Stony Brook University

General Info

Rank: #21 Worldwide
#17 in US
Papers: 101
Number of Researchers: 81
APA
(average papers per authors):
1.2
Country: USA

Activity Map

Contributors

  • Nick Nikiforakis (28 papers)
  • R. Sekar (16 papers)
  • Radu Sion (12 papers)
  • Michalis Polychronakis (12 papers)
  • Long Lu (6 papers)
  • Rob Johnson (5 papers)
  • Peter Williams (5 papers)
  • Oleksii Starov (5 papers)
  • Najmeh Miramirkhani (5 papers)
  • Brian Kondracki (5 papers)
  • Tzi-cker Chiueh (4 papers)
  • Rishab Nithyanand (4 papers)
  • Amir Rahmati (4 papers)
  • Babak Amin Azad (4 papers)
  • Sandeep Bhatkar (4 papers)
  • Xiang Cai (4 papers)
  • Phillipa Gill (3 papers)
  • Abbas Razaghpanah (3 papers)
  • Pierre Laperdrix (3 papers)
  • Anrin Chakraborti (3 papers)
  • Erez Zadok (3 papers)
  • Md Nahid Hossain (3 papers)
  • Seyedhamed Ghavamnia (3 papers)
  • Scott D. Stoller (3 papers)
  • Weiqing Sun (2 papers)
  • Zhenkai Liang (2 papers)
  • Meng Luo (2 papers)
  • Nima Honarmand (2 papers)
  • Timothy Barron (2 papers)
  • Donald E. Porter (2 papers)
  • Laszlo Szekeres (2 papers)
  • Dongli Zhang (2 papers)
  • Hyungjoon Koo (2 papers)
  • Yaohui Chen (2 papers)
  • Nguyen Phong Hoang (2 papers)
  • Tapti Palit (2 papers)
  • Dongyoon Lee (2 papers)
  • Johnny So (2 papers)
  • Daniel C. DuVarney (2 papers)
  • Junao Wang (2 papers)
  • Alexey Smirnov (1 papers)
  • V. N. Venkatakrishnan (1 papers)
  • Mugdha Bendre (1 papers)
  • D. Dhurjati (1 papers)
  • Abhishek Chaturvedi (1 papers)
  • Gaurav Poothia (1 papers)
  • Tejas Karandikar (1 papers)
  • Yuwei Gui (1 papers)
  • Bhushan Jain (1 papers)
  • Mirza Basim Baig (1 papers)
  • Sebassujeen Reymondjohnson (1 papers)
  • Zhichuang Sun (1 papers)
  • Rui Qiao (1 papers)
  • Mahathi Priya Appini (1 papers)
  • Sanaz Sheikhi (1 papers)
  • Shinyoung Cho (1 papers)
  • Jarin Firose Moon (1 papers)
  • Xigao Li (1 papers)
  • Michael Ferdman (1 papers)
  • A. Gupta (1 papers)
  • J. Frullo (1 papers)
  • T. Shanbhag (1 papers)
  • A. Tiwari (1 papers)
  • H. Yang (1 papers)
  • S. Zhou (1 papers)
  • C.R. Ramakrishnan (1 papers)
  • Xin Cheng Zhang (1 papers)
  • Brijesh Joshi (1 papers)
  • Sumeet Bajaj (1 papers)
  • Soroush Meghdadizanjani (1 papers)
  • Yevgeniy Miretskiy (1 papers)
  • Abhijith Das (1 papers)
  • Charles P. Wright (1 papers)
  • Wei Xu (1 papers)
  • Swaminathan Sundararaman (1 papers)
  • Gopalan Sivathanu (1 papers)
  • Mingwei Zhang (1 papers)
  • Darius Suciu (1 papers)
  • Shachee Mishra (1 papers)
  • Chen Chen (1 papers)
  • Pratik Vaishnavi (1 papers)

