University of Michigan, Ann Arbor

General Info

Rank: #11 Worldwide
#9 in US
Papers: 145
Number of Researchers: 152
APA
(average papers per authors):
1.0
Country: USA

Activity Map

Contributors

  • J. Alex Halderman (23 papers)
  • Kang G. Shin (20 papers)
  • Zhuoqing Morley Mao (14 papers)
  • Atul Prakash (14 papers)
  • Zakir Durumeric (12 papers)
  • Daniel Genkin (11 papers)
  • Z. Morley Mao (9 papers)
  • Kevin Fu (8 papers)
  • Michael Bailey (7 papers)
  • Qi Alfred Chen (7 papers)
  • Roya Ensafi (7 papers)
  • Andrew Kwong (7 papers)
  • Eric Wustrow (7 papers)
  • Florian Schaub (6 papers)
  • Niels Provos (5 papers)
  • Farnam Jahanian (5 papers)
  • Zhiyun Qian (5 papers)
  • David Adrian (5 papers)
  • Yulong Cao (5 papers)
  • Xin Hu (4 papers)
  • Mingyan Liu (4 papers)
  • Yuru Shao (4 papers)
  • Reethika Ramesh (4 papers)
  • Ram Sundara Raman (4 papers)
  • Kevin Borders (4 papers)
  • Sara Rampazzi (4 papers)
  • Allison McDonald (4 papers)
  • Kassem Fawaz (4 papers)
  • Peter Honeyman (3 papers)
  • Peter M. Chen (3 papers)
  • Scott Wolchok (3 papers)
  • Denis Foo Kune (3 papers)
  • Drew Springall (3 papers)
  • Yunhan Jack Jia (3 papers)
  • Earlence Fernandes (3 papers)
  • Armin Sarabi (3 papers)
  • Timothy Trippel (3 papers)
  • Marina Minkin (3 papers)
  • Kyong-Tak Cho (3 papers)
  • Chaowei Xiao (3 papers)
  • Evan Cooke (2 papers)
  • Samuel T. King (2 papers)
  • Sushant Sinha (2 papers)
  • Jing Zhang (2 papers)
  • Jakub Czyz (2 papers)
  • Amir Rahmati (2 papers)
  • Yiheng Feng (2 papers)
  • Henry X. Liu (2 papers)
  • Matthew Bernhard (2 papers)
  • Diwen Xue (2 papers)
  • Xin Zhao (2 papers)
  • Colleen Swanson (2 papers)
  • Todd Austin (2 papers)
  • Connor Bolton (2 papers)
  • Satish Narayanasamy (2 papers)
  • Ayush Agarwal (2 papers)
  • Dongyao Chen (2 papers)
  • Benjamin VanderSloot (2 papers)
  • Chris Peikert (2 papers)
  • Benjamin Cyr (2 papers)
  • Duc Bui (2 papers)
  • Naomaru Itoi (2 papers)
  • Huan Feng (2 papers)
  • Ofir Weisse (2 papers)
  • Baris Kasikci (2 papers)
  • Jiachen Sun (2 papers)
  • Renuka Kumar (2 papers)
  • Yixin Zou (2 papers)
  • Patrick McDaniel (1 papers)
  • David Watson (1 papers)
  • Dominic G. Lucchetti (1 papers)
  • Ying Zhang (1 papers)
  • Matthew Knysz (1 papers)
  • Yudong Gao (1 papers)
  • Ni Pan (1 papers)
  • Xu Chen (1 papers)
  • Zhaoguang Wang (1 papers)
  • Qiang Xu (1 papers)
  • Florian Shaub (1 papers)
  • Yucheng Yin (1 papers)
  • Victor Ongkowijaya (1 papers)
  • Steven Sprecher (1 papers)
  • Adrian Stoll (1 papers)
  • Kaiyuan Yang (1 papers)
  • Matthew Hicks (1 papers)
  • Qing Dong (1 papers)
  • Dennis Sylvester (1 papers)
  • Gabrielle Beck (1 papers)
  • Subarno Banerjee (1 papers)
  • Yassine Qamsane (1 papers)
  • Yikai Lin (1 papers)
  • Kira Barton (1 papers)
  • James Moyne (1 papers)
  • Henry Meng (1 papers)
  • Jensen Hwa (1 papers)
  • Kevin Chang (1 papers)
  • Stephan van Schaik (1 papers)
  • Dawei Yang (1 papers)
  • Youssef Tobah (1 papers)
  • Ingab Kang (1 papers)
  • Eric Cronin (1 papers)
  • Sugih Jamin (1 papers)
  • Junxian Huang (1 papers)
  • Travis Finkenauer (1 papers)
  • Harri Hursti (1 papers)
  • Margaret MacAlpine (1 papers)
  • Chang-Hong Hsu (1 papers)
  • Yu-Chih Tung (1 papers)
  • Sihui Han (1 papers)
  • Ariana Mirian (1 papers)
  • Eric Crockett (1 papers)
  • Jie You (1 papers)
  • Chad Sharp (1 papers)
  • Yimeng Zhou (1 papers)
  • Won Park (1 papers)
  • James Kasten (1 papers)
  • Mert D. Pese (1 papers)
  • Troy Stacer (1 papers)
  • C. Andres Campos (1 papers)
  • Eric Newberry (1 papers)
  • Angel Rodriguez (1 papers)
  • Prerana Shenoy (1 papers)
  • Yuan Yao (1 papers)
  • Brian Tang (1 papers)
  • Matthew Smart (1 papers)
  • G. Robert Malan (1 papers)
  • Olga Kornievskaia (1 papers)
  • Bill Doster (1 papers)
  • Kevin Coffman (1 papers)
  • Lukasz Opyrchal (1 papers)
  • Eric Larson (1 papers)
  • Jon Oberheide (1 papers)
  • Eric Vander Weele (1 papers)
  • Billy Lau (1 papers)
  • Yang Liu (1 papers)
  • Parinaz Naghizadeh Ardabili (1 papers)
  • Justin Paupore (1 papers)
  • Manos Kapritsos (1 papers)
  • Matt Bernhard (1 papers)
  • Kevin Eykholt (1 papers)
  • Barzan Mozafari (1 papers)
  • Will Scott (1 papers)
  • Thomas F. Wenisch (1 papers)
  • Hao Lu (1 papers)
  • Kevin Loughlin (1 papers)
  • Ian Neal (1 papers)
  • Jiacheng Ma (1 papers)
  • Elisa Tsai (1 papers)
  • Neal Mangaokar (1 papers)
  • Shengtuo Hu (1 papers)
  • Apurva Virkud (1 papers)
  • Arham Jain (1 papers)

