Stanford University

General Info

Rank: #10 Worldwide
#8 in US
Papers: 147
Number of Researchers: 153
APA
(average papers per authors):
1.0
Country: USA

Activity Map

Contributors

  • Dan Boneh (54 papers)
  • John C. Mitchell (21 papers)
  • Elie Bursztein (8 papers)
  • Tal Garfinkel (7 papers)
  • Dawson Engler (7 papers)
  • Riad S. Wahby (7 papers)
  • Florian Tramer (6 papers)
  • Fraser Brown (5 papers)
  • David Mazieres (5 papers)
  • Zakir Durumeric (5 papers)
  • Nagendra Modadugu (4 papers)
  • Hovav Shacham (4 papers)
  • Eu-Jin Goh (4 papers)
  • Mendel Rosenblum (4 papers)
  • Monica S. Lam (4 papers)
  • Ben Pfaff (4 papers)
  • Arvind Narayanan (4 papers)
  • Joseph Bonneau (4 papers)
  • Adam Barth (4 papers)
  • Collin Jackson (4 papers)
  • Jason Bau (3 papers)
  • Giancarlo Pellegrino (3 papers)
  • Ninghui Li (3 papers)
  • Valeria Nikolaenko (3 papers)
  • Andrea Bittau (3 papers)
  • Henry Corrigan-Gibbs (3 papers)
  • Benedikt Bunz (3 papers)
  • Saba Eskandarian (3 papers)
  • David Tse (3 papers)
  • Alex Ozdemir (3 papers)
  • Hector Garcia-Molina (3 papers)
  • Hristo Bojinov (3 papers)
  • Philippe Golle (2 papers)
  • Changhua He (2 papers)
  • Mike Hamburg (2 papers)
  • David J. Wu (2 papers)
  • Anupam Datta (2 papers)
  • Junfeng Yang (2 papers)
  • Cristian Cadar (2 papers)
  • Alex Aiken (2 papers)
  • Ankur Taly (2 papers)
  • Celine Fabry (2 papers)
  • Hristo Spassimirov Paskov (2 papers)
  • Ali Jose Mashtizadeh (2 papers)
  • Ertem Nusret Tas (2 papers)
  • Neil Daswani (2 papers)
  • Yichen Xie (2 papers)
  • Aaron Schulman (2 papers)
  • Kevin Lewi (2 papers)
  • Dmitry Kogan (2 papers)
  • Benton Case (2 papers)
  • Jim Chow (2 papers)
  • Michael Dalton (2 papers)
  • Christos Kozyrakis (2 papers)
  • Yan Michalevsky (2 papers)
  • Vitaly Shmatikov (1 papers)
  • Neil Chou (1 papers)
  • Robert Ledesma (1 papers)
  • Yuka Teraguchi (1 papers)
  • Jiwon Seo (1 papers)
  • Narendran Thiagarajan (1 papers)
  • Mugdha Lakhani (1 papers)
  • Joe Zimmerman (1 papers)
  • Jeremy Planul (1 papers)
  • Osbert Bastani (1 papers)
  • Parimarjan Negi (1 papers)
  • Prafull Sharma (1 papers)
  • Vivek sanjay Jain (1 papers)
  • Bahman Bahmani (1 papers)
  • Qixiang Sun (1 papers)
  • Ken Ashcraft (1 papers)
  • David Lie (1 papers)
  • Mark Horowitz (1 papers)
  • Can Sar (1 papers)
  • Paul Twohey (1 papers)
  • Suhabe Bugrara (1 papers)
  • Divij Gupta (1 papers)
  • Steven Bethard (1 papers)
  • Dan Jurafsky (1 papers)
  • Jocelyn Lagarenne (1 papers)
  • Jonathan R. Mayer (1 papers)
  • Adam Belay (1 papers)
  • Jonathan Cogan (1 papers)
  • Sawyer Birnbaum (1 papers)
  • Peh Chang Wei Brandon (1 papers)
  • Dillon Franke (1 papers)
  • Forest Fraser (1 papers)
  • Gaspar Garcia (1 papers)
  • Eric Gong (1 papers)
  • Hung T. Nguyen (1 papers)
  • Taresh K. Sethi (1 papers)
  • Vishal Subbiah (1 papers)
  • Emma Dauterman (1 papers)
  • Joachim Neu (1 papers)
  • Riad Wahby (1 papers)
  • Glenn Durfee (1 papers)
  • Beverly Yang (1 papers)
  • Ted Kremenek (1 papers)
  • Matthew Page (1 papers)
  • Mukund Sundararajan (1 papers)
  • Ante Derek (1 papers)
  • Brent Waters (1 papers)
  • Emily Shen (1 papers)
  • Vijay Ganesh (1 papers)
  • Peter Pawlowski (1 papers)
  • David Dill (1 papers)
  • Craig Gentry (1 papers)
  • Andrew Bortz (1 papers)
  • Weidong Shao (1 papers)
  • Hart William Montgomery (1 papers)
  • Ananth Raghunathan (1 papers)
  • Matthieu Martin (1 papers)
  • Subodh Iyengar (1 papers)
  • Rishita Anubhai (1 papers)
  • Jeffrey Wang (1 papers)
  • Frank Wang (1 papers)
  • Wendy Mu (1 papers)
  • Edward Z. Yang (1 papers)
  • Ben A. Fisch (1 papers)
  • Nathan Manohar (1 papers)
  • Andres Noetzli (1 papers)
  • Gili Rusak (1 papers)
  • Alan Flores-Lopez (1 papers)
  • Benjamin Fisch (1 papers)
  • Vivek Bagaria (1 papers)
  • Amir Dembo (1 papers)
  • Marco Patrignani (1 papers)
  • Charlotte Peale (1 papers)
  • Hamed Nemati (1 papers)
  • Chi Ming Wong (1 papers)
  • Petros Maniatis (1 papers)
  • Mary Baker (1 papers)
  • David Brumley (1 papers)
  • Kevin Christopher (1 papers)
  • Blake Ross (1 papers)
  • Nick Miyake (1 papers)
  • Benjamin Livshits (1 papers)
  • Martin Casado (1 papers)
  • Michael J. Freedman (1 papers)
  • Nick McKeown (1 papers)
  • Michael Martin (1 papers)
  • Hari Kannan (1 papers)
  • Andrew J. Blumberg (1 papers)
  • Gaurav Aggarwal (1 papers)
  • Michael Hamburg (1 papers)
  • Chinmay Soman (1 papers)
  • David Silver (1 papers)
  • Suman Jana (1 papers)
  • David A. Ramos (1 papers)
  • Lucjan Hanzlik (1 papers)
  • Kelly Shen (1 papers)
  • Matei Zaharia (1 papers)
  • Liz Izhikevich (1 papers)

