University of California, San Diego

General Info

Rank: #14 Worldwide
#11 in US
Papers: 136
Number of Researchers: 143
APA
(average papers per authors):
1.0
Country: USA

Activity Map

Contributors

  • Stefan Savage (35 papers)
  • Kirill Levchenko (19 papers)
  • Geoffrey M. Voelker (18 papers)
  • Hovav Shacham (18 papers)
  • Mihir Bellare (14 papers)
  • Deian Stefan (10 papers)
  • Sorin Lerner (8 papers)
  • Tadayoshi Kohno (7 papers)
  • Alex C. Snoeren (7 papers)
  • Farinaz Koushanfar (6 papers)
  • Damon McCoy (6 papers)
  • Ranjit Jhala (6 papers)
  • Nadia Heninger (6 papers)
  • Chris Kanich (5 papers)
  • David Kohlbrenner (5 papers)
  • Craig Disselkoen (5 papers)
  • Andreas Pitsillidis (4 papers)
  • Shravan Narayan (4 papers)
  • Stephen Checkoway (4 papers)
  • Keaton Mowery (4 papers)
  • Kamalika Chaudhuri (4 papers)
  • Thomas Ristenpart (3 papers)
  • David Y. Wang (3 papers)
  • Dongseok Jang (3 papers)
  • Sarah Meiklejohn (3 papers)
  • Wilson Lian (3 papers)
  • Rami Gokhan Kc (3 papers)
  • Evan Johnson (3 papers)
  • Neha Chachra (3 papers)
  • Sriram Keelveedhi (3 papers)
  • Brown Farinholt (3 papers)
  • Sean Kross (3 papers)
  • Sunjay Cauligi (3 papers)
  • Jacob Imola (3 papers)
  • Dean Tullsen (3 papers)
  • Vacha Dave (2 papers)
  • Sara Miner (2 papers)
  • KC Claffy (2 papers)
  • Brian Kantor (2 papers)
  • Danny Anderson (2 papers)
  • Brandon Enright (2 papers)
  • Tristan Halvorson (2 papers)
  • Marc Andrysco (2 papers)
  • Vector Guo Li (2 papers)
  • Nishant Bhaskar (2 papers)
  • Aaron Schulman (2 papers)
  • Daniel Moghimi (2 papers)
  • Joseph Jaeger (2 papers)
  • Eric Rescorla (2 papers)
  • M. Sadegh Riazi (2 papers)
  • Chengcheng Xiang (2 papers)
  • Yudong Wu (2 papers)
  • Bingyu Shen (2 papers)
  • Mingyao Shen (2 papers)
  • Yuanyuan Zhou (2 papers)
  • Mohammad Samragh (2 papers)
  • Marti Motoyama (2 papers)
  • Grant Ho (2 papers)
  • Scott Yilek (1 papers)
  • Qing Zhang (1 papers)
  • Danny Yuxing Huang (1 papers)
  • Dimitar Bounov (1 papers)
  • David Thien (1 papers)
  • Yousef Alhessi (1 papers)
  • Andre Broido (1 papers)
  • He Liu (1 papers)
  • Michael Wei (1 papers)
  • Steven Swanson (1 papers)
  • Guo Li (1 papers)
  • Haikuo Yin (1 papers)
  • Igors Stepanovs (1 papers)
  • Daniele Micciancio (1 papers)
  • Hadi Givehchian (1 papers)
  • Eliana Rodriguez Herrera (1 papers)
  • Hector Lopez Soto (1 papers)
  • Christian Dameff (1 papers)
  • Dinesh Bharadia (1 papers)
  • Ramamohan Paturi (1 papers)
  • George Varghese (1 papers)
  • Ryan Braud (1 papers)
  • Erik Buchanan (1 papers)
  • Ryan Roemer (1 papers)
  • Benjamin Laxton (1 papers)
  • Kai Wang (1 papers)
  • Viet Tung Hoang (1 papers)
  • Devin Lundberg (1 papers)
  • Edward Sullivan (1 papers)
  • Ryan Mast (1 papers)
  • Ian Foster (1 papers)
  • Jon Larson (1 papers)
  • Max Masich (1 papers)
  • Daniel Kane (1 papers)
  • Jacob Maskiewicz (1 papers)
  • Julia Len (1 papers)
  • Wei Dai (1 papers)
  • Alexander Gamero-Garrido (1 papers)
  • Yongsoo Song (1 papers)
  • Ryan Koga (1 papers)
  • Ken Keys (1 papers)
  • Cindy Moore (1 papers)
  • Armaiti Ardeshiricham (1 papers)
  • Yoshiki Takashima (1 papers)
  • Sicun Gao (1 papers)
  • Ryan Kastner (1 papers)
  • Michael Smith (1 papers)
  • Xinyu Zhang (1 papers)
  • Siam U. Hussain (1 papers)
  • Mojan Javaheripi (1 papers)
  • John Bellardo (1 papers)
  • Eugene Tsyrklevich (1 papers)
  • Bennet Yee (1 papers)
  • Ju Wang (1 papers)
  • Xin Liu (1 papers)
  • Andrew A. Chien (1 papers)
  • David S. Anderson (1 papers)
  • Chris Fleizach (1 papers)
  • Vinh The Lam (1 papers)
  • Jerry Chou (1 papers)
  • Bill Lin (1 papers)
  • Grant Jordan (1 papers)
  • Zachary Tatlock (1 papers)
  • Nicholas Weaver (1 papers)
  • Jake Maskiewicz (1 papers)
  • Tom Wypych (1 papers)
  • Corey Singleton (1 papers)
  • Chris Comfort (1 papers)
  • Nick Weaver (1 papers)
  • Leo Porter (1 papers)
  • Zhaomo Yang (1 papers)
  • Brian Johannesmeyer (1 papers)
  • Maxwell Bland (1 papers)
  • Klaus v. Gleissenthall (1 papers)
  • M Sadegh Riazi (1 papers)
  • Songbai Yan (1 papers)
  • Zhao Gang (1 papers)
  • Shehzeen Hussain (1 papers)
  • Paarth Neekhara (1 papers)
  • Shlomo Dubnov (1 papers)
  • Julian McAuley (1 papers)
  • Mohammadkazem Taram (1 papers)
  • Alberto Dainotti (1 papers)
  • Huili Chen (1 papers)
  • George Arnold Sullivan (1 papers)

