Purdue University

General Info

Rank: #5 Worldwide
#5 in US
Papers: 192
Number of Researchers: 186
APA
(average papers per authors):
1.0
Country: USA

Activity Map

Contributors

  • Xiangyu Zhang (46 papers)
  • Dongyan Xu (41 papers)
  • Ninghui Li (30 papers)
  • Aniket Kate (17 papers)
  • Mathias Payer (13 papers)
  • Antonio Bianchi (10 papers)
  • Guanhong Tao (9 papers)
  • Tianhao Wang (9 papers)
  • Z. Berkay Celik (9 papers)
  • Byoungyoung Lee (8 papers)
  • Shiqing Ma (7 papers)
  • Elisa Bertino (7 papers)
  • Yingqi Liu (7 papers)
  • Adil Ahmad (7 papers)
  • Zhuo Zhang (7 papers)
  • Kyungtae Kim (6 papers)
  • Brendan Saltaformaggio (6 papers)
  • Yousra Aafer (6 papers)
  • Rohit Bhatia (6 papers)
  • Wen-Chuan Lee (5 papers)
  • Taegyu Kim (5 papers)
  • Saurabh Bagchi (5 papers)
  • Zhiqiang Lin (4 papers)
  • Cristina Nita-Rotaru (4 papers)
  • Scott A. Carr (4 papers)
  • Pedro Moreno-Sanchez (4 papers)
  • Hongjun Choi (4 papers)
  • Fei Wang (4 papers)
  • Dave Jing Tian (4 papers)
  • Yuhong Nan (4 papers)
  • Muslum Ozgur Ozmen (4 papers)
  • Weining Yang (4 papers)
  • Jeremiah Blocki (4 papers)
  • Dave (Jing) Tian (4 papers)
  • Ziqing Mao (3 papers)
  • Yonghwi Kwon (3 papers)
  • Fei Peng (3 papers)
  • Samuel Jero (3 papers)
  • Syed Rafiul Hussain (3 papers)
  • Nathan Burow (3 papers)
  • Naif Saleh Almakhdhub (3 papers)
  • Pedro Fonseca (3 papers)
  • Hyungsub Kim (3 papers)
  • Shengwei An (3 papers)
  • Guangyu Shen (3 papers)
  • Mahesh V. Tripunitara (3 papers)
  • Hui Peng (3 papers)
  • Jianliang Wu (3 papers)
  • Ruoyu Wu (3 papers)
  • Omar Chowdhury (3 papers)
  • Zhongshu Gu (3 papers)
  • Fan Fei (3 papers)
  • Zhan Tu (3 papers)
  • Xinyan Deng (3 papers)
  • Adithya Bhat (3 papers)
  • Xuxian Jiang (2 papers)
  • Keith Frikken (2 papers)
  • Jiangtao Li (2 papers)
  • Mikhail Atallah (2 papers)
  • Marina Blanton (2 papers)
  • Hong Chen (2 papers)
  • Kyu Hyung Lee (2 papers)
  • Weihang Wang (2 papers)
  • Derrick McKee (2 papers)
  • Jianjun Huang (2 papers)
  • Yi Sun (2 papers)
  • Sze Yiu Chau (2 papers)
  • Khaled Serag (2 papers)
  • Le Yu (2 papers)
  • Yapeng Ye (2 papers)
  • Qiuling Xu (2 papers)
  • Huangyi Ge (2 papers)
  • Samson Zhou (2 papers)
  • Wei You (2 papers)
  • Yu Shi (2 papers)
  • Aravind Machiry (2 papers)
  • Dave Tian (2 papers)
  • Qihua Wang (2 papers)
  • Yuan Qi (2 papers)
  • Wahbeh Qardaji (2 papers)
  • Zhui Deng (2 papers)
  • Priyam Biswas (2 papers)
  • Imtiaz Karim (2 papers)
  • Mike Frantzen (2 papers)
  • Gregory Walkup (2 papers)
  • Ashan Habib (1 papers)
  • Mohamed Hefeeda (1 papers)
  • Bharat Bhargava (1 papers)
  • Junghwan Rhee (1 papers)
  • Chao Wu (1 papers)
  • Hyojeong Lee (1 papers)
  • Jeff Seibert (1 papers)
  • Charles Killian (1 papers)
  • Dohyeong Kim (1 papers)
  • I Luk Kim (1 papers)
  • Shagufta Mehnaz (1 papers)
  • Muhammad Ihsanulhaq Sarfaraz (1 papers)
  • Pedro Moreno Sanchez (1 papers)
  • Zitao Li (1 papers)
  • S Chandra Mouli (1 papers)
  • Bruno Ribeiro (1 papers)
  • and Dongyan Xu (1 papers)
  • Zeyu Lei (1 papers)
  • Zhiyuan Cheng (1 papers)
  • Jung-Min Park (1 papers)
  • Rajeev Gopalakrishna (1 papers)
  • Eugene H. Spafford (1 papers)
  • Jan Vitek (1 papers)
  • Jerry Ma (1 papers)
  • Min Luo (1 papers)
  • Abraham A Clements (1 papers)
  • Prashast Srivastava (1 papers)
  • Jinkyu Koo (1 papers)
  • Endadul Hoque (1 papers)
  • Debajyoti Das (1 papers)
  • Benjamin Harsha (1 papers)
  • Basavesh Shivakumar (1 papers)
  • Xingping Zhang (1 papers)
  • Carson Harmon (1 papers)
  • Sushant Dinesh (1 papers)
  • Swarn Priya (1 papers)
  • Duc V Le (1 papers)
  • Wen-chuan Lee (1 papers)
  • Xuwei Liu (1 papers)
  • James Davis (1 papers)
  • Maria Pacheco Gonzales (1 papers)
  • Dan Goldwasser (1 papers)
  • Ertza Warraich (1 papers)
  • Mustafa Abdallah (1 papers)
  • Timothy Cason (1 papers)
  • Shreyas Sundaram (1 papers)
  • Clay Shields (1 papers)
  • Ziad Bizri (1 papers)
  • Serdar Cabuk (1 papers)
  • Mohamed Shehab (1 papers)
  • Arif Ghafoor (1 papers)
  • Xinming Ou (1 papers)
  • David Zage (1 papers)
  • Hao Peng (1 papers)
  • Chris Gates (1 papers)
  • Bhaskar Sarma (1 papers)
  • Rahul Potharaju (1 papers)
  • Dong Su (1 papers)
  • Yi Wu (1 papers)
  • Lei Cen (1 papers)
  • Terry Ching-Hsiang Hsu (1 papers)
  • Aiping Xiong (1 papers)
  • Robert W. Proctor (1 papers)
  • Jeon Yuseok (1 papers)
  • Hemanta K. Maij (1 papers)
  • Yuseok Jeon (1 papers)
  • Ben Harsha (1 papers)
  • Radhika Bhargava (1 papers)
  • Kyriakos Ispoglou (1 papers)
  • Bader AlBassam (1 papers)
  • Donghang Lu (1 papers)
  • Sayali Kate (1 papers)
  • Zhongtang Luo (1 papers)
  • Lu Su (1 papers)
  • Tao Li (1 papers)
  • Tiantian Gong (1 papers)
  • Tapti Palit (1 papers)
  • Alexandros Psomas (1 papers)
  • Raymond Muller (1 papers)
  • Santiago Torres-Arias (1 papers)
  • Mike Shuey (1 papers)
  • Rick Kennell (1 papers)
  • Leah H. Jamieson (1 papers)
  • AAron Walters (1 papers)
  • Abraham A. Clements (1 papers)
  • Shin-Yeh Tsai (1 papers)
  • Yiying Zhang (1 papers)
  • Changhee Jung (1 papers)
  • Christina Garman (1 papers)
  • Altay Ozen (1 papers)
  • Jizhou Chen (1 papers)
  • Arslan Khan (1 papers)
  • Jean Honorio (1 papers)
  • Muhammad Abubakar (1 papers)
  • Abdulellah Alsaheel (1 papers)
  • Mohsen Minaei (1 papers)
  • Arjun Arunasalam (1 papers)
  • Abdullah Imran (1 papers)
  • Habiba Farrukh (1 papers)
  • Muhammad Ibrahim (1 papers)
  • Siddharth Muralee (1 papers)