Papers

"Encrypting Virtual Memory"

Niels Provos, ... -- Usenix 2000

"Secure Coprocessor Integration with Kerberos V5"

Naomaru Itoi, ... -- Usenix 2000

"Defeating TCP/IP Stack Fingerprinting"

Matthew Smart, G. Robert Malan, Farnam Jahanian, ... -- Usenix 2000

"Principles of Policy in Secure Groups"

Patrick McDaniel, ... -- NDSS 2001

"Kerberized Credential Translation: A Solution to Web Access Control"

Olga Kornievskaia, Peter Honeyman, Bill Doster, Kevin Coffman, ... -- Usenix 2001

"SC-CFS: Smartcard Secured Cryptographic File System"

Naomaru Itoi, ... -- Usenix 2001

"Secure Distribution of Events in Content-Based Publish Subscribe Systems"

Lukasz Opyrchal, Atul Prakash, ... -- Usenix 2001

"Defending Against Statistical Steganalysis"

Niels Provos, ... -- Usenix 2001

"Detecting Steganographic Content on the Internet"

Niels Provos, Peter Honeyman, ... -- NDSS 2002

"Methods and Limitations of Security Policy Reconciliation"

Atul Prakash, ... -- Oakland 2002

"Hop-count filtering: an effective defense against spoofed DDoS traffic"

Kang G. Shin, ... -- CCS 2003

"On the performance, feasibility, and use of forward-secure signatures"

Eric Cronin, Sugih Jamin, ... -- CCS 2003

"High Coverage Detection of Input-Related Security Faults"

Eric Larson, Todd Austin, ... -- Usenix 2003

"Preventing Privilege Escalation"

Niels Provos, Peter Honeyman, ... -- Usenix 2003

"Improving Host Security with System Call Policies"

Niels Provos, ... -- Usenix 2003

"Web Tap: Detecting Covert Web Traffic"