Papers

"Graph-Based Authentication of Digital Streams"

Sara Miner, ... -- Oakland 2001

"OCB: a block-cipher mode of operation for efficient authenticated encryption"

Mihir Bellare, ... -- CCS 2001

"Inferring Internet Denial-of-Service Activity"

Geoffrey M. Voelker, Stefan Savage, ... -- Usenix 2001

"Self-Healing Key Distribution with Revocation"

Sara Miner, ... -- Oakland 2002

"Authenticated encryption in SSH: provably fixing the SSH binary packet protocol"

Mihir Bellare, Tadayoshi Kohno, ... -- CCS 2002

"802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions"

John Bellardo, Stefan Savage, ... -- Usenix 2003

"Dynamic Detection and Prevention of Race Conditions in File Accesses"

Eugene Tsyrklevich, Bennet Yee, ... -- Usenix 2003

"Analysis of an Electronic Voting System"

Tadayoshi Kohno, ... -- Oakland 2004

"On the Difficulty of Scalably Detecting Network Attacks"

Kirill Levchenko, Ramamohan Paturi, George Varghese, ... -- CCS 2004

"Attacking and Repairing the WinZip Encryption Scheme"

Tadayoshi Kohno, ... -- CCS 2004

"Remote Physical Device Fingerprinting"

Tadayoshi Kohno, Andre Broido, KC Claffy, ... -- Oakland 2005

"Misbehaving TCP Receivers Can Cause Internet-Wide Congestion Collapse"

Ryan Braud, ... -- CCS 2005

"Empirical Study of Tolerating Denial-of-Service Attacks with a Proxy Network"

