University of Maryland, College Park

General Info

Rank: #8 Worldwide
#7 in US
Papers: 168
Number of Researchers: 138
APA
(average papers per authors):
1.2
Country: USA

Activity Map

Contributors

  • Jonathan Katz (32 papers)
  • Michelle L. Mazurek (25 papers)
  • Charalampos Papamanthou (18 papers)
  • Elaine Shi (17 papers)
  • Dave Levin (14 papers)
  • Tudor Dumitras (13 papers)
  • Michael Hicks (10 papers)
  • Xiao Wang (10 papers)
  • Elissa M. Redmiles (9 papers)
  • Ahmed E. Kosba (6 papers)
  • Yupeng Zhang (6 papers)
  • Rock Stevens (5 papers)
  • Andrew Miller (5 papers)
  • Daniel Genkin (5 papers)
  • Bum Jun Kwon (4 papers)
  • Kartik Nayak (4 papers)
  • Bobby Bhattacharjee (4 papers)
  • Doowon Kim (4 papers)
  • Daniel Votipka (4 papers)
  • Ian Miers (4 papers)
  • Stephen Herwig (3 papers)
  • Richard Roberts (3 papers)
  • Gang Qu (3 papers)
  • William A. Arbaugh (3 papers)
  • Virgil Gligor (3 papers)
  • Chang Liu (3 papers)
  • Omer Akgul (3 papers)
  • Noel Warford (3 papers)
  • Nick Petroni (3 papers)
  • Samuel Ranellucci (3 papers)
  • Kevin Bock (3 papers)
  • Dana Dachman-Soled (3 papers)
  • Ji Sun Shin (2 papers)
  • Katura Harvey (2 papers)
  • George Hughey (2 papers)
  • Ioannis Demertzis (2 papers)
  • Rob Sherwood (2 papers)
  • Michael Rosenberg (2 papers)
  • Jeffrey S. Foster (2 papers)
  • Alex J. Malozemoff (2 papers)
  • Ziyun Zhu (2 papers)
  • Daniel Apon (2 papers)
  • Andrew Ruef (2 papers)
  • James Parker (2 papers)
  • Yaelle Goldschlag (2 papers)
  • Shravan Srinivasan (2 papers)
  • Kelsey R. Fulton (2 papers)
  • Timothy Fraser (2 papers)
  • Octavian Suciu (2 papers)
  • Yigitcan Kaya (2 papers)
  • Youngsam Park (1 papers)
  • Virinchi Srinivas (1 papers)
  • Amol Deshpande (1 papers)
  • Kevin Halliday (1 papers)
  • Hilary Browne (1 papers)
  • Aravind Srinivasan (1 papers)
  • Narendar Shankar (1 papers)
  • Alvaro A. Cardenas (1 papers)
  • Karl Seamon (1 papers)
  • John S. Baras (1 papers)
  • Nikhil Swamy (1 papers)
  • Brian Corcoran (1 papers)
  • Piotr Mardziel (1 papers)
  • Yan Huang (1 papers)
  • Aseem Rastogi (1 papers)
  • Matthew A. Hammer (1 papers)
  • Richard Johnson (1 papers)
  • Amelia R. Malone (1 papers)
  • Dimitrios Papadopoulos (1 papers)
  • Elissa Redmiles (1 papers)
  • Jeremy Hu (1 papers)
  • Eric Zhang (1 papers)
  • Kaitlyn Yang (1 papers)
  • Nathan Malkin (1 papers)
  • Laurent Eschenauer (1 papers)
  • Nan Wang (1 papers)
  • Lior Malka (1 papers)
  • Adam Groce (1 papers)
  • Avik Chaudhuri (1 papers)
  • Mike Hicks (1 papers)
  • Wei-Hong Chuang (1 papers)
  • Ravi Garg (1 papers)
  • Min Wu (1 papers)
  • Dominique Schroeder (1 papers)
  • Neil Spring (1 papers)
  • Viet Tung Hoang (1 papers)
  • Jayanta Mondal (1 papers)
  • Frank Cangialosi (1 papers)
  • George Klees (1 papers)
  • Benji Cooper (1 papers)
  • Rachel Walter (1 papers)
  • Xiong Fan (1 papers)
  • Shih-Han Hung (1 papers)
  • Xiaodi Wu (1 papers)
  • Julian Loss (1 papers)
  • Noemi Glaeser (1 papers)
  • Michael Lum (1 papers)
  • Leah Kannan (1 papers)
  • Kasra Torshizi (1 papers)
  • Yujie Wang (1 papers)
  • Kasra Abbaszadeh (1 papers)
  • Desiree Abrokwa (1 papers)
  • Hunter Kippen (1 papers)
  • Jesus Molina (1 papers)
  • Octavian Udrea (1 papers)
  • Cristian Lumezanu (1 papers)
  • Paul S. Herrnson (1 papers)
  • Matthew Lentz (1 papers)
  • Jinseong Jeon (1 papers)
  • Mahmoud F. Sayed (1 papers)
  • Andrew Liu (1 papers)
  • Carl Sabottke (1 papers)
  • Octavian-Petru Suciu (1 papers)
  • Zhihao Li (1 papers)
  • Angelisa C. Plane (1 papers)
  • Ashton Webster (1 papers)
  • Ryan Eckenrod (1 papers)
  • James Purtilo (1 papers)
  • Radu Marginean (1 papers)
  • Hal Daume III (1 papers)
  • Sanghyun Hong (1 papers)
  • Huahong Tu (1 papers)
  • Amritha Jayanti (1 papers)
  • Aravind Koneru (1 papers)
  • Matthew Hou (1 papers)
  • Nathan Reitinger (1 papers)
  • Justin Goodman (1 papers)
  • Seth Rabin (1 papers)
  • Olivia Murphy (1 papers)
  • Wei Bai (1 papers)
  • Shruti Das (1 papers)
  • Aria Shahverdi (1 papers)
  • Ashna Mediratta (1 papers)
  • Yair Fax (1 papers)
  • Kyle Hurley (1 papers)
  • Erin Avllazagaj (1 papers)
  • Michael Harrity (1 papers)
  • Frederick Sell (1 papers)