Papers

"Analysis of a Fair Exchange Protocol"

Vitaly Shmatikov, John C. Mitchell, ... -- NDSS 2000

"Distribution Chain Security"

Glenn Durfee, ... -- CCS 2000

"Authenticating Streamed Data in the Presence of Random Packet Loss"

Philippe Golle, Nagendra Modadugu, ... -- NDSS 2001

"Distributed credential chain discovery in trust management: extended abstract"

Ninghui Li, John C. Mitchell, ... -- CCS 2001

"A Method for Fast Revocation of Public Key Certificates and Security Capabilities"

Dan Boneh, Chi Ming Wong, ... -- Usenix 2001

"Fast-Track Session Establishment for TLS"

Hovav Shacham, Dan Boneh, ... -- NDSS 2002

"Statistical Identification of Encrypted Web Browsing Traffic"

Qixiang Sun, ... -- Oakland 2002

"Design of a Role-based Trust-management Framework"

Ninghui Li, John C. Mitchell, ... -- Oakland 2002

"Using Programmer-Written Compiler Extensions to Catch Security Holes"

Ken Ashcraft, Dawson Engler, ... -- Oakland 2002

"Almost entirely correct mixing with applications to voting"

Dan Boneh, Philippe Golle, ... -- CCS 2002

"Query-flood DoS attacks in gnutella"