Kevin Borders, Atul Prakash, ... -- CCS 2004

"The Internet Motion Sensor - A Distributed Blackhole Monitoring System"

Michael Bailey, Evan Cooke, Farnam Jahanian, David Watson, ... -- NDSS 2005

"Enriching Intrusion Alerts Through Multi-Host Causality"

Samuel T. King, Zhuoqing Morley Mao, Dominic G. Lucchetti, Peter M. Chen, ... -- NDSS 2005

"CPOL: High-Performance Policy Evaluation"

Kevin Borders, Xin Zhao, Atul Prakash, ... -- CCS 2005

"Siren: Detecting Evasive Malware (Short Paper)"

Kevin Borders, Xin Zhao, Atul Prakash, ... -- Oakland 2006

"SubVirt: Implementing malware with virtual machines"

Samuel T. King, Peter M. Chen, ... -- Oakland 2006

"Low-Rate TCP-Targeted DoS Attack Disrupts Internet Routing"

Ying Zhang, Zhuoqing Morley Mao, ... -- NDSS 2007

"Shedding Light on the Configuration of Dark Addresses"

Sushant Sinha, Michael Bailey, Farnam Jahanian, ... -- NDSS 2007

"Accurate Real-time Identification of IP Prefix Hijacking"

Xin Hu, Zhuoqing Morley Mao, ... -- Oakland 2007

"CloudAV: N-Version Antivirus in the Network Cloud"

Evan Cooke, Farnam Jahanian, Jon Oberheide, ... -- Usenix 2008

"RB-Seeker: Auto-detection of Redirection Botnets"

Xin Hu, Matthew Knysz, Kang G. Shin, ... -- NDSS 2009

"Quantifying Information Leaks in Outbound Web Traffic"

Atul Prakash, ... -- Oakland 2009

"Large-scale malware indexing using function-call graphs"

Xin Hu, Kang G. Shin, ... -- CCS 2009

"Dispatcher: enabling active botnet infiltration using automatic protocol reverse-engineering"

Xin Hu, Kang G. Shin, ... -- CCS 2009

"Protecting Confidential Data on Personal Computers with Storage Capsules"

Kevin Borders, Atul Prakash, Eric Vander Weele, Billy Lau, ... -- Usenix 2009

"Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs"

Scott Wolchok, J. Alex Halderman, ... -- NDSS 2010

"On Network-level Clusters for Spam Detection"

Zhiyun Qian, Zhuoqing Morley Mao, ... -- NDSS 2010

"Improving Spam Blacklisting Through Dynamic Thresholding and Speculative Aggregation"

Sushant Sinha, Michael Bailey, Farnam Jahanian, ... -- NDSS 2010

"On the Safety of Enterprise Policy Deployment"

Yudong Gao, Ni Pan, Xu Chen, Zhuoqing Morley Mao, ... -- NDSS 2010

"Investigation of Triangular Spamming: a Stealthy and Efficient Spamming Technique"

Zhiyun Qian, Zhuoqing Morley Mao, ... -- Oakland 2010

"Security analysis of India's electronic voting machines"

Scott Wolchok, Eric Wustrow, J. Alex Halderman, ... -- CCS 2010

"On Measuring the Similarity of Network Hosts: Pitfalls, New Metrics, and Empirical Analyses"

Michael Bailey, ... -- NDSS 2011

"Telex: Anticensorship in the Network Infrastructure"

Eric Wustrow, Scott Wolchok, J. Alex Halderman, ... -- Usenix 2011

"You Can Run, but You Can't Hide: Exposing Network Location for Targeted DoS Attacks in Cellular Networks"

Zhiyun Qian, Zhaoguang Wang, Qiang Xu, Zhuoqing Morley Mao, ... -- NDSS 2012

"Off-Path TCP Sequence Number Inference Attack - How Firewall Middleboxes Reduce Security"

Zhiyun Qian, Zhuoqing Morley Mao, ... -- Oakland 2012

"Innocent by Association: Early Recognition of Legitimate Users"

Junxian Huang, Zhuoqing Morley Mao, ... -- CCS 2012

"Collaborative TCP Sequence Number Inference Attack"

Zhiyun Qian, Zhuoqing Morley Mao, ... -- CCS 2012

"Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices"