Papers

"A Trend Analysis of Exploitations"

Hilary Browne, William A. Arbaugh, ... -- Oakland 2001

"P5: A Protocol for Scalable Anonymous Communication"

Rob Sherwood, Bobby Bhattacharjee, Aravind Srinivasan, ... -- Oakland 2002

"A key-management scheme for distributed sensor networks"

Laurent Eschenauer, Virgil Gligor, ... -- CCS 2002

"Secret Handshakes from Pairing-Based Key Agreements"

Narendar Shankar, ... -- Oakland 2003

"Efficiency improvements for signature schemes with tight security reductions"

Jonathan Katz, Nan Wang, ... -- CCS 2003

"Securing OLAP Data Cubes Against Privacy Breaches"

Virgil Gligor, ... -- Oakland 2004

"Copilot - a Coprocessor-based Kernel Runtime Integrity Monitor"

Nick Petroni, Timothy Fraser, Jesus Molina, William A. Arbaugh, ... -- Usenix 2004

"Distributed Detection of Node Replication Attacks in Sensor Networks"

Virgil Gligor, ... -- Oakland 2005

"Modeling Insider Attacks on Group Key-Exchange Protocols"

Jonathan Katz, Ji Sun Shin, ... -- CCS 2005

"Misbehaving TCP Receivers Can Cause Internet-Wide Congestion Collapse"

Rob Sherwood, Bobby Bhattacharjee, ... -- CCS 2005

"A Framework for the Evaluation of Intrusion Detection Systems"

Alvaro A. Cardenas, Karl Seamon, John S. Baras, ... -- Oakland 2006

"Rule-Based Static Analysis of Network Protocol Implementations"

Octavian Udrea, Cristian Lumezanu, Jeffrey S. Foster, ... -- Usenix 2006

"An Architecture for Specification-Based Detection of Semantic Integrity Violations in Kernel Dynamic Data"