Neil Daswani, Hector Garcia-Molina, ... -- CCS 2002

"Secure History Preservation Through Timeline Entanglement"

Petros Maniatis, Mary Baker, ... -- Usenix 2002

"SiRiUS: Securing Remote Untrusted Storage"

Eu-Jin Goh, Hovav Shacham, Nagendra Modadugu, Dan Boneh, ... -- NDSS 2003

"Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools"

Tal Garfinkel, ... -- NDSS 2003

"A Virtual Machine Introspection Based Architecture for Intrusion Detection"

Tal Garfinkel, Mendel Rosenblum, ... -- NDSS 2003

"Beyond Proof-of-compliance: Safety and Availability Analysis in Trust Management"

Ninghui Li, John C. Mitchell, ... -- Oakland 2003

"Specifying and Verifying Hardware for Tamper-Resistant Software"

David Lie, John C. Mitchell, Mark Horowitz, ... -- Oakland 2003

"PPay: micropayments for peer-to-peer systems"

Beverly Yang, Hector Garcia-Molina, ... -- CCS 2003

"MECA: an extensible, expressive system and language for statically checking security properties"

Junfeng Yang, Ted Kremenek, Yichen Xie, Dawson Engler, ... -- CCS 2003

"Remote Timing Attacks Are Practical"

David Brumley, Dan Boneh, ... -- Usenix 2003

"Client-Side Defense Against Web-Based Identity Theft"

Neil Chou, Robert Ledesma, Yuka Teraguchi, John C. Mitchell, ... -- NDSS 2004

"A Practical Dynamic Buffer Overflow Detector"

Monica S. Lam, ... -- NDSS 2004

"Ostia: A Delegating Architecture for Secure System Call Interposition"

Tal Garfinkel, Ben Pfaff, Mendel Rosenblum, ... -- NDSS 2004

"The Design and Implementation of Datagram TLS"

Nagendra Modadugu, ... -- NDSS 2004

"Pong-Cache Poisoning in GUESS"

Neil Daswani, Hector Garcia-Molina, ... -- CCS 2004

"Group Signatures with Verifier-Local Revocation"

Dan Boneh, Hovav Shacham, ... -- CCS 2004

"On the Effectiveness of Address Space Randomization"

Hovav Shacham, Matthew Page, Ben Pfaff, Eu-Jin Goh, Nagendra Modadugu, Dan Boneh, ... -- CCS 2004

"Understanding Data Lifetime via Whole System Simulation"

Jim Chow, Ben Pfaff, Tal Garfinkel, Kevin Christopher, Mendel Rosenblum, ... -- Usenix 2004

"Security Analysis and Improvements for IEEE 802.11i"

Changhua He, John C. Mitchell, ... -- NDSS 2005

"A Modular Correctness Proof of IEEE 802.11i and TLS"

Changhua He, Mukund Sundararajan, Anupam Datta, Ante Derek, John C. Mitchell, ... -- CCS 2005

"Direct Chosen Ciphertext Security from Identity-Based Techniques"

Brent Waters, ... -- CCS 2005

"Stronger Password Authentication Using Browser Extensions"

Blake Ross, Collin Jackson, Nick Miyake, Dan Boneh, John C. Mitchell, ... -- Usenix 2005

"Finding Security Vulnerabilities in Java Applications with Static Analysis"

Benjamin Livshits, Monica S. Lam, ... -- Usenix 2005

"Shredding Your Garbage: Reducing Data Lifetime Through Secure Deallocation"

Jim Chow, Ben Pfaff, Tal Garfinkel, Mendel Rosenblum, ... -- Usenix 2005

"Privacy and Contextual Integrity: Framework and Applications"

Adam Barth, Anupam Datta, John C. Mitchell, ... -- Oakland 2006

"Automatically Generating Malicious Disks using Symbolic Execution"

Junfeng Yang, Can Sar, Paul Twohey, Cristian Cadar, Dawson Engler, ... -- Oakland 2006

"A Fully Collusion Resistant Broadcast, Trace, and Revoke System"