Papers

"A Protocol for Anonymous Communication Over the Internet"

Clay Shields, ... -- CCS 2000

"StackGhost: Hardware Facilitated Stack Protection"

Mike Frantzen, Mike Shuey, ... -- Usenix 2001

"FormatGuard: Automatic Protection From printf Format String Vulnerabilities"

Mike Frantzen, ... -- Usenix 2001

"Efficient Multicast Packet Authentication Using Signature Amortization"

Jung-Min Park, ... -- Oakland 2002

"Detecting Service Violations and DoS Attacks"

Ashan Habib, Mohamed Hefeeda, Bharat Bhargava, ... -- NDSS 2003

"Establishing the Genuinity of Remote Computer Systems"

Rick Kennell, Leah H. Jamieson, ... -- Usenix 2003

"Safety in Automated Trust Negotiation"

Ninghui Li, ... -- Oakland 2004

"On Mutually-Exclusive Roles and Separation of Duty"

Ninghui Li, Ziad Bizri, Mahesh V. Tripunitara, ... -- CCS 2004

"Comparing the Expressive Power of Access Control Models"

Mahesh V. Tripunitara, Ninghui Li, ... -- CCS 2004

"IP Covert Timing Channels: An Initial Exploration"

Serdar Cabuk, ... -- CCS 2004

"Collapsar: A VM-Based Architecture for Network Attack Detention Center"

Xuxian Jiang, Dongyan Xu, ... -- Usenix 2004

"Efficient Intrusion Detection using Automaton Inlining"

Rajeev Gopalakrishna, Eugene H. Spafford, Jan Vitek, ... -- Oakland 2005

"On Safety in Discretionary Access Control"

Ninghui Li, Mahesh V. Tripunitara, ... -- Oakland 2005

"Automated Trust Negotiation Using Cryptographic Credentials"

Jiangtao Li, Ninghui Li, ... -- CCS 2005

"Secure Collaboration in Mediator-Free Environments"