Papers

"User-Level Infrastructure for System Call Interposition: A Platform for Intrusion Detection and Confinement"

R. Sekar, ... -- NDSS 2000

"Data Mining Methods for Detection of New Malicious Executables"

Erez Zadok, ... -- Oakland 2001

"A Fast Automaton-Based Method for Detecting Anomalous Program Behaviors"

R. Sekar, Mugdha Bendre, D. Dhurjati, ... -- Oakland 2001

"Specification-based anomaly detection: a new approach for detecting network intrusions"

R. Sekar, A. Gupta, J. Frullo, T. Shanbhag, A. Tiwari, H. Yang, S. Zhou, ... -- CCS 2002

"Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits"

Sandeep Bhatkar, Daniel C. DuVarney, R. Sekar, ... -- Usenix 2003

"Avfs: An On-Access Anti-Virus File System"

Yevgeniy Miretskiy, Abhijith Das, Charles P. Wright, Erez Zadok, ... -- Usenix 2004

"DIRA: Automatic Detection, Identification and Repair of Control-Hijacking Attacks"

Alexey Smirnov, Tzi-cker Chiueh, ... -- NDSS 2005

"One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments"

Weiqing Sun, Zhenkai Liang, V. N. Venkatakrishnan, R. Sekar, ... -- NDSS 2005

"Fast and Automated Generation of Attack Signatures: A Basis for Building Self-Protecting Servers"

Zhenkai Liang, R. Sekar, ... -- CCS 2005

"Efficient Techniques for Comprehensive Protection from Memory Error Exploits"

Sandeep Bhatkar, R. Sekar, Daniel C. DuVarney, ... -- Usenix 2005

"Dataflow Anomaly Detection"

Sandeep Bhatkar, Abhishek Chaturvedi, R. Sekar, ... -- Oakland 2006

"Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks"

Wei Xu, Sandeep Bhatkar, R. Sekar, ... -- Usenix 2006

"On the Practicality of Private Information Retrieval"

Radu Sion, ... -- NDSS 2007

"RICH: Automatically Protecting Against Integer-Based Vulnerabilities"

Tzi-cker Chiueh, Rob Johnson, ... -- NDSS 2007

"Efficient Policy Analysis for Administrative Role Based Access"

Scott D. Stoller, C.R. Ramakrishnan, ... -- CCS 2007

"Usable PIR"

Peter Williams, Radu Sion, ... -- NDSS 2008

"Practical Proactive Integrity Preservation: A Basis for Malware Defense"

R. Sekar, Weiqing Sun, Gaurav Poothia, Tejas Karandikar, ... -- Oakland 2008

"Building Castles out of Mud: Practical Access Pattern Privacy and Correctness on Untrusted Storage"

Peter Williams, Radu Sion, ... -- CCS 2008

"Selective Versioning in a Secure Disk System"

Swaminathan Sundararaman, Gopalan Sivathanu, Erez Zadok, ... -- Usenix 2008

"An Efficient Black-box Technique for Defeating Web Application Attacks"

R. Sekar, ... -- NDSS 2009

"The Blind Stone Tablet: Outsourcing Durability to Untrusted Parties"

Peter Williams, Radu Sion, ... -- NDSS 2009

"Exploiting Unix File-System Races via Algorithmic Complexity Attacks"

Rob Johnson, Xiang Cai, Yuwei Gui, ... -- Oakland 2009

"Large-scale malware indexing using function-call graphs"

Tzi-cker Chiueh, ... -- CCS 2009

"Dispatcher: enabling active botnet infiltration using automatic protocol reverse-engineering"

Tzi-cker Chiueh, ... -- CCS 2009

"TxBox: Building Secure, Efficient Sandboxes with System Transactions"

Donald E. Porter, ... -- Oakland 2011

"Single Round Access Privacy on Outsourced Storage"

Peter Williams, Radu Sion, ... -- CCS 2012

"PrivateFS: A Parallel Oblivious File System"