Nick Petroni, Timothy Fraser, William A. Arbaugh, ... -- Usenix 2006

"Automated Detection of Persistent Kernel Control-Flow Attacks"

Nick Petroni, Michael Hicks, ... -- CCS 2007

"A New Privacy-Enhanced Matchmaking Protocol"

Ji Sun Shin, ... -- NDSS 2008

"Fable: A Language for Enforcing User-defined Security Policies"

Michael Hicks, Nikhil Swamy, Brian Corcoran, ... -- Oakland 2008

"Attacking cryptographic schemes based on 'perturbation polynomials'"

Jonathan Katz, ... -- CCS 2009

"Secure text processing with applications to private DNA matching"

Jonathan Katz, Lior Malka, ... -- CCS 2010

"A new framework for efficient password-based authenticated key exchange"

Adam Groce, Jonathan Katz, ... -- CCS 2010

"Symbolic security analysis of ruby-on-rails web applications"

Avik Chaudhuri, Jeffrey S. Foster, ... -- CCS 2010

"Scantegrity II Municipal Election at Takoma Park: The First E2E Binding Governmental Election with Ballot Privacy"

Paul S. Herrnson, ... -- Usenix 2010

"Efficient Privacy-Preserving Biometric Identification"

Jonathan Katz, ... -- NDSS 2011

"VMCrypt - Modular Software Architecture for Scalable Secure Computation"

Jonathan Katz, ... -- CCS 2011

"Faster Secure Two-Party Computation Using Garbled Circuits"

Jonathan Katz, ... -- Usenix 2011

"Private Set Intersection: Are Garbled Circuits Better than Custom Protocols?"

Jonathan Katz, ... -- NDSS 2012

"Quid-Pro-Quo-tocols: Strengthening Semi-Honest Protocols with Dual Execution"

Jonathan Katz, ... -- Oakland 2012

"Deanonymizing Mobility Traces: Using Social Network as a Side-Channel"

Mike Hicks, ... -- CCS 2012

"How Secure are Power Network Signature Based Time Stamps?"

Wei-Hong Chuang, Ravi Garg, Min Wu, ... -- CCS 2012

"Verifiable Data Streaming"

Dominique Schroeder, ... -- CCS 2012

"Secure Two-Party Computation in Sublinear (Amortized) Time"

Jonathan Katz, ... -- CCS 2012

"ObliviStore: High Performance Oblivious Cloud Storage"

Elaine Shi, ... -- Oakland 2013

"Anon-Pass: Practical Anonymous Subscriptions"

Jonathan Katz, ... -- Oakland 2013

"Path ORAM: An Extremely Simple Oblivious RAM Protocol"

Elaine Shi, ... -- CCS 2013

"Practical Dynamic Proofs of Retrievability"

Elaine Shi, Charalampos Papamanthou, ... -- CCS 2013

"Multi-Cloud Oblivious Storage"

Elaine Shi, ... -- CCS 2013

"PHANTOM: Practical Oblivious Computation in a Secure Processor"

Elaine Shi, ... -- CCS 2013

"Practical Dynamic Searchable Encryption with Small Leakage"

Charalampos Papamanthou, Elaine Shi, ... -- NDSS 2014

"Scambaiter: Understanding Targeted Nigerian Scams on Craigslist"

Youngsam Park, Elaine Shi, ... -- NDSS 2014

"PermaCoin: Repurposing Bitcoin Work for Data Preservation"

Andrew Miller, Elaine Shi, Jonathan Katz, ... -- Oakland 2014

"Quantifying Information Flow for Dynamic Secrets"

Piotr Mardziel, Michael Hicks, ... -- Oakland 2014

"Automating Efficient RAM-Model Secure Computation"

Chang Liu, Yan Huang, Elaine Shi, Michael Hicks, Jonathan Katz, ... -- Oakland 2014

"Wysteria: A Programming Language for Generic, Mixed-mode Multiparty Computations"