Mohamed Shehab, Elisa Bertino, Arif Ghafoor, ... -- CCS 2005

"Dynamic and Efficient Key Management for Access Hierarchies"

Mikhail Atallah, Keith Frikken, Marina Blanton, ... -- CCS 2005

"Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities"

Xuxian Jiang, ... -- NDSS 2006

"Trust Negotiation with Hidden Credentials, Hidden Policies, and Policy Cycles"

Keith Frikken, Jiangtao Li, Mikhail Atallah, ... -- NDSS 2006

"Beyond Separation of Duty: An Algebra for Specifying High-level Security Policies"

Ninghui Li, Qihua Wang, ... -- CCS 2006

"Resiliency Policies in Access Control"

Ninghui Li, Qihua Wang, ... -- CCS 2006

"A Scalable Approach to Attack Graph Generation"

Xinming Ou, ... -- CCS 2006

"An Architecture for Specification-Based Detection of Semantic Integrity Violations in Kernel Dynamic Data"

AAron Walters, ... -- Usenix 2006

"Secret Handshakes with Dynamic and Fuzzy Matching"

Marina Blanton, ... -- NDSS 2007

"Usable Mandatory Integrity Protection for Operating Systems"

Ninghui Li, Ziqing Mao, Hong Chen, ... -- Oakland 2007

"Stealthy Malware Detection Through VMM-Based 'Out-of-the-Box' Semantic View Reconstruction"

Dongyan Xu, ... -- CCS 2007

"On the Accuracy of Decentralized Virtual Coordinate Systems in Adversarial Networks"

David Zage, Cristina Nita-Rotaru, ... -- CCS 2007

"PRECIP: Towards Practical and Retrofittable Confidential Information Protection"

Ninghui Li, ... -- NDSS 2008

"Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution"

Zhiqiang Lin, Dongyan Xu, Xiangyu Zhang, ... -- NDSS 2008

"Analyzing and Comparing the Protection Quality of Security Enhanced Operating Systems"

Hong Chen, Ninghui Li, Ziqing Mao, ... -- NDSS 2009

"IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution"

Zhiqiang Lin, ... -- NDSS 2009

"Pretty-Bad-Proxy: An Overlooked Adversary in Browsers' HTTPS Deployments"

Ziqing Mao, ... -- Oakland 2009

"Automatic Reverse Engineering of Data Structures from Binary Execution"

Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu, ... -- NDSS 2010

"SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures"

Zhiqiang Lin, Junghwan Rhee, Xiangyu Zhang, Dongyan Xu, ... -- NDSS 2011

"Process Out-Grafting: An Efficient Out-of-VM Approach for Fine-Grained Process Execution Monitoring"

Dongyan Xu, ... -- CCS 2011

"Discovering Semantic Data of Interest from Un-mappable Memory with Confidence"

Chao Wu, Xiangyu Zhang, Dongyan Xu, ... -- NDSS 2012

"Gatling: Automatic Attack Discovery in Large-Scale Distributed Systems"

Hyojeong Lee, Jeff Seibert, Charles Killian, Cristina Nita-Rotaru, ... -- NDSS 2012

"Using Probabilistic Generative Models for Ranking Risks of Android Apps"

Hao Peng, Chris Gates, Bhaskar Sarma, Ninghui Li, Yuan Qi, Rahul Potharaju, Cristina Nita-Rotaru, ... -- CCS 2012

"Minimizing Private Data Disclosures in the Smart Grid"

Weining Yang, Ninghui Li, Yuan Qi, Wahbeh Qardaji, ... -- CCS 2012

"High Accuracy Attack Provenance via Binary-Based Execution Partition"

Kyu Hyung Lee, Xiangyu Zhang, Dongyan Xu, ... -- NDSS 2013

"Obfuscation Resilient Binary Code Reuse through Trace-oriented Programming"

Xiangyu Zhang, Dongyan Xu, ... -- CCS 2013

"Membership Privacy: A Unifying Framework For Privacy Definitions"

Ninghui Li, Wahbeh Qardaji, Dong Su, Yi Wu, Weining Yang, ... -- CCS 2013

"LogGC: Garbage Collecting Audit Log"

Kyu Hyung Lee, Xiangyu Zhang, Dongyan Xu, ... -- CCS 2013

"A Study of Probabilistic Password Models"

Jerry Ma, Weining Yang, Min Luo, Ninghui Li, ... -- Oakland 2014

"DSCRETE: Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse"

Brendan Saltaformaggio, Zhongshu Gu, Xiangyu Zhang, Dongyan Xu, ... -- Usenix 2014

"X-Force: Force-Executing Binary Programs for Security Applications"

Fei Peng, Zhui Deng, Xiangyu Zhang, Dongyan Xu, ... -- Usenix 2014

"P2C: Understanding Output Data Files via On-the-Fly Transformation from Producer to Consumer Executions"

Yonghwi Kwon, Fei Peng, Dohyeong Kim, Kyungtae Kim, Xiangyu Zhang, Dongyan Xu, ... -- NDSS 2015

"How Secure and Quick is QUIC? Provable Security and Performance Analyses"