Ju Wang, Xin Liu, Andrew A. Chien, ... -- Usenix 2005

"Key Regression: Enabling Efficient Key Distribution for Secure Distributed Storage"

Tadayoshi Kohno, ... -- NDSS 2006

"Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage -or- How to Store Ballots on a Voting Machine (Extended Abstract)"

Tadayoshi Kohno, ... -- Oakland 2006

"Stateful Public-Key Cryptosystems: How to Encrypt with One 160-bit Exponentiation"

Mihir Bellare, ... -- CCS 2006

"Multi-Signatures in the Plain Public-Key Model and a Generalized Forking Lemma"

Mihir Bellare, ... -- CCS 2006

"Designing Voting Machines for Verification"

Tadayoshi Kohno, ... -- Usenix 2006

"Robust Computational Secret Sharing and a Unified Account of Classical Secret-Sharing Goals"

Mihir Bellare, ... -- CCS 2007

"The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86)"

Hovav Shacham, ... -- CCS 2007

"Spamscatter: Characterizing Internet Scam Hosting Infrastructure"

David S. Anderson, Chris Fleizach, Stefan Savage, Geoffrey M. Voelker, ... -- Usenix 2007

"Proximity Breeds Danger: Emerging Threats in Metro-area Wireless Networks"

Vinh The Lam, ... -- Usenix 2007

"When Good Instructions Go Bad: Generalizing Return-Oriented Programming to RISC"

Erik Buchanan, Ryan Roemer, Hovav Shacham, Stefan Savage, ... -- CCS 2008

"Reconsidering Physical Key Secrecy: Teleduplication via Optical Decoding"

Benjamin Laxton, Kai Wang, Stefan Savage, ... -- CCS 2008

"Spamalytics: An Empirical Analysis of Spam Marketing Conversion"

Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Stefan Savage, ... -- CCS 2008

"Proactive Surge Protection: A Defense Mechanism for Bandwidth-Based Attacks"

Jerry Chou, Bill Lin, ... -- Usenix 2008

"Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties with DHTs"

Thomas Ristenpart, ... -- Usenix 2008

"Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds"

Thomas Ristenpart, Hovav Shacham, Stefan Savage, ... -- CCS 2009

"Botnet Judo: Fighting Spam with Itself"

Andreas Pitsillidis, Kirill Levchenko, Chris Kanich, Geoffrey M. Voelker, Stefan Savage, ... -- NDSS 2010

"When Good Randomness Goes Bad: Virtual Machine Reset Vulnerabilities and Hedging Deployed Cryptography"

Thomas Ristenpart, Scott Yilek, ... -- NDSS 2010

"Experimental Security Analysis of a Modern Automobile"

Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, ... -- Oakland 2010

"An empirical study of privacy-violating information flows in JavaScript web applications"

Dongseok Jang, Ranjit Jhala, Sorin Lerner, Hovav Shacham, ... -- CCS 2010

"Return-oriented programming without returns"

Stephen Checkoway, Hovav Shacham, ... -- CCS 2010

"ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash"

Sarah Meiklejohn, ... -- Usenix 2010

"Re: CAPTCHAs Understanding CAPTCHA-Solving Services in an Economic Context"

Marti Motoyama, Kirill Levchenko, Chris Kanich, Damon McCoy, Geoffrey M. Voelker, Stefan Savage, ... -- Usenix 2010

"Click Trajectories: End-to-End Analysis of the Spam Value Chain"

Kirill Levchenko, Andreas Pitsillidis, Neha Chachra, Brandon Enright, Tristan Halvorson, Chris Kanich, He Liu, Damon McCoy, Geoffrey M. Voelker, Stefan Savage, ... -- Oakland 2011

"Cloak and Dagger: Dynamics of Web Search Cloaking"

David Y. Wang, Stefan Savage, Geoffrey M. Voelker, ... -- CCS 2011

"Ciphers that Encipher their own Keys"

Mihir Bellare, Sriram Keelveedhi, ... -- CCS 2011

"Comprehensive Experimental Analyses of Automotive Attack Surfaces"

Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, ... -- Usenix 2011

"Dirty Jobs: The Role of Freelance Labor in Web Service Abuse"

Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker, ... -- Usenix 2011

"Show Me the Money: Characterizing Spam-advertised Revenue"

Chris Kanich, Damon McCoy, Tristan Halvorson, Kirill Levchenko, Geoffrey M. Voelker, Stefan Savage, ... -- Usenix 2011

"The Phantom Tollbooth: Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion"

Sarah Meiklejohn, Keaton Mowery, Stephen Checkoway, Hovav Shacham, ... -- Usenix 2011

"Priceless: The Role of Payments in Abuse-advertised Goods"

Geoffrey M. Voelker, Stefan Savage, ... -- CCS 2012

"Manufacturing Compromise: The Emergence of Exploit-as-a-Service"

Neha Chachra, Kirill Levchenko, Andreas Pitsillidis, Stefan Savage, Geoffrey M. Voelker, ... -- CCS 2012

"Foundations of Garbled Circuits"

Mihir Bellare, Viet Tung Hoang, ... -- CCS 2012

"PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs"

Andreas Pitsillidis, Grant Jordan, Geoffrey M. Voelker, Stefan Savage, Kirill Levchenko, ... -- Usenix 2012

"Establishing Browser Security Guarantees through Formal Shim Verification"

Dongseok Jang, Zachary Tatlock, Sorin Lerner, ... -- Usenix 2012

"Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices"

Nadia Heninger, ... -- Usenix 2012

"Optimally Robust Private Information Retrieval"

Nadia Heninger, ... -- Usenix 2012

"Juice: A Longitudinal Study of an SEO Campaign"

David Y. Wang, Stefan Savage, Geoffrey M. Voelker, ... -- NDSS 2013

"Efficient Garbling from a Fixed-Key Blockcipher"

Mihir Bellare, Sriram Keelveedhi, ... -- Oakland 2013

"Welcome to the Entropics: Boot-Time Entropy in Embedded Devices"

Keaton Mowery, Michael Wei, David Kohlbrenner, Hovav Shacham, Steven Swanson, ... -- Oakland 2013

"Catching Click-Spam in Search Ad Networks"

Vacha Dave, ... -- CCS 2013

"Practical Comprehensive Bounds on Surreptitious Communication over DNS"

Nicholas Weaver, ... -- Usenix 2013

"DupLESS: Server-Aided Encryption for Deduplicated Storage"

Mihir Bellare, Sriram Keelveedhi, ... -- Usenix 2013

"Measuring the Practical Impact of DNSSEC Deployment"

Wilson Lian, Hovav Shacham, Stefan Savage, ... -- Usenix 2013

"Take This Personally: Pollution Attacks on Personalized Services"

Alex C. Snoeren, ... -- Usenix 2013

"SafeDispatch: Securing C++ Virtual Calls from Memory Corruption Attacks"

Dongseok Jang, Sorin Lerner, ... -- NDSS 2014

"DSpin: Detecting Automatically Spun Content on the Web"

Qing Zhang, David Y. Wang, Geoffrey M. Voelker, ... -- NDSS 2014

"Botcoin: Monetizing Stolen Cycles"

Danny Yuxing Huang, Sarah Meiklejohn, Vacha Dave, Stefan Savage, Alex C. Snoeren, Kirill Levchenko, ... -- NDSS 2014

"Deniable Liaisons"

Alex C. Snoeren, ... -- CCS 2014

"Characterizing Large-Scale Click Fraud in ZeroAccess"

Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker, ... -- CCS 2014

"On The Security of Mobile Cockpit Information Systems"

Devin Lundberg, Brown Farinholt, Edward Sullivan, Ryan Mast, Stefan Savage, Alex C. Snoeren, Kirill Levchenko, ... -- CCS 2014

"On the Practical Exploitability of Dual EC in TLS Implementations"

Jake Maskiewicz, Hovav Shacham, ... -- Usenix 2014

"Security Analysis of a Full-Body Scanner"