Dan Boneh, ... -- CCS 2006

"Secure Function Evaluation with Ordered Binary Decision Diagrams"

Eu-Jin Goh, Dan Boneh, ... -- CCS 2006

"Forward Secure Signatures with Untrusted Update"

Emily Shen, ... -- CCS 2006

"EXE: A System for Automatically Generating Inputs of Death Using Symbolic Execution"

Cristian Cadar, Vijay Ganesh, Peter Pawlowski, David Dill, Dawson Engler, ... -- CCS 2006

"SANE: A Protection Architecture for Enterprise Networks"

Martin Casado, Tal Garfinkel, Michael J. Freedman, Dan Boneh, Nick McKeown, ... -- Usenix 2006

"Static Detection of Security Vulnerabilities in Scripting Languages"

Yichen Xie, Alex Aiken, ... -- Usenix 2006

"Cryptographic Methods for Storing Ballots on a Voting Machine"

Dan Boneh, ... -- NDSS 2007

"Ordered Multisignatures and Identity-Based Sequential Aggregate Signatures, with Applications to Secure Routing"

Craig Gentry, ... -- CCS 2007

"Covert Channels in Privacy-Preserving Identification Systems"

Dan Boneh, Eu-Jin Goh, ... -- CCS 2007

"Protecting Browsers from DNS Rebinding Attacks"

Collin Jackson, Adam Barth, Andrew Bortz, Weidong Shao, Dan Boneh, ... -- CCS 2007

"Verifying the Safety of User Pointer Dereferences"

Suhabe Bugrara, Alex Aiken, ... -- Oakland 2008

"Traitor Tracing with Constant Size Ciphertext"

Dan Boneh, ... -- CCS 2008

"Robust Defenses for Cross-Site Request Forgery"

Adam Barth, Collin Jackson, John C. Mitchell, ... -- CCS 2008

"Securing Frame Communication in Browsers"

John C. Mitchell, Collin Jackson, Adam Barth, ... -- Usenix 2008

"Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking"

Monica S. Lam, Michael Martin, ... -- Usenix 2008

"Real-World Buffer Overflow Protection for Userspace and Kernelspace"

Michael Dalton, Hari Kannan, Christos Kozyrakis, ... -- Usenix 2008

"XCS: cross channel scripting and its impact on web applications"

Hristo Bojinov, Elie Bursztein, Dan Boneh, ... -- CCS 2009

"Nemesis: Preventing Authentication and Access Control Vulnerabilities in Web Applications"

Michael Dalton, Christos Kozyrakis, ... -- Usenix 2009

"VPriv: Protecting Privacy in Location-Based Vehicular Services"

Andrew J. Blumberg, ... -- Usenix 2009

"Adnostic: Privacy Preserving Targeted Advertising"

Arvind Narayanan, Dan Boneh, ... -- NDSS 2010

"InvisiType: Object-Oriented Security Policies"

Jiwon Seo, Monica S. Lam, ... -- NDSS 2010

"A Security Evaluation of DNSSEC with NSEC3"

Jason Bau, John C. Mitchell, ... -- NDSS 2010

"Object Capabilities and Isolation of Untrusted Web Applications"

John C. Mitchell, Ankur Taly, ... -- Oakland 2010

"State of the Art: Automated Black-Box Web Application Vulnerability Testing"

Jason Bau, Elie Bursztein, Divij Gupta, John C. Mitchell, ... -- Oakland 2010

"How Good are Humans at Solving CAPTCHAs? A Large Scale Evaluation"

Elie Bursztein, Steven Bethard, John C. Mitchell, Dan Jurafsky, Celine Fabry, ... -- Oakland 2010

"Algebraic pseudorandom functions with improved efficiency from the augmented cascade"

Dan Boneh, Hart William Montgomery, Ananth Raghunathan, ... -- CCS 2010

"An Analysis of Private Browsing Modes in Modern Browsers"

Gaurav Aggarwal, Elie Bursztein, Dan Boneh, ... -- Usenix 2010

"The Case for Ubiquitous Transport-Level Encryption"