Samuel Jero, Cristina Nita-Rotaru, ... -- Oakland 2015

"Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits"

Omar Chowdhury, ... -- CCS 2015

"GUITAR: Piecing Together Android App GUIs from Memory Images"

Brendan Saltaformaggio, Rohit Bhatia, Zhongshu Gu, Xiangyu Zhang, Dongyan Xu, ... -- CCS 2015

"iRiS: Vetting Private API Abuse in iOS Applications"

Zhui Deng, Brendan Saltaformaggio, Xiangyu Zhang, Dongyan Xu, ... -- CCS 2015

"AUTOREB: Automatically Understanding the Review-to-Behavior Fidelity in Android Applications"

Lei Cen, ... -- CCS 2015

"VCR: App-Agnostic Recovery of Photographic Evidence from Android Device Memory Images"

Brendan Saltaformaggio, Rohit Bhatia, Zhongshu Gu, Xiangyu Zhang, Dongyan Xu, ... -- CCS 2015

"Control-Flow Bending: On the Effectiveness of Control-Flow Integrity"

Mathias Payer, ... -- Usenix 2015

"SUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps"

Jianjun Huang, Xiangyu Zhang, ... -- Usenix 2015

"VTrust: Regaining Trust on Virtual Calls"

Scott A. Carr, Mathias Payer, ... -- NDSS 2016

"ProTracer: Towards Practical Provenance Tracing by Alternating Between Logging and Tainting"

Shiqing Ma, Xiangyu Zhang, Dongyan Xu, ... -- NDSS 2016

"Enforcing Least Privilege Memory Views for Multithreaded Applications"

Terry Ching-Hsiang Hsu, Mathias Payer, ... -- CCS 2016

"An Empirical Study of Mnemonic Sentence-based Password Generation Strategies"

Weining Yang, Ninghui Li, Omar Chowdhury, Aiping Xiong, Robert W. Proctor, ... -- CCS 2016

"TypeSanitizer: Practical Type Confusion Detection"

Jeon Yuseok, Hui Peng, Mathias Payer, ... -- CCS 2016

"On the Security and Usability of Segment-based Visual Cryptographic Authentication Protocols"

Tianhao Wang, Huangyi Ge, Omar Chowdhury, Hemanta K. Maij, Ninghui Li, ... -- CCS 2016

"Screen after Previous Screens: Spatial-Temporal Recreation of Android App Displays from Memory Images"

Brendan Saltaformaggio, Rohit Bhatia, Xiangyu Zhang, Dongyan Xu, ... -- Usenix 2016

"P2P Mixing and Unlinkable Bitcoin Transactions"

Pedro Moreno-Sanchez, Aniket Kate, ... -- NDSS 2017

"SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks"

Pedro Moreno-Sanchez, Aniket Kate, ... -- NDSS 2017

"SGX-Shield: Enabling Address Space Layout Randomization for SGX Programs"

Byoungyoung Lee, ... -- NDSS 2017

"An Evil Copy: How the Loader Betrays You"

Mathias Payer, ... -- NDSS 2017

"Self Destructing Exploit Executions via Input Perturbation"

Yonghwi Kwon, Brendan Saltaformaggio, I Luk Kim, Xiangyu Zhang, Dongyan Xu, ... -- NDSS 2017

"Protecting Bare-metal Embedded Systems with Privilege Overlays"

Abraham A Clements, Naif Saleh Almakhdhub, Prashast Srivastava, Jinkyu Koo, Saurabh Bagchi, Mathias Payer, ... -- Oakland 2017

"SymCerts: Practical Symbolic Execution For Exposing Noncompliance in X.509 Certificate Validation Implementations"

Sze Yiu Chau, Endadul Hoque, Huangyi Ge, Aniket Kate, Ninghui Li, ... -- Oakland 2017

"Concurrency and Privacy with Payment-Channel Networks"

Pedro Moreno-Sanchez, Aniket Kate, ... -- CCS 2017

"Gomora: Efficient Type Safety for C++"

Yuseok Jeon, Priyam Biswas, Scott A. Carr, Byoungyoung Lee, Mathias Payer, ... -- CCS 2017

"Practical Graphs for Optimal Side-Channel Resistant Memory-Hard Functions"

Jeremiah Blocki, Ben Harsha, ... -- CCS 2017

"Where the Wild Warnings Are: Root Causes of Chrome HTTPS Certificate Errors"

Radhika Bhargava, ... -- CCS 2017

"Venerable Variadic Vulnerabilities Vanquished"

Priyam Biswas, Scott A. Carr, Mathias Payer, ... -- Usenix 2017

"Identifier Binding Attacks and Defenses in Software-Defined Networks"

Samuel Jero, ... -- Usenix 2017

"Optimizing Locally Differentially Private Protocols"

Tianhao Wang, Jeremiah Blocki, Ninghui Li, ... -- Usenix 2017

"MPI: Multiple Perspective Attack Investigation with Semantic Aware Execution Partitioning"

Shiqing Ma, Fei Wang, Xiangyu Zhang, Dongyan Xu, ... -- Usenix 2017

"Automated Attack Discovery in TCP Congestion Control Using a Model-guided Approach."