Keaton Mowery, Tom Wypych, Corey Singleton, Chris Comfort, Eric Rescorla, Hovav Shacham, ... -- Usenix 2014

"Hulk: Eliciting Malicious Behavior in Browser Extensions"

Neha Chachra, ... -- Usenix 2014

"Too LeJIT to Quit: Extending JIT Spraying to ARM"

Wilson Lian, Hovav Shacham, Stefan Savage, ... -- NDSS 2015

"On Subnormal Floating Point and Abnormal Timing"

Marc Andrysco, Keaton Mowery, David Kohlbrenner, Ranjit Jhala, Sorin Lerner, Hovav Shacham, ... -- Oakland 2015

"Security by Any Other Name: On the Effectiveness of Provider Based Email Security"

Ian Foster, Jon Larson, Max Masich, Alex C. Snoeren, Stefan Savage, Kirill Levchenko, ... -- CCS 2015

"Mass-surveillance without the State: Strongly Undetectable Algorithm-Substitution Attacks"

Mihir Bellare, Joseph Jaeger, Daniel Kane, ... -- CCS 2015

"Cookies Lack Integrity: Real-World Implications"

Nick Weaver, ... -- Usenix 2015

"Protecting C++ Dynamic Dispatch Through VTable Interleaving"

Dimitar Bounov, Rami Gokhan Kc, Sorin Lerner, ... -- NDSS 2016

"Message-recovery attacks on Feistel-based Format Preserving Encryption"

Mihir Bellare, ... -- CCS 2016

"A Systematic Analysis of the Juniper Dual EC Incident"

Jacob Maskiewicz, Eric Rescorla, Hovav Shacham, ... -- CCS 2016

"Trusted browsers for uncertain times"

David Kohlbrenner, Hovav Shacham, ... -- Usenix 2016

"You've Got Vulnerability: Exploring Effective Vulnerability Notifications"

Stefan Savage, ... -- Usenix 2016

"Pushing the Communication Barrier in Secure Computation using Lookup Tables"

Farinaz Koushanfar, ... -- NDSS 2017

"A Call to ARMs: Understanding the Costs and Benefits of JIT Spraying Mitigations"

Wilson Lian, Hovav Shacham, Stefan Savage, ... -- NDSS 2017

"Finding and Preventing Bugs in JavaScript Bindings"

Shravan Narayan, Ranjit Jhala, Deian Stefan, ... -- Oakland 2017

"How They Did It: An Analysis of Emission Defeat Devices in Modern Automobiles"

Guo Li, Kirill Levchenko, Stefan Savage, ... -- Oakland 2017

"To Catch a Ratter: Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild"

Brown Farinholt, Haikuo Yin, Kirill Levchenko, ... -- Oakland 2017

"Better Than Advertised: Improved Security Guarantees for MD-Based Hash Functions"

Mihir Bellare, Joseph Jaeger, Julia Len, ... -- CCS 2017

"Defending Against Key Exfiltration: Efficiency Improvements for BIG-Key Cryptography via Large-Alphabet Subkey Prediction"

Mihir Bellare, Wei Dai, ... -- CCS 2017

"Identity-Based Format-Preserving Encryption"

Mihir Bellare, ... -- CCS 2017

"Quantifying the Pressure of Legal Risks on Third-party Vulnerability Research"

Alexander Gamero-Garrido, Stefan Savage, Kirill Levchenko, Alex C. Snoeren, ... -- CCS 2017

"Prime+Abort: A Timer-Free High-Precision L3 Cache Attack using Intel TSX"

Craig Disselkoen, David Kohlbrenner, Leo Porter, Dean Tullsen, ... -- Usenix 2017

"The buoyancy of castles: Examining the effectiveness of mitigations against floating-point timing channels"

David Kohlbrenner, Hovav Shacham, ... -- Usenix 2017

"Dead Store Elimination (Still) Considered Harmful"

Zhaomo Yang, Brian Johannesmeyer, Sorin Lerner, Kirill Levchenko, ... -- Usenix 2017

"Tracking Ransomware End-to-end"