Peter Williams, Radu Sion, ... -- CCS 2012

"Touching from a Distance: Website Fingerprinting Attacks and Defenses"

Xiang Cai, Xin Cheng Zhang, Brijesh Joshi, Rob Johnson, ... -- CCS 2012

"SoK: Eternal War in Memory"

Laszlo Szekeres, ... -- Oakland 2013

"Practical Control Flow Integrity & Randomization for Binary Executables"

Laszlo Szekeres, ... -- Oakland 2013

"HIFS: History Independence for File Systems"

Sumeet Bajaj, Radu Sion, ... -- CCS 2013

"Control Flow Integrity for COTS Binaries"

Mingwei Zhang, R. Sekar, ... -- Usenix 2013

"From Zygote to Morula: Fortifying Weakened ASLR on Android"

Long Lu, ... -- Oakland 2014

"SoK: Introspections on Trust and the Semantic Gap"

Bhushan Jain, Mirza Basim Baig, Dongli Zhang, Donald E. Porter, Radu Sion, ... -- Oakland 2014

"Clubbing Seals: Exploring the Ecosystem of Third-party Security Seals"

Nick Nikiforakis, ... -- CCS 2014

"A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses"

Xiang Cai, Rishab Nithyanand, Rob Johnson, ... -- CCS 2014

"Targeted Threat Index: Characterizing and Quantifying Politically-Motivated Targeted Malware"

Phillipa Gill, ... -- Usenix 2014

"Effective Attacks and Provable Defenses for Website Fingerprinting"

Xiang Cai, Rishab Nithyanand, Rob Johnson, ... -- Usenix 2014

"Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting"

Long Lu, ... -- NDSS 2015

"Parking Sensors: Analyzing and Detecting Parked Domains"

Nick Nikiforakis, ... -- NDSS 2015

"Preventing Use-after-free with Dangling Pointers Nullification"

Long Lu, ... -- NDSS 2015

"Seven Months' Worth of Mistakes: A Longitudinal Study of Typosquatting Abuse"

Nick Nikiforakis, ... -- NDSS 2015

"Drops for Stuff: An Analysis of Reshipping Mule Scams"

Nick Nikiforakis, ... -- CCS 2015

"The Clock is Still Ticking: Timing Attacks in the Modern Web"

Nick Nikiforakis, ... -- CCS 2015

"Maneuvering Around Clouds: Bypassing Cloud-based Security Providers"

Nick Nikiforakis, ... -- CCS 2015

"WebCapsule: Towards a Lightweight Forensic Engine for Web Browsers"

Long Lu, ... -- CCS 2015

"It's Free for a Reason: Exploring the Ecosystem of Free Live Streaming Services"

Nick Nikiforakis, ... -- NDSS 2016

"Measuring and Mitigating AS-level Adversaries Against Tor"

Rishab Nithyanand, Oleksii Starov, Phillipa Gill, ... -- NDSS 2016

"Return to the Zombie Gadgets: Undermining Destructive Code Reads via Code Inference Attacks"

Hyungjoon Koo, Michalis Polychronakis, ... -- Oakland 2016

"Shreds: Fine-grained Execution Units with Private Memory"

Yaohui Chen, Sebassujeen Reymondjohnson, Zhichuang Sun, Long Lu, ... -- Oakland 2016

"Dial One for Scam: A Large-Scale Analysis of Technical Support Scams"

Najmeh Miramirkhani, Oleksii Starov, Nick Nikiforakis, ... -- NDSS 2017

"Norax: Enabling Execute-Only Memory for COTS Binaries on AArch64"

Yaohui Chen, Dongli Zhang, Rui Qiao, Long Lu, ... -- Oakland 2017

"Spotless Sandboxes: Evading Malware Analysis Systems using Wear-and-Tear Artifacts"

Najmeh Miramirkhani, Mahathi Priya Appini, Nick Nikiforakis, Michalis Polychronakis, ... -- Oakland 2017