Samuel Jero, ... -- NDSS 2018

"LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE."

Syed Rafiul Hussain, Shagufta Mehnaz, Elisa Bertino, ... -- NDSS 2018

"Trojaning Attack on Neural Networks."

Yingqi Liu, Shiqing Ma, Yousra Aafer, Wen-Chuan Lee, Weihang Wang, Xiangyu Zhang, ... -- NDSS 2018

"Securing Real-Time Microcontroller Systems through Customized Memory View Switching."

Taegyu Kim, Hongjun Choi, Byoungyoung Lee, Xiangyu Zhang, Dongyan Xu, ... -- NDSS 2018

"Tipped Off by Your Memory Allocator: Device-Wide User Activity Sequencing from Android Memory Images."

Rohit Bhatia, Xiangyu Zhang, Dongyan Xu, ... -- NDSS 2018

"CFIXX: Object Type Integrity for C++."

Nathan Burow, Derrick McKee, Scott A. Carr, Mathias Payer, ... -- NDSS 2018

"Enhancing Memory Error Detection for Large-Scale Applications and Fuzz Testing."

Byoungyoung Lee, ... -- NDSS 2018

"OBLIVIATE: A Data Oblivious Filesystem for Intel SGX."

Adil Ahmad, Kyungtae Kim, Muhammad Ihsanulhaq Sarfaraz, Byoungyoung Lee, ... -- NDSS 2018

"MCI : Modeling-based Causality Inference in Audit Logging for Attack Investigation."

Yonghwi Kwon, Fei Wang, Weihang Wang, Wen-Chuan Lee, Shiqing Ma, Xiangyu Zhang, Dongyan Xu, ... -- NDSS 2018

"AceDroid: Normalizing Diverse Android Access Control Checks for Inconsistency Detection."

Yousra Aafer, Jianjun Huang, Yi Sun, Xiangyu Zhang, Ninghui Li, ... -- NDSS 2018

"Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions."

Pedro Moreno-Sanchez, Aniket Kate, ... -- NDSS 2018

"Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency --- Choose Two"

Debajyoti Das, Aniket Kate, ... -- Oakland 2018

"Locally Differentially Private Frequent Itemset Mining"

Tianhao Wang, Ninghui Li, ... -- Oakland 2018

"On the Economics of Offline Password Cracking"

Jeremiah Blocki, Benjamin Harsha, Samson Zhou, ... -- Oakland 2018

"T-Fuzz: fuzzing by program transformation"

Hui Peng, Mathias Payer, ... -- Oakland 2018

"Block Oriented Programming: Automating Data-Only Attacks"

Kyriakos Ispoglou, Bader AlBassam, Mathias Payer, ... -- CCS 2018

"CALM: Consistent Adaptive Local Marginal for Marginal Release under Local Differential Privacy"

Tianhao Wang, Ninghui Li, ... -- CCS 2018

"Detecting Attacks Against Robotic Vehicles: A Control Invariant Approach"

Hongjun Choi, Wen-Chuan Lee, Yousra Aafer, Fan Fei, Zhan Tu, Xiangyu Zhang, Dongyan Xu, Xinyan Deng, ... -- CCS 2018

"Milkomeda: Safeguarding the Mobile GPU Interface Using WebGL's Security Checks"

Mathias Payer, ... -- CCS 2018

"Bandwidth-Hard Functions: Reductions and Lower Bounds"

Jeremiah Blocki, Samson Zhou, ... -- CCS 2018

"Precise Android API Protection Mapping Derivation and Reasoning"

Yousra Aafer, Guanhong Tao, Xiangyu Zhang, Ninghui Li, ... -- CCS 2018

"ACES: Automatic Compartments for Embedded Systems"

Abraham A. Clements, Naif Saleh Almakhdhub, Saurabh Bagchi, Mathias Payer, ... -- Usenix 2018

"Privacy-preserving Multi-hop Locks for Blockchain Scalability and Interoperability"

Pedro Moreno Sanchez, Aniket Kate, ... -- NDSS 2019

"NIC: Detecting Adversarial Samples with Neural Network Invariant Checking"

Shiqing Ma, Yingqi Liu, Guanhong Tao, Wen-Chuan Lee, Xiangyu Zhang, ... -- NDSS 2019

"Analyzing Semantic Correctness using Symbolic Execution: A Case Study on PKCS#1 v1.5 Signature Verification"

Sze Yiu Chau, Aniket Kate, Ninghui Li, ... -- NDSS 2019

"Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information"

Syed Rafiul Hussain, Ninghui Li, Elisa Bertino, ... -- NDSS 2019

"OBFSCURO: A Commodity Obfuscation Engine on Intel SGX"

Adil Ahmad, Byoungyoung Lee, ... -- NDSS 2019

"ProFuzzer: On-the-fly Input Type Probing for Better Zero-day Vulnerability Discovery"

Wei You, Shiqing Ma, Xiangyu Zhang, ... -- Oakland 2019

"Razzer: Finding Kernel Race Bugs through Fuzzing"