Vector Guo Li, Kirill Levchenko, Alex C. Snoeren, ... -- Oakland 2018

"Asking for a Friend: Evaluating Response Biases in Security User Studies"

Sean Kross, ... -- CCS 2018

"Lawful Device Access without Mass Surveillance Risk: A Technical Design Discussion"

Stefan Savage, ... -- CCS 2018

"Towards Verified, Constant-time Floating Point Operations"

Marc Andrysco, Ranjit Jhala, Deian Stefan, ... -- CCS 2018

"Secure Outsourced Matrix Computation and Application to Neural Networks"

Yongsoo Song, ... -- CCS 2018

"Schrödinger's RAT: Profiling the Stakeholders in the Remote Access Trojan Ecosystem"

Brown Farinholt, Kirill Levchenko, ... -- Usenix 2018

"How Well Do My Results Generalize? Comparing Security and Privacy Survey Results from MTurk, Web, and Telephone Samples"

Sean Kross, ... -- Oakland 2019

"On the Security of Two-Round Multi-Signatures"

Igors Stepanovs, ... -- Oakland 2019

"The Code That Never Ran: Modeling Attacks on Speculative Evaluation"

Craig Disselkoen, ... -- Oakland 2019

"Multisketches: Practical Secure Sketches Using Off-the-Shelf Biometric Matching Algorithms"

M. Sadegh Riazi, Farinaz Koushanfar, ... -- CCS 2019

"Network Hygiene, Incentives, and Regulation: Deployment of Source Address Validation in the Internet"

Ryan Koga, Ken Keys, KC Claffy, ... -- CCS 2019

"Towards Continuous Access Control Validation and Forensics"

Chengcheng Xiang, Yudong Wu, Bingyu Shen, Mingyao Shen, Yuanyuan Zhou, Cindy Moore, ... -- CCS 2019

"VeriSketch: Synthesizing Secure Hardware Designs with Timing-Sensitive Information Flow Properties"

Armaiti Ardeshiricham, Yoshiki Takashima, Sicun Gao, Ryan Kastner, ... -- CCS 2019

"Please Pay Inside: Evaluating Bluetooth-based Detection of Gas Pump Skimmers"

Nishant Bhaskar, Maxwell Bland, Aaron Schulman, ... -- Usenix 2019

"Reading the Tea leaves: A Comparative Analysis of Threat Intelligence"

Vector Guo Li, Geoffrey M. Voelker, Stefan Savage, ... -- Usenix 2019

"Detecting and Characterizing Lateral Phishing at Scale"

Stefan Savage, Geoffrey M. Voelker, ... -- Usenix 2019

"IODINE: Verifying Constant-Time Execution of Hardware"

Klaus v. Gleissenthall, Rami Gokhan Kc, Deian Stefan, Ranjit Jhala, ... -- Usenix 2019

"XONN: XNOR-based Oblivious Deep Neural Network Inference"

M Sadegh Riazi, Mohammad Samragh, Farinaz Koushanfar, ... -- Usenix 2019

"Pseudorandom Black Swans: Cache Attacks on CTR_DRBG"

Nadia Heninger, ... -- Oakland 2020

"A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web"

Sean Kross, ... -- Usenix 2020

"Sys: A Static/Symbolic Tool for Finding Good Bugs in Good (Browser) Code"

Deian Stefan, ... -- Usenix 2020

"CopyCat: Controlled Instruction-Level Attacks on Enclaves"

Nadia Heninger, ... -- Usenix 2020

"Retrofitting Fine Grain Isolation in the Firefox Renderer"

Shravan Narayan, Craig Disselkoen, Sorin Lerner, Deian Stefan, ... -- Usenix 2020

"Exploring Connections Between Active Learning and Model Extraction"

Kamalika Chaudhuri, Songbai Yan, ... -- Usenix 2020

"TPM-FAIL: TPM meets Timing and Lattice Attacks"

Nadia Heninger, ... -- Usenix 2020

"SANNS: Scaling Up Secure Approximate k-Nearest Neighbors Search"