Aseem Rastogi, Matthew A. Hammer, Michael Hicks, ... -- Oakland 2014

"Oblivious Data Structures"

Xiao Wang, Kartik Nayak, Chang Liu, Elaine Shi, ... -- CCS 2014

"ALITHEIA: Towards Practical Verifiable Graph Processing"

Yupeng Zhang, Charalampos Papamanthou, Jonathan Katz, ... -- CCS 2014

"SCORAM: Oblivious RAM for Secure Computation"

Xiao Wang, Elaine Shi, ... -- CCS 2014

"RevCast: Fast, Private Certificate Revocation over FM Radio"

Dave Levin, Neil Spring, ... -- CCS 2014

"ShadowCrypt: Encrypted Web Applications for Everyone"

Elaine Shi, ... -- CCS 2014

"SDDR: Light-Weight, Secure Mobile Encounters"

Matthew Lentz, Elaine Shi, Bobby Bhattacharjee, ... -- Usenix 2014

"Brahmastra: Driving Apps to Test the Security of Third-Party Components"

Jinseong Jeon, ... -- Usenix 2014

"TRUESET: Nearly Practical Verifiable Set Computations"

Ahmed E. Kosba, Charalampos Papamanthou, Mahmoud F. Sayed, Elaine Shi, ... -- Usenix 2014

"Burst ORAM: Minimizing ORAM Response Times for Bursty Access Patterns"

Elaine Shi, ... -- Usenix 2014

"ObliVM: A Programming Framework for Secure Computation"

Chang Liu, Xiao Wang, Kartik Nayak, Elaine Shi, ... -- Oakland 2015

"GraphSC: Parallel Secure Computation Made Easy"

Kartik Nayak, Xiao Wang, Elaine Shi, ... -- Oakland 2015

"SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies"

Andrew Miller, ... -- Oakland 2015

"The Attack of the Clones: A Study of the Impact of Shared Code on Vulnerability Patching"

Richard Johnson, Tudor Dumitras, ... -- Oakland 2015

"Nonoutsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining Coalitions"

Andrew Miller, Ahmed E. Kosba, Jonathan Katz, ... -- CCS 2015

"Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound"

Xiao Wang, ... -- CCS 2015

"Automated Analysis and Synthesis of Authenticated Encryption Schemes"

Viet Tung Hoang, Jonathan Katz, Alex J. Malozemoff, ... -- CCS 2015

"IntegriDB: Verifiable SQL for Outsourced Databases"

Jonathan Katz, Charalampos Papamanthou, Yupeng Zhang, ... -- CCS 2015

"The Dropper Effect: Insights into Malware Distribution with Downloader Graph Analytics"

Bum Jun Kwon, Jayanta Mondal, Tudor Dumitras, ... -- CCS 2015

"Efficient Genome-Wide, Privacy-Preserving Similar Patient Query based on Private Edit Distance"

Xiao Wang, ... -- CCS 2015

"De-anonymizing Programmers via Code Stylometry"

Andrew Liu, ... -- Usenix 2015

"Vulnerability Disclosure in the Age of Social Media: Exploiting Twitter for Predicting Real-World Exploits"

Carl Sabottke, Octavian-Petru Suciu, Tudor Dumitras, ... -- Usenix 2015

"Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts"

Ahmed E. Kosba, Andrew Miller, Charalampos Papamanthou, ... -- Oakland 2016

"I Think They're Trying to Tell Me Something: Advice Sources and Selection for Digital Security"

Elissa M. Redmiles, Amelia R. Malone, Michelle L. Mazurek, ... -- Oakland 2016

"Revisiting Square-Root ORAM: Efficient Random Access in Multi-Party Computation"

Xiao Wang, Jonathan Katz, ... -- Oakland 2016

"You Get Where You're Looking For: The Impact Of Information Sources On Code Security"

Michelle L. Mazurek, Doowon Kim, ... -- Oakland 2016

"Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem"

Frank Cangialosi, Dave Levin, ... -- CCS 2016

"FeatureSmith: Automatically Engineering Features for Malware Detection by Mining the Security Literature"