"XHOUND: Quantifying the Fingerprintability of Browser Extensions"

Oleksii Starov, Nick Nikiforakis, ... -- Oakland 2017

"Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse"

Najmeh Miramirkhani, Nick Nikiforakis, ... -- CCS 2017

"Hindsight: Understanding the Evolution of UI Vulnerabilities in Mobile Browsers"

Meng Luo, Oleksii Starov, Nima Honarmand, Nick Nikiforakis, ... -- CCS 2017

"The Wolf of Name Street: Hijacking Domains Through Their Nameservers"

Timothy Barron, Nick Nikiforakis, ... -- CCS 2017

"Characterizing the Nature and Dynamics of Tor Exit Blocking"

Rishab Nithyanand, ... -- Usenix 2017

"SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data"

Md Nahid Hossain, Junao Wang, R. Sekar, Scott D. Stoller, ... -- Usenix 2017

"Decentralized Action Integrity for Trigger-Action IoT Platforms."

Amir Rahmati, ... -- NDSS 2018

"A Large-scale Analysis of Content Modification by Open HTTP Proxies."

Michalis Polychronakis, ... -- NDSS 2018

"Apps, Trackers, Privacy, and Regulators: A Global Study of the Mobile Tracking Ecosystem."

Abbas Razaghpanah, ... -- NDSS 2018

"Compiler-assisted Code Randomization"

Hyungjoon Koo, Michalis Polychronakis, ... -- Oakland 2018

"Fp-Scanner: The Privacy Implications of Browser Fingerprint Inconsistencies"

Pierre Laperdrix, ... -- Usenix 2018

"ATtention Spanned: Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem"

Amir Rahmati, ... -- Usenix 2018

"Dependence-Preserving Data Compaction for Scalable Forensic Analysis"

Md Nahid Hossain, Junao Wang, R. Sekar, Scott D. Stoller, ... -- Usenix 2018

"Master of Web Puppets: Abusing Web Browsers for Persistent and Stealthy Computation"

Michalis Polychronakis, ... -- NDSS 2019

"Time Does Not Heal All Wounds: A Longitudinal Analysis of Security-Mechanism Support in Mobile Browsers"

Meng Luo, Pierre Laperdrix, Nima Honarmand, Nick Nikiforakis, ... -- NDSS 2019

"rORAM: Efficient Range ORAM with O(log2 N) Locality"

Anrin Chakraborti, Radu Sion, ... -- NDSS 2019

"ConcurORAM: High-Throughput Stateless Parallel Multi-Client ORAM"

Anrin Chakraborti, Radu Sion, ... -- NDSS 2019

"HOLMES: Real-time APT Detection through Correlation of Suspicious Information Flows"

R. Sekar, ... -- Oakland 2019

"SoK: The Challenges, Pitfalls, and Perils of Using Hardware Performance Counters for Security"

Michalis Polychronakis, ... -- Oakland 2019

"PeX: A Permission Check Analysis Framework for Linux Kernel"

Dongyoon Lee, ... -- Usenix 2019

"Everyone is Different: Client-side Diversification for Defending Against Extension Fingerprinting"

Oleksii Starov, Nick Nikiforakis, ... -- Usenix 2019

"Less is More: Quantifying the Security Benefits of Debloating Web Applications"

Babak Amin Azad, Pierre Laperdrix, Nick Nikiforakis, ... -- Usenix 2019

"Complex Security Policy? A Longitudinal Analysis of Deployed Content Security Policies"

Timothy Barron, Nick Nikiforakis, ... -- NDSS 2020

"An Analysis of Pre-installed Android Software"

Abbas Razaghpanah, ... -- Oakland 2020

"Combating Dependence Explosion in Forensic Analysis Using Alternative Tag Propagation Semantics"

Md Nahid Hossain, Sanaz Sheikhi, R. Sekar, ... -- Oakland 2020

"ICLab: A Global, Longitudinal Internet Censorship Measurement Platform"