Andrea Bittau, Michael Hamburg, David Mazieres, Dan Boneh, ... -- Usenix 2010

"Location Privacy via Private Proximity Testing"

Arvind Narayanan, Narendran Thiagarajan, Mugdha Lakhani, Mike Hamburg, Dan Boneh, ... -- NDSS 2011

"The Failure of Noise-Based Non-Continuous Audio Captchas"

Elie Bursztein, Hristo Spassimirov Paskov, Celine Fabry, John C. Mitchell, ... -- Oakland 2011

"'You Might Also Like:' Privacy Risks of Collaborative Filtering"

Arvind Narayanan, ... -- Oakland 2011

"Automated Analysis of Security-Critical JavaScript APIs"

Ankur Taly, John C. Mitchell, ... -- Oakland 2011

"OpenConflict: Preventing Real Time Map Hacks in Online Games"

Elie Bursztein, Mike Hamburg, Jocelyn Lagarenne, Dan Boneh, ... -- Oakland 2011

"Text-based CAPTCHA Strengths and Weaknesses"

Elie Bursztein, Matthieu Martin, John C. Mitchell, ... -- CCS 2011

"App Isolation: Get the Security of Multiple Browsers with Just One"

Jason Bau, ... -- CCS 2011

"Toward Secure Embedded Web Interfaces"

Chinmay Soman, Hristo Bojinov, Elie Bursztein, ... -- Usenix 2011

"Persistent OSPF Attacks"

Dan Boneh, ... -- NDSS 2012

"The Case for Prefetching and Prevalidating TLS Server Certificates"

Dan Boneh, ... -- NDSS 2012

"On the Feasibility of Internet-Scale Author Identification"

Arvind Narayanan, Hristo Spassimirov Paskov, ... -- Oakland 2012

"[SoK] Third-Party Web Tracking Policy and Technology"

Jonathan R. Mayer, John C. Mitchell, ... -- Oakland 2012

"The Most Dangerous Code in the World: Validating SSL Certificates in Non-Browser Software"

Subodh Iyengar, Rishita Anubhai, Dan Boneh, ... -- CCS 2012

"StegoTorus: A Camouflage Proxy for the Tor Anonymity System"

Jeffrey Wang, Frank Wang, Dan Boneh, ... -- CCS 2012

"Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks"

Hristo Bojinov, Dan Boneh, ... -- Usenix 2012

"Privacy-Preserving Ridge Regression on Hundreds of Millions of Records"

Valeria Nikolaenko, Dan Boneh, ... -- Oakland 2013

"Ensuring High-Quality Randomness in Cryptographic Key Generation"

Henry Corrigan-Gibbs, Wendy Mu, Dan Boneh, ... -- CCS 2013

"mXSS Attacks: Attacking well-secured Web-Applications by using innerHTML Mutations"

Edward Z. Yang, ... -- CCS 2013

"Privacy-Preserving Matrix Factorization"

Valeria Nikolaenko, Dan Boneh, ... -- CCS 2013

"Hacking Blind"

Andrea Bittau, Adam Belay, Ali Jose Mashtizadeh, David Mazieres, Dan Boneh, ... -- Oakland 2014

"RevCast: Fast, Private Certificate Revocation over FM Radio"

Aaron Schulman, ... -- CCS 2014

"Password Managers: Risks, Pitfalls, and Improvements"

David Silver, Suman Jana, Dan Boneh, ... -- Usenix 2014

"GyroMic: Recognizing Speech from Gyroscope Signals"

Yan Michalevsky, Dan Boneh, ... -- Usenix 2014

"Riposte: An Anonymous Messaging System Handling Millions of Users"

Henry Corrigan-Gibbs, Dan Boneh, David Mazieres, ... -- Oakland 2015

"Provisions: Private proofs of solvency for Bitcoin exchanges"

Benedikt Bunz, Joseph Bonneau, Dan Boneh, ... -- CCS 2015

"CCFI: Cryptographically Enforced Control Flow Integrity"

Ali Jose Mashtizadeh, Andrea Bittau, Dan Boneh, David Mazieres, ... -- CCS 2015

"TRENCH: Deep Correctness Checking for Real Code"