M. Sadegh Riazi, ... -- Usenix 2020

"Доверя́й, но проверя́й: SFI safety for native-compiled Wasm"

Evan Johnson, David Thien, Yousef Alhessi, Shravan Narayan, Sorin Lerner, Stefan Savage, Deian Stefan, ... -- NDSS 2021

"Diogenes: Lightweight Scalable RSA Modulus Generation with a Dishonest Majority"

Daniele Micciancio, ... -- Oakland 2021

"High-Assurance Cryptography in the Spectre Era"

Sunjay Cauligi, ... -- Oakland 2021

"SugarCoat: Programmatically Generating Privacy-Preserving, Web-Compatible Resource Replacements for Content Blocking"

Michael Smith, Deian Stefan, ... -- CCS 2021

"The Invisible Shadow: How Security Cameras Leak Private Activities"

Xinyu Zhang, ... -- CCS 2021

"COINN: Crypto/ML Codesign for Oblivious Inference via Neural Networks"

Siam U. Hussain, Mojan Javaheripi, Mohammad Samragh, Farinaz Koushanfar, ... -- CCS 2021

"Solver-Aided Constant-Time Hardware Verification"

Rami Gokhan Kc, Deian Stefan, Ranjit Jhala, ... -- CCS 2021

"Driving 2FA Adoption at Scale: Optimizing Two-Factor Authentication Notification Design Patterns"

Grant Ho, ... -- Usenix 2021

"Jetset: Targeted Firmware Rehosting for Embedded Systems"

Evan Johnson, Stefan Savage, ... -- Usenix 2021

"Can Systems Explain Permissions Better? Understanding Users' Misperceptions under Smartphone Runtime Permission Model"

Bingyu Shen, Chengcheng Xiang, Yudong Wu, Mingyao Shen, Yuanyuan Zhou, ... -- Usenix 2021

"Locally Differentially Private Analysis of Graph Statistics"

Jacob Imola, Kamalika Chaudhuri, ... -- Usenix 2021

"Swivel: Hardening WebAssembly against Spectre"

Shravan Narayan, Craig Disselkoen, Daniel Moghimi, Sunjay Cauligi, Evan Johnson, Zhao Gang, Dean Tullsen, Deian Stefan, ... -- Usenix 2021

"WaveGuard: Understanding and Mitigating Audio Adversarial Examples"

Shehzeen Hussain, Paarth Neekhara, Shlomo Dubnov, Julian McAuley, Farinaz Koushanfar, ... -- Usenix 2021

"Hopper: Modeling and Detecting Lateral Movement"

Grant Ho, Stefan Savage, Geoffrey M. Voelker, ... -- Usenix 2021

"Evaluating Physical-Layer BLE Location Tracking Attacks on Mobile Devices"

Hadi Givehchian, Nishant Bhaskar, Eliana Rodriguez Herrera, Hector Lopez Soto, Christian Dameff, Dinesh Bharadia, Aaron Schulman, ... -- Oakland 2022

"SoK: Practical Foundations for Software Spectre Defenses"

Sunjay Cauligi, Craig Disselkoen, Daniel Moghimi, Deian Stefan, ... -- Oakland 2022

"Differentially Private Triangle and 4-Cycle Counting in the Shuffle Model"

Jacob Imola, Kamalika Chaudhuri, ... -- CCS 2022

"SecSMT: Securing SMT Processors against Contention-Based Covert Channels"

Mohammadkazem Taram, Dean Tullsen, ... -- Usenix 2022

"Spoki: Unveiling a New Wave of Scanners through a Reactive Network Telescope"

Alberto Dainotti, ... -- Usenix 2022

"Communication-Efficient Triangle Counting under Local Differential Privacy"

Jacob Imola, Kamalika Chaudhuri, ... -- Usenix 2022

"FLAME: Taming Backdoors in Federated Learning"

Huili Chen, Farinaz Koushanfar, ... -- Usenix 2022

"Open to a fault: On the passive compromise of TLS keys via transient errors"

George Arnold Sullivan, Nadia Heninger, ... -- Usenix 2022