Zakir Durumeric, Eric Wustrow, J. Alex Halderman, ... -- Usenix 2012

"Clear and Present Data: Opaque Traffic and its Security Implications for the Future"

Michael Bailey, ... -- NDSS 2013

"Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors"

Denis Foo Kune, Kevin Fu, ... -- Oakland 2013

"ZMap: Fast Internet-wide Scanning and Its Security Applications"

Zakir Durumeric, Eric Wustrow, J. Alex Halderman, ... -- Usenix 2013

"On the Mismanagement and Maliciousness of Networks"

Jing Zhang, Zakir Durumeric, Michael Bailey, Mingyan Liu, ... -- NDSS 2014

"Gaining Control of Cellular Traffic Accounting by Spurious TCP Retransmission"

Denis Foo Kune, ... -- NDSS 2014

"SoK: Security and Privacy in Implantable Medical Devices and Body Area Networks"

Colleen Swanson, Denis Foo Kune, ... -- Oakland 2014

"Location Privacy Protection for Smartphone Users"

Kassem Fawaz, Kang G. Shin, ... -- CCS 2014

"Security Analysis of the Estonian Internet Voting System"

Drew Springall, Travis Finkenauer, Zakir Durumeric, Harri Hursti, Margaret MacAlpine, J. Alex Halderman, ... -- CCS 2014

"Verifying Curve25519 Software"

Chang-Hong Hsu, ... -- CCS 2014

"Vulnerability and Protection of Channel State Information in Multiuser MIMO Networks"

Yu-Chih Tung, Sihui Han, Dongyao Chen, Kang G. Shin, ... -- CCS 2014

"Peeking into Your App without Actually Seeing it: UI State Inference and Novel Android Attacks"

Qi Alfred Chen, Zhuoqing Morley Mao, ... -- Usenix 2014

"Security Analysis of a Full-Body Scanner"

Eric Wustrow, J. Alex Halderman, ... -- Usenix 2014

"An Internet-wide View of Internet-wide Scanning"

Zakir Durumeric, Michael Bailey, J. Alex Halderman, ... -- Usenix 2014

"TapDance: End-to-Middle Anticensorship without Flow Blocking"

Eric Wustrow, Colleen Swanson, J. Alex Halderman, ... -- Usenix 2014

"Static Detection of Packet Injection Vulnerabilities -- A Case for Identifying Attacker-controlled Implicit Information Leaks"

Qi Alfred Chen, Yunhan Jack Jia, Yuru Shao, Zhuoqing Morley Mao, ... -- CCS 2015

"A Search Engine Backed by Internet-Wide Scanning"

Zakir Durumeric, David Adrian, Ariana Mirian, J. Alex Halderman, ... -- CCS 2015

"Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice"

David Adrian, Zakir Durumeric, J. Alex Halderman, Drew Springall, Benjamin VanderSloot, Eric Wustrow, ... -- CCS 2015

"Anatomization and Protection of Mobile Apps' Location Privacy Threats"

Kassem Fawaz, Huan Feng, Kang G. Shin, ... -- Usenix 2015

"LinkDroid: Reducing Unregulated Aggregation of App Usage Behaviors"

Huan Feng, Kassem Fawaz, Kang G. Shin, ... -- Usenix 2015

"Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents"

Yang Liu, Armin Sarabi, Jing Zhang, Parinaz Naghizadeh Ardabili, Mingyan Liu, ... -- Usenix 2015

"Don't Forget to Lock the Back Door! A Characterization of IPv6 Network Security Policy"

Jakub Czyz, ... -- NDSS 2016

"Kratos: Discovering Inconsistent Security Policy Enforcement in the Android Framework"

Yuru Shao, Qi Alfred Chen, Z. Morley Mao, ... -- NDSS 2016

"A2: Analog Malicious Hardware"

Kaiyuan Yang, Matthew Hicks, Qing Dong, Todd Austin, Dennis Sylvester, ... -- Oakland 2016

"MitM Attack by Name Collision: Cause Analysis and Vulnerability Assessment in the New gTLD Era"

Qi Alfred Chen, Zhuoqing Morley Mao, ... -- Oakland 2016

"Security Analysis of Emerging Smart Home Applications"

Earlence Fernandes, Atul Prakash, ... -- Oakland 2016

"Users Really Do Plug in USB Drives They Find"