David A. Ramos, Dawson Engler, ... -- Usenix 2015

"Bringing Deployable Key Transparency to End Users"

Joseph Bonneau, ... -- Usenix 2015

"PowerSpy: Location Tracking using Mobile Device Power Analysis"

Yan Michalevsky, Aaron Schulman, Dan Boneh, ... -- Usenix 2015

"Privacy-Preserving Shortest Path Computation"

David J. Wu, Joe Zimmerman, Jeremy Planul, John C. Mitchell, ... -- NDSS 2016

"Differentially Private Password Frequency Lists"

Joseph Bonneau, ... -- NDSS 2016

"Verifiable ASICs"

Riad S. Wahby, ... -- Oakland 2016

"5Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs"

Kevin Lewi, Dan Boneh, ... -- CCS 2016

"Order-Revealing Encryption: New Constructions, Applications, and Lower Bounds"

Kevin Lewi, David J. Wu, ... -- CCS 2016

"Frodo: Take off the ring! Practical, Quantum-Secure Key Exchange from LWE"

Valeria Nikolaenko, ... -- CCS 2016

"Defending against malicious peripherals with Cinch"

Riad S. Wahby, ... -- Usenix 2016

"Automated Synthesis of Semantic Malware Signatures using Maximum Satisfiability"

Osbert Bastani, ... -- NDSS 2017

"Finding and Preventing Bugs in JavaScript Bindings"

Fraser Brown, Riad S. Wahby, Dawson Engler, ... -- Oakland 2017

"Obstacles to the Adoption of Secure Communication Tools"

Joseph Bonneau, ... -- Oakland 2017

"Full accounting for verifiable outsourcing"

Riad S. Wahby, ... -- CCS 2017

"Iron: Functional Encryption using Intel SGX"

Ben A. Fisch, Dan Boneh, ... -- CCS 2017

"T/Key: Second-Factor Authentication From Secure Hash Chains"

Dan Boneh, Dmitry Kogan, Nathan Manohar, ... -- CCS 2017

"K-means++ vs. Behavioral Biometrics: One Loop to Rule Them All."

Parimarjan Negi, Prafull Sharma, Vivek sanjay Jain, Bahman Bahmani, ... -- NDSS 2018

"Bulletproofs: Short Proofs for Confidential Transactions and More"

Benedikt Bunz, Dan Boneh, ... -- Oakland 2018

"Doubly-efficient zkSNARKs without trusted setup"

Riad S. Wahby, ... -- Oakland 2018

"The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators"

Giancarlo Pellegrino, ... -- Oakland 2018

"Towards Verified, Constant-time Floating Point Operations"

Andres Noetzli, Fraser Brown, ... -- CCS 2018

"Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts"

Florian Tramer, ... -- Usenix 2018

"The Unexpected Danger of UX Features: A Case of Sensitive Data Leakage of Drivers in Ride-Hailing Services"

Giancarlo Pellegrino, ... -- NDSS 2019

"Fidelius: Protecting User Secrets from Compromised Browsers"

Saba Eskandarian, Jonathan Cogan, Sawyer Birnbaum, Peh Chang Wei Brandon, Dillon Franke, Forest Fraser, Gaspar Garcia, Eric Gong, Hung T. Nguyen, Taresh K. Sethi, Vishal Subbiah, Dan Boneh, ... -- Oakland 2019

"True2F: Backdoor-resistant authentication tokens"

Emma Dauterman, Henry Corrigan-Gibbs, David Mazieres, Dan Boneh, ... -- Oakland 2019

"AdVersarial: Perceptual Ad Blocking meets Adversarial Machine Learning"

Florian Tramer, Gili Rusak, Giancarlo Pellegrino, Dan Boneh, ... -- CCS 2019

"Let's Encrypt: An Automated Certificate Authority to Encrypt the Entire Web"

Benton Case, Zakir Durumeric, Alan Flores-Lopez, ... -- CCS 2019

"PIEs: Public Incompressible Encodings for Decentralized Storage"