Ziyun Zhu, Tudor Dumitras, ... -- CCS 2016

"How I Learned to be Secure: a Census-Representative Survey of Security Advice Sources and Behavior"

Elissa M. Redmiles, Michelle L. Mazurek, ... -- CCS 2016

"5Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs"

Daniel Apon, Jonathan Katz, ... -- CCS 2016

"POPE: Partial Order Preserving Encoding"

Daniel Apon, ... -- CCS 2016

"Attribute-based Key Exchange with General Policies"

Alex J. Malozemoff, ... -- CCS 2016

"The Ring of Gyges: Investigating the Future of Criminal Smart Contracts"

Ahmed E. Kosba, ... -- CCS 2016

"Build It, Break It, Fix It: Contesting Secure Development"

Andrew Ruef, Michael Hicks, James Parker, Dave Levin, Michelle L. Mazurek, ... -- CCS 2016

"The Honey Badger of BFT Protocols"

Andrew Miller, ... -- CCS 2016

"All Your Queries Are Belong to Us:The Power of File-Injection Attacks on Searchable Encryption"

Yupeng Zhang, Jonathan Katz, Charalampos Papamanthou, ... -- Usenix 2016

"The Cut-and-Choose Game and its Application to Cryptographic Protocols"

Jonathan Katz, ... -- Usenix 2016

"Catching Worms, Trojan Horses and PUPs: Unsupervised Detection of Silent Delivery Campaigns"

Bum Jun Kwon, Virinchi Srinivas, Amol Deshpande, Tudor Dumitras, ... -- NDSS 2017

"HOP: Hardware makes Obfuscation Practical"

Kartik Nayak, ... -- NDSS 2017

"CRLite: A Scalable System for Pushing All TLS Revocations to All Browsers"

Dave Levin, ... -- Oakland 2017

"Comparing the Usability of Cryptographic APIs"

Doowon Kim, Michelle L. Mazurek, ... -- Oakland 2017

"SecureML: A System for Scalable Privacy-Preserving Machine Learning"

Yupeng Zhang, ... -- Oakland 2017

"vSQL: Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases"

Yupeng Zhang, Daniel Genkin, Jonathan Katz, Dimitrios Papadopoulos, Charalampos Papamanthou, ... -- Oakland 2017

"Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation"

Xiao Wang, Samuel Ranellucci, Jonathan Katz, ... -- CCS 2017

"Certified Malware: Measuring Breaches of Trust in the Windows Code-Signing PKI"

Doowon Kim, Bum Jun Kwon, Tudor Dumitras, ... -- CCS 2017

"Global-Scale Secure Multiparty Computation"

Xiao Wang, Samuel Ranellucci, Jonathan Katz, ... -- CCS 2017

"May the Fourth Be With You: A Microarchitectural Side Channel Attack on Real-World Applications of Curve25519"

Daniel Genkin, ... -- CCS 2017

"Solidus: Confidential Distributed Ledger Transactions via PVORM"

Ahmed E. Kosba, ... -- CCS 2017

"DeTor: Provably Avoiding Geographic Regions in Tor"

Zhihao Li, Stephen Herwig, Dave Levin, ... -- Usenix 2017

"Assessing User Perceptions of Online Targeted Advertising"

Angelisa C. Plane, Elissa M. Redmiles, Michelle L. Mazurek, ... -- Usenix 2017

"USB Snooping Made Easy: Crosstalk Leakage Attacks on USB Hubs"

Daniel Genkin, ... -- Usenix 2017

"A Longitudinal, End-to-End View of the DNSSEC Ecosystem"

Dave Levin, ... -- Usenix 2017

"Qapla: Policy compliance for database-backed systems"

Katura Harvey, ... -- Usenix 2017

"Another Flip in the Wall of Rowhammer Defenses"

Daniel Genkin, ... -- Oakland 2018

"Hackers vs. Testers: A Comparison of Software Vulnerability Discovery Processes"