Zakir Durumeric, ... -- Oakland 2016

"The Misuse of Android Unix Domain Socket and Security Implications"

Yuru Shao, Yunhan Jack Jia, Zhuoqing Morley Mao, ... -- CCS 2016

"Error Handling of In-vehicle Networks Makes Them Vulnerable"

Kyong-Tak Cho, Kang G. Shin, ... -- CCS 2016

"Λ○λ: Functional Lattice Cryptography"

Eric Crockett, Chris Peikert, ... -- CCS 2016

"Protecting Privacy of BLE Device Users"

Kassem Fawaz, Kang G. Shin, ... -- Usenix 2016

"FlowFence: Practical Data Protection for Emerging IoT Application Frameworks"

Earlence Fernandes, Justin Paupore, Amir Rahmati, Atul Prakash, ... -- Usenix 2016

"Fingerprinting Electronic Control Units for Vehicle Intrusion Detection"

Kyong-Tak Cho, Kang G. Shin, ... -- Usenix 2016

"DROWN: Breaking TLS using SSLv2"

David Adrian, J. Alex Halderman, ... -- Usenix 2016

"You've Got Vulnerability: Exploring Effective Vulnerability Notifications"

Zakir Durumeric, Jakub Czyz, ... -- Usenix 2016

"Measuring small subgroup attacks against Diffie-Hellman"

David Adrian, J. Alex Halderman, ... -- NDSS 2017

"The Security Impact of HTTPS Interception"

Zakir Durumeric, Drew Springall, J. Alex Halderman, ... -- NDSS 2017

"Automated Analysis of Privacy Requirements for Mobile Apps"

Florian Shaub, ... -- NDSS 2017

"ContexloT: Towards Providing Contextual Integrity to Appified IoT Platforms"

Yunhan Jack Jia, Qi Alfred Chen, Amir Rahmati, Earlence Fernandes, Z. Morley Mao, Atul Prakash, ... -- NDSS 2017

"Client-side Name Collision Vulnerability in the New gTLD Era: A Systematic Study"

Qi Alfred Chen, Yulong Cao, Jie You, Z. Morley Mao, ... -- CCS 2017

"Viden: Attacker Identification on In-Vehicle Networks"

Kyong-Tak Cho, Kang G. Shin, ... -- CCS 2017

"Vale: Verifying High-Performance Cryptographic Assembly Code"

Manos Kapritsos, ... -- Usenix 2017

"Understanding the Mirai Botnet"

Matt Bernhard, Zakir Durumeric, J. Alex Halderman, ... -- Usenix 2017

"Ensuring Authorized Updates in Multi-user Database-Backed Applications"

Kevin Eykholt, Atul Prakash, Barzan Mozafari, ... -- Usenix 2017

"Decentralized Action Integrity for Trigger-Action IoT Platforms."

Atul Prakash, ... -- NDSS 2018

"Exposing Congestion Attack on Emerging Connected Vehicle based Traffic Signal Control."

Qi Alfred Chen, Yucheng Yin, Yiheng Feng, Z. Morley Mao, Henry X. Liu, ... -- NDSS 2018

"Blue Note: How Intentional Acoustic Interference Damages Availability and Integrity in Hard Disk Drives and Operating Systems"

Connor Bolton, Sara Rampazzi, Andrew Kwong, Kevin Fu, ... -- Oakland 2018

"Tracking Certificate Misissuance in the Wild"

Gabrielle Beck, David Adrian, Zakir Durumeric, J. Alex Halderman, ... -- Oakland 2018

"ALCHEMY: A Language and Compiler for Homomorphic Encryption Made easY"

Chris Peikert, Chad Sharp, ... -- CCS 2018

"Quack: Scalable Remote Measurement of Application-Layer Censorship"

Benjamin VanderSloot, Allison McDonald, Will Scott, J. Alex Halderman, Roya Ensafi, ... -- Usenix 2018

"Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning"

Florian Schaub, Kang G. Shin, ... -- Usenix 2018

"From Patching Delays to Infection Symptoms: Using Risk Profiles for an Early Discovery of Vulnerabilities Exploited in the Wild"

Chaowei Xiao, Armin Sarabi, Mingyan Liu, ... -- Usenix 2018

"Meltdown: Reading Kernel Memory from User Space"

Daniel Genkin, ... -- Usenix 2018

"Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution"