Benjamin Fisch, ... -- CCS 2019

"Prism: Deconstructing the Blockchain to Approach Physical Limits"

Vivek Bagaria, David Tse, ... -- CCS 2019

"simTPM: User-centric TPM for Mobile Devices"

Lucjan Hanzlik, ... -- Usenix 2019

"All Things Considered: An Analysis of IoT Devices on Home Networks"

Kelly Shen, Benton Case, Zakir Durumeric, ... -- Usenix 2019

"Protecting accounts from credential stuffing with password breach alerting"

Dan Boneh, ... -- Usenix 2019

"FlyClient: Super-Light Clients for Cryptocurrencies"

Benedikt Bunz, ... -- Oakland 2020

"Everything is a Race and Nakamoto Always Wins"

Amir Dembo, Ertem Nusret Tas, David Tse, ... -- CCS 2020

"Sys: A Static/Symbolic Tool for Finding Good Bugs in Good (Browser) Code"

Fraser Brown, Dawson Engler, ... -- Usenix 2020

"Retrofitting Fine Grain Isolation in the Firefox Renderer"

Tal Garfinkel, ... -- Usenix 2020

"Scaling Verifiable Computation Using Efficient Set Accumulators"

Alex Ozdemir, Riad S. Wahby, Dan Boneh, ... -- Usenix 2020

"Remote Side-Channel Attacks on Anonymous Transactions"

Florian Tramer, Dan Boneh, ... -- Usenix 2020

"SquirRL: Automating Attack Analysis on Blockchain Incentive Mechanisms with Deep Reinforcement Learning"

Florian Tramer, ... -- NDSS 2021

"Доверя́й, но проверя́й: SFI safety for native-compiled Wasm"

Fraser Brown, ... -- NDSS 2021

"Compact Certificates of Collective Knowledge"

Riad S. Wahby, ... -- Oakland 2021

"Ebb-and-Flow Protocols: A Resolution of the Availability-Finality Dilemma"

Joachim Neu, Ertem Nusret Tas, David Tse, ... -- Oakland 2021

"Is Private Learning Possible with Instance Encoding?"

Florian Tramer, ... -- Oakland 2021

"Lightweight Techniques for Private Heavy Hitters"

Dan Boneh, ... -- Oakland 2021

"SoK: Hate, Harassment, and the Changing Landscape of Online Abuse"

Dan Boneh, Zakir Durumeric, ... -- Oakland 2021

"Exorcising Spectres with Secure Compilers"

Marco Patrignani, ... -- CCS 2021

"Secure Source-Tracking for Encrypted Messaging"

Charlotte Peale, Saba Eskandarian, Dan Boneh, ... -- CCS 2021

"Private Blocklist Lookups with Checklist"

Dmitry Kogan, ... -- Usenix 2021

"Express: Lowering the Cost of Metadata-hiding Communication with Cryptographic Privacy"

Saba Eskandarian, Matei Zaharia, Dan Boneh, ... -- Usenix 2021

"Extracting Training Data from Large Language Models"

Florian Tramer, ... -- Usenix 2021

"LZR: Identifying Unexpected Internet Services"

Liz Izhikevich, Zakir Durumeric, ... -- Usenix 2021

"What's in a Name? Exploring CA Certificate Control"

Zakir Durumeric, ... -- Usenix 2021

"Clarion: Anonymous Communication from Multiparty Shuffling Protocols"

Dan Boneh, ... -- NDSS 2022

"CirC: Compiler infrastructure for proof systems, software verification, and more"

Alex Ozdemir, Fraser Brown, Riad Wahby, Alex Ozdemir, ... -- Oakland 2022

"Microarchitectural Leakage Templates and Their Application to Cache-Based Side Channels"

Hamed Nemati, ... -- CCS 2022

"zkBridge: Trustless Cross-chain Bridges Made Practical"

Dan Boneh, ... -- CCS 2022

"Experimenting with Collaborative zk-SNARKs: Zero-Knowledge Proofs for Distributed Secrets"

Alex Ozdemir, Dan Boneh, ... -- Usenix 2022