ben Weintraub, Cristina Nita-Rotaru, ... -- Oakland 2022

"ShorTor: Improving Tor Network Latency via Multi-hop Overlay Routing"

Ben Weintraub, Cristina Nita-Rotaru, ... -- Oakland 2022

"Hammurabi: A Framework for Pluggable, Logic-Based X.509 Certificate Validation Policies"

Alan Mislove, Christo Wilson, ... -- CCS 2022

"Order-Disorder: Imitation Adversarial Attacks for Black-box Neural Ranking Models"

Kaisong Song, ... -- CCS 2022

"Web Cache Deception Escalates!"

Engin Kirda, ... -- Usenix 2022

"An Experimental Study of GPS Spoofing and Takeover Attacks on UAVs"

Harshad Sathaye, Aanjhan Ranganathan, ... -- Usenix 2022

"FRAMESHIFTER: Security Implications of HTTP/2-to-HTTP/1 Conversion Anomalies"

Bahruz Jabiyev, Steven Sprecher, Anthony Gavazzi, Tommaso Innocenti, Engin Kirda, ... -- Usenix 2022