Ofir Weisse, Daniel Genkin, Baris Kasikci, Thomas F. Wenisch, ... -- Usenix 2018

"We Value Your Privacy ... Now Take Some Cookies: Measuring the GDPR's Impact on Web Privacy"

Florian Schaub, ... -- NDSS 2019

"Hard Drive of Hearing: Disks that Eavesdrop with a Synthesized Microphone"

Andrew Kwong, Kevin Fu, ... -- Oakland 2019

"Iodine: Fast Dynamic Taint Tracking Using Rollback-free Optimistic Hybrid Analysis"

Subarno Banerjee, Peter M. Chen, Satish Narayanasamy, ... -- Oakland 2019

"Synesthesia: Detecting Screen Content via Remote Acoustic Side Channels"

Daniel Genkin, ... -- Oakland 2019

"The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations"

Daniel Genkin, ... -- Oakland 2019

"Towards Automated Safety Vetting of PLC Code in Real-World Plants"

Yassine Qamsane, Yuru Shao, Yikai Lin, Kira Barton, James Moyne, Z. Morley Mao, ... -- Oakland 2019

"(Un)informed Consent: Studying GDPR Consent Notices in the Field"

Florian Schaub, ... -- CCS 2019

"Adversarial Sensor Attack on LiDAR-based Perception in Autonomous Driving"

Yulong Cao, Chaowei Xiao, Benjamin Cyr, Yimeng Zhou, Won Park, Sara Rampazzi, Kevin Fu, Z. Morley Mao, ... -- CCS 2019

"Conjure: Summoning Proxies from Unused Address Space"

J. Alex Halderman, J. Alex Halderman, ... -- CCS 2019

"Fallout: Leaking Data on Meltdown-resistant CPUs"

Daniel Genkin, Marina Minkin, ... -- CCS 2019

"Let's Encrypt: An Automated Certificate Authority to Encrypt the Entire Web"

J. Alex Halderman, James Kasten, ... -- CCS 2019

"LibreCAN: Automated CAN Message Translator"

Mert D. Pese, Troy Stacer, C. Andres Campos, Eric Newberry, Dongyao Chen, Kang G. Shin, ... -- CCS 2019

"Trick or Heat? Manipulating Critical Temperature-Based Control Systems using Rectification attacks"

Sara Rampazzi, Angel Rodriguez, Kevin Fu, ... -- CCS 2019

"Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features"

Chaowei Xiao, ... -- Usenix 2019

"Decentralized Control: A Case Study of Russia"

Reethika Ramesh, Ram Sundara Raman, Matthew Bernhard, Victor Ongkowijaya, Steven Sprecher, Roya Ensafi, ... -- NDSS 2020

"Measuring the Deployment of Network Censorship Filters at Global Scale"

Ram Sundara Raman, Adrian Stoll, Armin Sarabi, Reethika Ramesh, Roya Ensafi, ... -- NDSS 2020

"Can Voters Detect Malicious Manipulation of Ballot Marking Devices?"

Matthew Bernhard, Allison McDonald, Henry Meng, Jensen Hwa, Kevin Chang, J. Alex Halderman, ... -- Oakland 2020

"ICAS: An Extensible Framework for Estimating the Susceptibility of IC Layouts to Additive Trojans"

Timothy Trippel, Kang G. Shin, ... -- Oakland 2020

"LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection"

Marina Minkin, Daniel Genkin, ... -- Oakland 2020

"Pseudorandom Black Swans: Cache Attacks on CTR_DRBG"

Andrew Kwong, Daniel Genkin, ... -- Oakland 2020

"RAMBleed: Reading Bits in Memory Without Accessing Them"

Andrew Kwong, Daniel Genkin, ... -- Oakland 2020

"SoK: A Minimalist Approach to Formalizing Analog Sensor Security"

Connor Bolton, Kevin Fu, ... -- Oakland 2020

"Censored Planet: An Internet-wide, Longitudinal Censorship Observatory"

Ram Sundara Raman, Prerana Shenoy, Roya Ensafi, ... -- CCS 2020

"Towards Robust LiDAR-based Perception in Autonomous Driving: General Black-box Adversarial Sensor Attack and Countermeasures"

Jiachen Sun, Yulong Cao, Z. Morley Mao, ... -- Usenix 2020

"Security Analysis of Unified Payments Interface and Payment Apps in India"