Daniel Votipka, Rock Stevens, Elissa Redmiles, Jeremy Hu, Michelle L. Mazurek, ... -- Oakland 2018

"vRAM: Faster Verifiable RAM With Program-Independent Preprocessing"

Yupeng Zhang, Daniel Genkin, Jonathan Katz, Charalampos Papamanthou, ... -- Oakland 2018

"xJsnark: A Framework for Efficient Verifiable Computation"

Ahmed E. Kosba, Charalampos Papamanthou, ... -- Oakland 2018

"Asking for a Friend: Evaluating Response Biases in Security User Studies"

Elissa M. Redmiles, Ziyun Zhu, Tudor Dumitras, Michelle L. Mazurek, ... -- CCS 2018

"What was that site doing with my Facebook password?, Designing Password-Reuse Notifications"

Elissa M. Redmiles, ... -- CCS 2018

"Evaluating Fuzz Testing"

George Klees, Andrew Ruef, Benji Cooper, Michael Hicks, ... -- CCS 2018

"Improved Non-Interactive Zero Knowledge with Applications to Post-Quantum Signatures"

Jonathan Katz, Xiao Wang, ... -- CCS 2018

"New Constructions for Forward and Backward Private Symmetric Searchable Encryption"

Charalampos Papamanthou, ... -- CCS 2018

"The Battle for New York: A Case Study of Applied Digital Threat Modeling at the Enterprise Level"

Rock Stevens, Daniel Votipka, Elissa M. Redmiles, Michelle L. Mazurek, ... -- Usenix 2018

"The Broken Shield: Measuring Revocation Effectiveness in the Windows Code-Signing PKI"

Doowon Kim, Bum Jun Kwon, Tudor Dumitras, ... -- Usenix 2018

"From Patching Delays to Infection Symptoms: Using Risk Profiles for an Early Discovery of Vulnerabilities Exploited in the Wild"

Tudor Dumitras, ... -- Usenix 2018

"Fast and Service-preserving Recovery from Malware Infections Using CRIU"

Ashton Webster, Ryan Eckenrod, James Purtilo, ... -- Usenix 2018

"When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning Attacks"

Octavian Suciu, Radu Marginean, Yigitcan Kaya, Hal Daume III, Tudor Dumitras, ... -- Usenix 2018

"Measurement and Analysis of Hajime, a Peer-to-peer IoT Botnet"

Stephen Herwig, Katura Harvey, George Hughey, Richard Roberts, Dave Levin, ... -- NDSS 2019

"Data Recovery on Encrypted Databases With k-Nearest Neighbor Query Leakage"

Charalampos Papamanthou, ... -- Oakland 2019

"How Well Do My Results Generalize? Comparing Security and Privacy Survey Results from MTurk, Web, and Telephone Samples"

Elissa M. Redmiles, Michelle L. Mazurek, ... -- Oakland 2019

""Should I Worry?" A Cross-Cultural Examination of Account Security Incident Response"

Elissa M. Redmiles, ... -- Oakland 2019

"Geneva: Evolving Censorship Evasion Strategies"

Kevin Bock, George Hughey, Dave Levin, ... -- CCS 2019

"Oh, the Places You've Been! User Reactions to Longitudinal Transparency About Third-Party Web Tracking and Inferencing"

Michelle L. Mazurek, ... -- CCS 2019

"Traceback for End-to-End Encrypted Messaging"

Ian Miers, ... -- CCS 2019

"Transparency Logs via Append-only Authenticated Dictionaries"

Charalampos Papamanthou, ... -- CCS 2019

"Two-party Private Set Intersection with an Untrusted Third Party."