Kyungtae Kim, Basavesh Shivakumar, Byoungyoung Lee, ... -- Oakland 2019

"SoK: Shining Light on Shadow Stacks"

Nathan Burow, Xingping Zhang, ... -- Oakland 2019

"5GReasoner: A Property-Directed Security and Privacy Analysis Framework for 5G Cellular Network Protocol"

Syed Rafiul Hussain, Imtiaz Karim, Elisa Bertino, ... -- CCS 2019

"ABS: Scanning Neural Networks for Back-doors by Artificial Brain Stimulation"

Yingqi Liu, Wen-Chuan Lee, Guanhong Tao, Shiqing Ma, Yousra Aafer, Xiangyu Zhang, ... -- CCS 2019

"HoneyBadgerMPC and AsynchroMix: Practical Asynchronous MPC and its Application to Anonymous Communication"

Donghang Lu, Aniket Kate, ... -- CCS 2019

"uXOM: Efficient eXecute-Only Memory on ARM Cortex-M"

Byoungyoung Lee, ... -- Usenix 2019

"RVFuzzer: Finding Input Validation Bugs in Robotic Vehicles through Control-Guided Testing"

Taegyu Kim, Fan Fei, Zhan Tu, Gregory Walkup, Xiangyu Zhang, Xinyan Deng, Dongyan Xu, ... -- Usenix 2019

"Pythia: Remote Oracles for the Masses"

Shin-Yeh Tsai, Yiying Zhang, ... -- Usenix 2019

"PeX: A Permission Check Analysis Framework for Linux Kernel"

Changhee Jung, ... -- Usenix 2019

"Custos: Practical Tamper-Evident Auditing of Operating Systems Using Trusted Execution"

Dave Jing Tian, ... -- NDSS 2020

"Finding Safety in Numbers with Secure Allegation Escrows"

Aniket Kate, ... -- NDSS 2020

"HFL: Hybrid Fuzzing on the Linux Kernel"

Kyungtae Kim, ... -- NDSS 2020

"Locally Differentially Private Frequency Estimation with Consistency"

Tianhao Wang, Zitao Li, Ninghui Li, ... -- NDSS 2020

"UISCOPE: Accurate, Instrumentation-free, and Visible Attack Investigation for GUI Applications"

Xiangyu Zhang, ... -- NDSS 2020

"uRAI: Securing Embedded Systems with Return Address Integrity"

Naif Saleh Almakhdhub, Saurabh Bagchi, ... -- NDSS 2020

"PMP: Cost-effective Forced Execution with Probabilistic Memory Pre-planning"

Wei You, Zhuo Zhang, Yousra Aafer, Fei Peng, Yu Shi, Carson Harmon, Xiangyu Zhang, ... -- Oakland 2020

"RetroWrite: Statically Instrumenting COTS Binaries for Fuzzing and Sanitization"

Sushant Dinesh, Nathan Burow, Dongyan Xu, ... -- Oakland 2020

"SoK: Understanding the Prevailing Security Vulnerabilities in TrustZone-assisted TEE Systems"

Pedro Fonseca, ... -- Oakland 2020

"Towards Effective Differential Privacy Communication for Users' Data Sharing Decision and Comprehension"

Tianhao Wang, Ninghui Li, ... -- Oakland 2020

"Cyber-Physical Inconsistency Vulnerability Identification for Safety Checks in Robotic Vehicles"

Hongjun Choi, Sayali Kate, Xiangyu Zhang, Dongyan Xu, ... -- CCS 2020

"Verifiable Timed Signatures Made Practical"

Adithya Bhat, Aniket Kate, ... -- CCS 2020

"TRUSTORE: Side-Channel Resistant Storage for SGX using Intel Hybrid CPU-FPGA"

Adil Ahmad, ... -- CCS 2020

"Logging to the Danger Zone: Race Condition Attacks and Defenses on System Audit Frameworks"

Dave Jing Tian, ... -- CCS 2020

"Composite Backdoor Attack for Deep Neural Network by Mixing Existing Benign Features"

Yingqi Liu, Xiangyu Zhang, ... -- CCS 2020

"BlackMirror: Preventing Wallhacks in 3D Online FPS Games"

Adil Ahmad, ... -- CCS 2020

"BigMAC: Fine-Grained Policy Analysis of Android Firmware"

Dave Jing Tian, ... -- Usenix 2020

"Achieving Keyless CDNs with Conclaves"

Christina Garman, ... -- Usenix 2020

"From Control Model to Program: Investigating Robotic Aerial Vehicle Accidents with MAYDAY"

Taegyu Kim, Altay Ozen, Fan Fei, Zhan Tu, Xiangyu Zhang, Xinyan Deng, Dave Jing Tian, Dongyan Xu, ... -- Usenix 2020

"HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation"

Saurabh Bagchi, ... -- Usenix 2020

"USBFuzz: A Framework for Fuzzing USB Drivers by Device Emulation"

Hui Peng, ... -- Usenix 2020

"Deceptive Deletions for Protecting Withdrawn Posts on Social Media Platforms"

S Chandra Mouli, Bruno Ribeiro, Aniket Kate, ... -- NDSS 2021

"Evading Voltage-Based Intrusion Detection on Automotive CAN"