Renuka Kumar, Hao Lu, Atul Prakash, ... -- Usenix 2020

"Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems"

Benjamin Cyr, Sara Rampazzi, Daniel Genkin, Kevin Fu, ... -- Usenix 2020

"Bomberman: Defining and Defeating Hardware Ticking Timebombs at Design-time"

Timothy Trippel, Kang G. Shin, ... -- Oakland 2021

"CacheOut: Leaking Data on Intel CPUs via Cache Evictions"

Stephan van Schaik, Marina Minkin, Andrew Kwong, Daniel Genkin, ... -- Oakland 2021

"Invisible for both Camera and LiDAR: Security of Multi-Sensor Fusion based Perception in Autonomous Driving Under Physical-World Attacks"

Yulong Cao, Dawei Yang, Mingyan Liu, ... -- Oakland 2021

"Poltergeist: Acoustic Adversarial Machine Learning against Cameras and Computer Vision"

Kevin Fu, ... -- Oakland 2021

"Consistency Analysis of Data-Usage Purposes in Mobile Apps"

Duc Bui, Yuan Yao, Kang G. Shin, ... -- CCS 2021

""It's stressful having all these phones": Investigating Sex Workers' Safety Goals, Risks, and Practices Online"

Allison McDonald, Florian Schaub, ... -- Usenix 2021

""Now I'm a bit angry:" Individuals' Awareness, Perception, and Responses to Data Breaches that Affected Them"

Yixin Zou, Florian Schaub, ... -- Usenix 2021

"The Role of Computer Security Customer Support in Helping Survivors of Intimate Partner Violence"

Yixin Zou, Allison McDonald, Florian Schaub, ... -- Usenix 2021

"DOLMA: Securing Speculation with the Principle of Transient Non-Observability"

Kevin Loughlin, Ian Neal, Jiacheng Ma, Elisa Tsai, Ofir Weisse, Satish Narayanasamy, Baris Kasikci, ... -- Usenix 2021

"T-Miner: A Generative Approach to Defend Against Trojan Attacks on DNN-based Text Classification"

Neal Mangaokar, ... -- Usenix 2021

"Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses"

Ayush Agarwal, Daniel Genkin, ... -- Usenix 2021

"Security Analysis of the Democracy Live Online Voting System"

J. Alex Halderman, ... -- Usenix 2021

"Automated Discovery of Denial-of-Service Vulnerabilities in Connected Vehicle Protocols"

Shengtuo Hu, Jiachen Sun, Yiheng Feng, Z. Morley Mao, Henry X. Liu, ... -- Usenix 2021

"VPNInspector: Systematic Investigation of the VPN Ecosystem"

Reethika Ramesh, Diwen Xue, Roya Ensafi, ... -- NDSS 2022

"SpecHammer: Combining Spectre and Rowhammer for New Speculative Attacks"

Youssef Tobah, Andrew Kwong, Ingab Kang, Kang G. Shin, ... -- Oakland 2022

"Spook.js: Attacking Chrome Strict Site Isolation via Speculative Execution"

Ayush Agarwal, ... -- Oakland 2022

"Do Opt-Outs Really Opt Me Out?"

Duc Bui, Brian Tang, Kang G. Shin, ... -- CCS 2022

"When Frodo Flips: End-to-End Key Recovery on FrodoKEM via Rowhammer"

Andrew Kwong, ... -- CCS 2022

"A Large-scale Investigation into Geodifferences in Mobile Apps"

Renuka Kumar, Apurva Virkud, Ram Sundara Raman, Atul Prakash, Roya Ensafi, ... -- Usenix 2022

"Security Analysis of Camera-LiDAR Fusion Against Black-Box Attacks on Autonomous Vehicles"

Yulong Cao, Z. Morley Mao, ... -- Usenix 2022

"OpenVPN is Open to VPN Fingerprinting"

Diwen Xue, Reethika Ramesh, Arham Jain, J. Alex Halderman, Roya Ensafi, ... -- Usenix 2022

"Fuzzing Hardware Like Software"

Timothy Trippel, Kang G. Shin, ... -- Usenix 2022

"The Antrim County 2020 Election Incident: An Independent Forensic Investigation"

J. Alex Halderman, ... -- Usenix 2022