Shinyoung Cho, Nguyen Phong Hoang, Abbas Razaghpanah, Phillipa Gill, ... -- Oakland 2020

"Meddling Middlemen: Empirical Analysis of the Risks of Data-Saving Mobile Browsers"

Brian Kondracki, Nick Nikiforakis, ... -- Oakland 2020

"xMP: Selective Memory Protection for Kernel and User Space"

Seyedhamed Ghavamnia, Michalis Polychronakis, ... -- Oakland 2020

"You’ve Changed: Detecting Malicious Browser Extensions through their Update Deltas"

Nick Nikiforakis, ... -- CCS 2020

"Horizontal Privilege Escalation in Trusted Applications"

Darius Suciu, Radu Sion, ... -- Usenix 2020

"Temporal System Call Specialization for Attack Surface Reduction"

Seyedhamed Ghavamnia, Tapti Palit, Shachee Mishra, Michalis Polychronakis, ... -- Usenix 2020

"To Err.Is Human: Characterizing the Threat of Unintended URLs in Social Media"

Brian Kondracki, Nick Nikiforakis, ... -- NDSS 2021

"Understanding the Growth and Security Considerations of ECS"

Michalis Polychronakis, ... -- NDSS 2021

"DynPTA: Combining Static and Dynamic Analysis for Practical Selective Data Protection"

Tapti Palit, Jarin Firose Moon, Michalis Polychronakis, ... -- Oakland 2021

"Good Bot, Bad Bot: Characterizing Automated Browsing Activity"

Xigao Li, Babak Amin Azad, Amir Rahmati, Nick Nikiforakis, ... -- Oakland 2021

"Using Selective Memoization to Defeat Regular Expression Denial of Service (ReDoS)"

Dongyoon Lee, ... -- Oakland 2021

"Catching Transparent Phish: Analyzing and Detecting MITM Phishing Toolkits"

Brian Kondracki, Babak Amin Azad, Nick Nikiforakis, ... -- CCS 2021

"PEARL: Plausibly Deniable Flash Translation Layer using WOM coding"

Chen Chen, Anrin Chakraborti, Radu Sion, ... -- Usenix 2021

"Fingerprinting in Style: Detecting Browser Extensions via Injected Style Sheets"

Nick Nikiforakis, ... -- Usenix 2021

"How Great is the Great Firewall? Measuring China's DNS Censorship"

Nguyen Phong Hoang, Michalis Polychronakis, ... -- Usenix 2021

"The Droid is in the Details: Environment-aware Evasion of Android Sandboxes"

Brian Kondracki, Babak Amin Azad, Najmeh Miramirkhani, Nick Nikiforakis, ... -- NDSS 2022

"Domains Do Change Their Spots: Quantifying Potential Abuse of Residual Trust"

Johnny So, Najmeh Miramirkhani, Michael Ferdman, Nick Nikiforakis, ... -- Oakland 2022

"C2C: Fine-grained Configuration-driven System Call Filtering"

Seyedhamed Ghavamnia, Michalis Polychronakis, ... -- CCS 2022

"Escaping the Confines of Time: Continuous Browser Extension Fingerprinting Through Ephemeral Modifications"

Nick Nikiforakis, ... -- CCS 2022

"HyperDbg: Reinventing Hardware-Assisted Debugging"

Soroush Meghdadizanjani, ... -- CCS 2022

"The Dangers of Human Touch: Fingerprinting Browser Extensions through User Actions"

Nick Nikiforakis, ... -- Usenix 2022

"Transferring Adversarial Robustness Through Robust Representation Matching"

Pratik Vaishnavi, Amir Rahmati, ... -- Usenix 2022

"Uninvited Guests: Analyzing the Identity and Behavior of Certificate Transparency Bots"

Brian Kondracki, Johnny So, Nick Nikiforakis, ... -- Usenix 2022