Rohit Bhatia, Khaled Serag, Z. Berkay Celik, Dongyan Xu, ... -- NDSS 2021

"ALchemist: Fusing Application and Audit Logs for Precise Attack Provenance without Instrumentation"

Le Yu, Zhuo Zhang, Guanhong Tao, Xiangyu Zhang, and Dongyan Xu, ... -- NDSS 2021

"CHANCEL: Efficient Multi-client Isolation Under Adversarial Programs"

Adil Ahmad, Pedro Fonseca, ... -- NDSS 2021

"NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces"

Yapeng Ye, Zhuo Zhang, Fei Wang, Xiangyu Zhang, Dongyan Xu, ... -- NDSS 2021

"On the Insecurity of SMS One-Time Password Messages against Local Attackers in Modern Mobile Devices"

Zeyu Lei, Yuhong Nan, Antonio Bianchi, ... -- NDSS 2021

"PGFUZZ: Policy-Guided Fuzzing for Robotic Vehicles"

Hyungsub Kim, Muslum Ozgur Ozmen, Antonio Bianchi, Z. Berkay Celik, Dongyan Xu, ... -- NDSS 2021

"ARBITRAR : User-Guided API Misuse Detection"

Aravind Machiry, ... -- Oakland 2021

"DIANE: Identifying Fuzzing Triggers in Apps to Generate Under-constrained Inputs for IoT Devices"

Antonio Bianchi, ... -- Oakland 2021

"High-Assurance Cryptography in the Spectre Era"

Swarn Priya, ... -- Oakland 2021

"High-Frequency Trading on Decentralized On-Chain Exchanges"

Duc V Le, ... -- Oakland 2021

"OSPREY: Recovery of Variable and Data Structure via Probabilistic Analysis for Stripped Binary"

Zhuo Zhang, Yapeng Ye, Guanhong Tao, Wen-chuan Lee, Xiangyu Zhang, ... -- Oakland 2021

"STOCHFUZZ: Sound and Cost-effective Fuzzing of Stripped Binaries by Incremental and Stochastic Rewriting"

Zhuo Zhang, Guanhong Tao, Xuwei Liu, Xiangyu Zhang, ... -- Oakland 2021

"Using Selective Memoization to Defeat Regular Expression Denial of Service (ReDoS)"

James Davis, ... -- Oakland 2021

"RandPiper -- Reconfiguration-Friendly Random Beacons with Quadratic Communication"

Adithya Bhat, Zhongtang Luo, Aniket Kate, ... -- CCS 2021

"Continuous Release of Data Streams under both Centralized and Local Differential Privacy"

Tianhao Wang, Ninghui Li, ... -- CCS 2021

"When Machine Unlearning Jeopardizes Privacy"

Tianhao Wang, ... -- CCS 2021

"Can We Use Arbitrary Objects to Attack LiDAR Perception in Autonomous Driving?"

Lu Su, ... -- CCS 2021

"DroneKey: A Drone-Aided Group-Key Generation Scheme for Large-Scale IoT Networks"

Tao Li, ... -- CCS 2021

"OpenSquare: Decentralized Repeated Modular Squaring Service"

Adithya Bhat, Tiantian Gong, Aniket Kate, ... -- CCS 2021

"Noncompliance as Deviant Behavior: An Automated Black-box Noncompliance Checker for 4G LTE Cellular Devices"

Imtiaz Karim, Elisa Bertino, ... -- CCS 2021

"PASAN: Detecting Peripheral Access Concurrency Bugs within Bare-Metal Embedded Applications"

Taegyu Kim, Jizhou Chen, Kyungtae Kim, Dongyan Xu, Dave (Jing) Tian, ... -- Usenix 2021

"M2MON: Building an MMIO-based Security Reference Monitor for Unmanned Vehicles"

Arslan Khan, Hyungsub Kim, Dongyan Xu, Antonio Bianchi, Dave (Jing) Tian, ... -- Usenix 2021

"LIGHTBLUE: Automatic Profile-Aware Debloating of Bluetooth Stacks"

Jianliang Wu, Ruoyu Wu, Dongyan Xu, Dave (Jing) Tian, Antonio Bianchi, ... -- Usenix 2021

"PrivSyn: Differentially Private Data Synthesis"

Tianhao Wang, Ninghui Li, Jean Honorio, ... -- Usenix 2021

"SHARD: Fine-Grained Kernel Specialization with Context-Aware Hardening"

Muhammad Abubakar, Adil Ahmad, Pedro Fonseca, Dongyan Xu, ... -- Usenix 2021

"PolyScope: Multi-Policy Access Control Analysis to Compute Authorized Attack Operations in Android Systems"

Ninghui Li, ... -- Usenix 2021

"Android SmartTVs Vulnerability Discovery via Log-Guided Fuzzing"

Yi Sun, Yu Shi, Xiangyu Zhang, ... -- Usenix 2021

"ATLAS: A Sequence-based Learning Approach for Attack Investigation"

Abdulellah Alsaheel, Yuhong Nan, Le Yu, Gregory Walkup, Z. Berkay Celik, Xiangyu Zhang, Dongyan Xu, ... -- Usenix 2021