Samuel Ranellucci, ... -- CCS 2019

"VoltJockey: Breaching TrustZone by Software-Controlled Voltage Manipulation over Multi-core Frequencies"

Gang Qu, ... -- CCS 2019

"You Are Who You Appear to Be: A Longitudinal Study of Domain Impersonation in TLS Certificates"

Richard Roberts, Yaelle Goldschlag, Rachel Walter, Dave Levin, ... -- CCS 2019

"Terminal Brain Damage: Exposing the Graceless Degradation in Deep Neural Networks Under Hardware Fault Attacks"

Sanghyun Hong, Yigitcan Kaya, Tudor Dumitras, ... -- Usenix 2019

"Users Really Do Answer Telephone Scams"

Huahong Tu, ... -- Usenix 2019

"Compliance Cautions: Investigating Security Issues Associated with U.S. Digital-Security Standards"

Rock Stevens, Kevin Halliday, Michelle L. Mazurek, ... -- NDSS 2020

"Dynamic Searchable Encryption with Small Client Storage"

Ioannis Demertzis, Charalampos Papamanthou, ... -- NDSS 2020

"Finding Safety in Numbers with Secure Allegation Escrows"

Bobby Bhattacharjee, ... -- NDSS 2020

"Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers"

Jonathan Katz, ... -- Oakland 2020

"The State of the Uniform: Attacks on Encrypted Databases Beyond the Uniform Query Distribution"

Charalampos Papamanthou, ... -- Oakland 2020

"A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web"

Elissa M. Redmiles, Noel Warford, Amritha Jayanti, Aravind Koneru, Rock Stevens, Michelle L. Mazurek, ... -- Usenix 2020

"Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix It"

Daniel Votipka, Kelsey R. Fulton, James Parker, Matthew Hou, Michelle L. Mazurek, Michael Hicks, ... -- Usenix 2020

"What Twitter Knows: Characterizing Ad Targeting Practices, User Perceptions, and Ad Explanations Through Users' Own Twitter Data"

Nathan Reitinger, Justin Goodman, Michelle L. Mazurek, ... -- Usenix 2020

"Achieving Keyless CDNs with Conclaves"

Stephen Herwig, Dave Levin, ... -- Usenix 2020

"An Observational Investigation of Reverse Engineers’ Processes"

Daniel Votipka, Seth Rabin, Michelle L. Mazurek, ... -- Usenix 2020

"MIRAGE: Succinct Arguments for Randomized Algorithms with Applications to Universal zk-SNARKs"

Charalampos Papamanthou, ... -- Usenix 2020

"SEAL: Attack Mitigation for Encrypted Databases via Adjustable Leakage"

Ioannis Demertzis, Charalampos Papamanthou, ... -- Usenix 2020

"EarArray: Defending against DolphinAttack via Acoustic Attenuation"

Gang Qu, ... -- NDSS 2021

"HackEd: A Pedagogical Analysis of Online Vulnerability Discovery Exercises"

Eric Zhang, Michelle L. Mazurek, ... -- Oakland 2021

"Response-Hiding Encrypted Ranges: Revisiting Security via Parametrized Leakage-Abuse Attacks"

Charalampos Papamanthou, ... -- Oakland 2021

"Wolverine: Fast, Scalable, and Communication-Efficient Zero-Knowledge Proofs for Boolean and Arithmetic Circuits"

Jonathan Katz, ... -- Oakland 2021

"Fuzzy Message Detection"

Ian Miers, ... -- CCS 2021

"Labeled PSI from Homomorphic Encryption with Reduced Computation and Communication"

Michael Rosenberg, ... -- CCS 2021

"EasyPQC: Verifying Post-Quantum Cryptography"

Xiong Fan, Shih-Han Hung, Jonathan Katz, Xiaodi Wu, ... -- CCS 2021

"Compressed Oblivious Encoding for Homomorphically Encrypted Search"

Dana Dachman-Soled, ... -- CCS 2021

"Constant-Overhead Zero-Knowledge for RAM Programs"

Jonathan Katz, ... -- CCS 2021

"The Exact Security of BIP32 Wallets"

Julian Loss, ... -- CCS 2021

"'Passwords Keep Me Safe' – Understanding What Children Think about Passwords"

Olivia Murphy, ... -- Usenix 2021

""It's stressful having all these phones": Investigating Sex Workers' Safety Goals, Risks, and Practices Online"

Michelle L. Mazurek, ... -- Usenix 2021

"Evaluating In-Workflow Messages for Improving Mental Models of End-to-End Encryption"

Omer Akgul, Wei Bai, Shruti Das, Michelle L. Mazurek, ... -- Usenix 2021

"Mystique: Efficient Conversions for Zero-Knowledge Proofs with Applications to Machine Learning"

Jonathan Katz, ... -- Usenix 2021

"Database Reconstruction from Noisy Volumes: A Cache Side-Channel Attack on SQLite"

Aria Shahverdi, Dana Dachman-Soled, ... -- Usenix 2021

"Strategies and Perceived Risks of Sending Sensitive Documents"

Noel Warford, Ashna Mediratta, Michelle L. Mazurek, ... -- Usenix 2021

"Weaponizing Middleboxes for TCP Reflected Amplification"

Kevin Bock, Yair Fax, Kyle Hurley, Dave Levin, ... -- Usenix 2021

"When Malware Changed Its Mind: An Empirical Study of Variable Program Behaviors in the Real World"

Erin Avllazagaj, Tudor Dumitras, ... -- Usenix 2021

"Fooling the Eyes of Autonomous Vehicles: Robust Physical Adversarial Examples Against Traffic Sign Recognition Systems"

Gang Qu, ... -- NDSS 2022

"Above and Beyond: Organizational Efforts to Complement U.S. Digital Security Compliance Mandates"

Rock Stevens, Michelle L. Mazurek, ... -- NDSS 2022

"Investigating Influencer VPN Ads on YouTube"

Omer Akgul, Richard Roberts, Dave Levin, Michelle L. Mazurek, ... -- Oakland 2022

"SNARKBlock: Federated Anonymous Blocklisting from Hidden Common Input Aggregate Proofs"

Michael Rosenberg, Ian Miers, ... -- Oakland 2022

"SoK: A Framework for Unifying At-Risk User Research"

Noel Warford, Kaitlyn Yang, Omer Akgul, Nathan Malkin, Michelle L. Mazurek, ... -- Oakland 2022

"Batching, Aggregation, and Zero-Knowledge Proofs in Bilinear Accumulators"

Shravan Srinivasan, ... -- CCS 2022

"Foundations of Coin Mixing Services"

Noemi Glaeser, ... -- CCS 2022

"Hammurabi: A Framework for Pluggable, Logic-Based X.509 Certificate Validation Policies"

Michael Lum, Yaelle Goldschlag, Leah Kannan, Kasra Torshizi, Yujie Wang, Dave Levin, ... -- CCS 2022

"Thora: Atomic and Privacy-Preserving Multi-Channel Updates"

Kasra Abbaszadeh, ... -- CCS 2022

"Understanding the How and the Why: Exploring Secure Development Practices through a Course Competition"

Kelsey R. Fulton, Desiree Abrokwa, Michelle L. Mazurek, Michael Hicks, ... -- CCS 2022

"When Frodo Flips: End-to-End Key Recovery on FrodoKEM via Rowhammer"

Hunter Kippen, Dana Dachman-Soled, ... -- CCS 2022

"Orca: Blocklisting in Sender-Anonymous Messaging"

Ian Miers, ... -- Usenix 2022

"Expected Exploitability: Predicting the Development of Functional Vulnerability Exploits"

Octavian Suciu, Tudor Dumitras, ... -- Usenix 2022

"Hyperproofs: Aggregating and Maintaining Proofs in Vector Commitments"

Shravan Srinivasan, ... -- Usenix 2022

"Why Users (Don't) Use Password Managers at a Large Educational Institution"

Michelle L. Mazurek, ... -- Usenix 2022

"FIXREVERTER: A Realistic Bug Injection Methodology for Benchmarking Fuzz Testing"

Michael Hicks, ... -- Usenix 2022

"GET /out: Automated Discovery of Application-Layer Censorship Evasion Strategies"

Michael Harrity, Kevin Bock, Frederick Sell, Dave Levin, ... -- Usenix 2022