"Blitz: Secure Multi-Hop Payments Without Two-Phase Commits"

Aniket Kate, ... -- Usenix 2021

"Understanding Malicious Cross-library Data Harvesting on Android"

Yuhong Nan, ... -- Usenix 2021

"Exposing New Vulnerabilities of Error Handling Mechanism in CAN"

Khaled Serag, Rohit Bhatia, Z. Berkay Celik, Dongyan Xu, ... -- Usenix 2021

"Preventing Kernel Hacks with HAKCs"

Derrick McKee, ... -- NDSS 2022

"RVPLAYER: Robotic Vehicle Forensics by Replay with What-if Reasoning"

Hongjun Choi, Zhiyuan Cheng, Xiangyu Zhang, ... -- NDSS 2022

"hbACSS: How to Robustly Share Many Secrets"

Aniket Kate, ... -- NDSS 2022

"MIRROR: Model Inversion for Deep LearningNetwork with High Fidelity"

Shengwei An, Guanhong Tao, Qiuling Xu, Yingqi Liu, Guangyu Shen, Xiangyu Zhang, ... -- NDSS 2022

"Automated Attack Synthesis by Extracting Finite State Machines from Protocol Specification Documents"

Maria Pacheco Gonzales, Dan Goldwasser, ... -- Oakland 2022

"Formal Model-Driven Discovery of Bluetooth Protocol Design Vulnerabilities"

Jianliang Wu, Ruoyu Wu, Dongyan Xu, Dave Tian, Antonio Bianchi, ... -- Oakland 2022

"FuzzUSB: Hybrid Stateful Fuzzing of USB Gadget Stacks"

Kyungtae Kim, Taegyu Kim, Ertza Warraich, Antonio Bianchi, Dave Tian, ... -- Oakland 2022

"Goshawk: Hunting Memory Corruptions via Structure-Aware and Object-Centric Memory Operation Synopsis"

Elisa Bertino, ... -- Oakland 2022

"HardLog: Practical Tamper-Proof System Auditing Using a Novel Audit Device"

Adil Ahmad, ... -- Oakland 2022

"Model Orthogonalization: Class Distance Hardening in Neural Networks for Better Security"

Guanhong Tao, Yingqi Liu, Guangyu Shen, Qiuling Xu, Shengwei An, Zhuo Zhang, Xiangyu Zhang, ... -- Oakland 2022

"PGPATCH: Policy-Guided Logic Bug Patching for Robotic Vehicles"

Hyungsub Kim, Muslum Ozgur Ozmen, Z. Berkay Celik, Antonio Bianchi, Dongyan Xu, ... -- Oakland 2022

"PICCOLO: Exposing Complex Backdoors in NLP Transformer Models"

Yingqi Liu, Guangyu Shen, Guanhong Tao, Shengwei An, Xiangyu Zhang, ... -- Oakland 2022

"TASHAROK: Using Mechanism Design for Enhancing Security Resource Allocation in Interdependent Systems"

Mustafa Abdallah, Timothy Cason, Shreyas Sundaram, Saurabh Bagchi, ... -- Oakland 2022

"C2C: Fine-grained Configuration-driven System Call Filtering"

Tapti Palit, ... -- CCS 2022

"Discovering IoT Physical Channel Vulnerabilities"

Muslum Ozgur Ozmen, Z. Berkay Celik, Xiangyu Zhang, ... -- CCS 2022

"Leakage Inversion: Towards Quantifying Privacy in Searchable Encryption"

Alexandros Psomas, ... -- CCS 2022

"Physical Hijacking Attacks against Object Trackers"

Raymond Muller, Z. Berkay Celik, ... -- CCS 2022

"Poirot: Probabilistically Recommending Protections for the Android Framework"

Zhuo Zhang, ... -- CCS 2022

"Sigstore: Software Signing for Everybody"

Santiago Torres-Arias, ... -- CCS 2022

"ProFactory: Improving IoT Security via Formalized Protocol Customization"

Fei Wang, Jianliang Wu, Yuhong Nan, Xiangyu Zhang, Dongyan Xu, ... -- Usenix 2022

"Empirical Understanding of Deletion Privacy: Experiences, Expectations, and Measures"

Mohsen Minaei, Aniket Kate, ... -- Usenix 2022

"Behind the Tube: Exploitative Monetization of Content on YouTube"

Arjun Arunasalam, Muslum Ozgur Ozmen, Z. Berkay Celik, ... -- Usenix 2022

"SARA: Secure Android Remote Authorization"

Abdullah Imran, Habiba Farrukh, Muhammad Ibrahim, Z. Berkay Celik, Antonio Bianchi, ... -- Usenix 2022

"Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification Models"

Ninghui Li, Elisa Bertino, ... -- Usenix 2022

"Characterizing the Security of Github CI Workflows"

Siddharth Muralee, Aravind Machiry, ... -- Usenix 2022

"DnD: A Cross-Architecture Deep Neural Network Decompiler"

Ruoyu Wu, Dave (Jing) Tian, Antonio Bianchi, Dongyan Xu, ... -- Usenix 2022