University of Virginia

General Info

Rank: #49 Worldwide
#34 in US
Papers: 61
Number of Researchers: 59
APA
(average papers per authors):
1.0
Country: USA

Activity Map

Contributors

  • David Evans (21 papers)
  • Yuan Tian (9 papers)
  • Yonghwi Kwon (8 papers)
  • Abhi Shelat (8 papers)
  • Anh Nguyen-Tuong (5 papers)
  • Yan Huang (4 papers)
  • Jack W. Davidson (4 papers)
  • Ali Ahad (3 papers)
  • Jason D. Hiser (3 papers)
  • Samee Zahur (3 papers)
  • Yuchen Zhou (3 papers)
  • Tianhao Wang (3 papers)
  • Weilin Xu (2 papers)
  • Yanjun Qi (2 papers)
  • Kevin Leach (2 papers)
  • Jack Doerner (2 papers)
  • Fnu Suya (2 papers)
  • David J. Wu (2 papers)
  • Chijung Jung (2 papers)
  • Chih-Hao Shen (2 papers)
  • Bargav Jayaraman (2 papers)
  • Marty Humphrey (1 papers)
  • Frederick Knabe (1 papers)
  • Adam Ferrari (1 papers)
  • Andrew Grimshaw (1 papers)
  • Lingxuan Hu (1 papers)
  • Faysal Hossain Shezan (1 papers)
  • Kaiming Cheng (1 papers)
  • Michele Co (1 papers)
  • Matthew Hall (1 papers)
  • Sijun Tan (1 papers)
  • Mohammad Mahmoody (1 papers)
  • Peter Chapman (1 papers)
  • Abbas Naderi-Afooshteh (1 papers)
  • Hang Su (1 papers)
  • Meng Wang (1 papers)
  • Jason Hiser (1 papers)
  • Jack Davidson (1 papers)
  • David Larochelle (1 papers)
  • Ana Nora Sovarel (1 papers)
  • Nathanael Paul (1 papers)
  • Benjamin Cox (1 papers)
  • Adrian Filipi (1 papers)
  • Jonathan Rowanhill (1 papers)
  • Wei Hu (1 papers)
  • John C. Knight (1 papers)
  • Karsten Nohl (1 papers)
  • Pieter Hooimeijer (1 papers)
  • Benjamin Kreuter (1 papers)
  • Ben Kreuter (1 papers)
  • Baishakhi Ray (1 papers)
  • Jianfeng Chi (1 papers)
  • Xida Ren (1 papers)
  • Ashish Venkat (1 papers)
  • Matthew Pillari (1 papers)
  • Arjun Deopujari (1 papers)
  • Liam Brennan (1 papers)
  • Hafsah Shamsie (1 papers)
  • Yixin Sun (1 papers)

Papers

"Accountability and Control of Process Creation in Metasystems"

Marty Humphrey, Frederick Knabe, Adam Ferrari, Andrew Grimshaw, ... -- NDSS 2000

"Statically Detecting Likely Buffer Overflow Vulnerabilities"

David Larochelle, David Evans, ... -- Usenix 2001

"Using Directional Antennas to Prevent Wormhole Attacks"

Lingxuan Hu, David Evans, ... -- NDSS 2004

"Where's the FEEB? The Effectiveness of Instruction Set Randomization"

Ana Nora Sovarel, David Evans, Nathanael Paul, ... -- Usenix 2005

"N-Variant Systems: A Secretless Framework for Security through Diversity"

Benjamin Cox, David Evans, Adrian Filipi, Jonathan Rowanhill, Wei Hu, Jack W. Davidson, John C. Knight, Anh Nguyen-Tuong, Jason D. Hiser, ... -- Usenix 2006

"Reverse-Engineering a Cryptographic RFID Tag"

David Evans, Karsten Nohl, ... -- Usenix 2008

"Efficient Privacy-Preserving Biometric Identification"

Yan Huang, David Evans, ... -- NDSS 2011

"Automated Black-box Detection of Side-Channel Vulnerabilities in Web Applications"

Peter Chapman, David Evans, ... -- CCS 2011

"Fast and Precise Sanitizer Analysis with BEK"

Pieter Hooimeijer, ... -- Usenix 2011

"Faster Secure Two-Party Computation Using Garbled Circuits"

Yan Huang, David Evans, ... -- Usenix 2011

"Private Set Intersection: Are Garbled Circuits Better than Custom Protocols?"

Yan Huang, David Evans, ... -- NDSS 2012

"Quid-Pro-Quo-tocols: Strengthening Semi-Honest Protocols with Dual Execution"

Yan Huang, David Evans, ... -- Oakland 2012

"ILR: Where'd My Gadgets Go?"

Jason D. Hiser, Anh Nguyen-Tuong, Michele Co, Matthew Hall, Jack W. Davidson, ... -- Oakland 2012

"Billion-Gate Secure Computation with Malicious Adversaries"

Benjamin Kreuter, Abhi Shelat, Chih-Hao Shen, ... -- Usenix 2012

"Circuit Structures for Improving Efficiency of Security and Privacy Tools"

Samee Zahur, David Evans, ... -- Oakland 2013

"Fast Two-Party Secure Computation with Minimal Assumptions"

Abhi Shelat, Chih-Hao Shen, ... -- CCS 2013

"PCF: A Portable Circuit Format for Scalable Two-Party Secure Computation"

Ben Kreuter, Abhi Shelat, ... -- Usenix 2013

"Explicating SDKs: Uncovering Assumptions Underlying Secure Authentication and Authorization"

Yuchen Zhou, David Evans, ... -- Usenix 2013

"SCORAM: Oblivious RAM for Secure Computation"

Abhi Shelat, ... -- CCS 2014

"Automated Testing of Web Applications for Single Sign-On Vulnerabilities"

Yuchen Zhou, David Evans, ... -- Usenix 2014

"Geppetto: Versatile Verifiable Computation"

Samee Zahur, ... -- Oakland 2015

"Understanding and Monitoring Embedded Web Scripts"

Yuchen Zhou, David Evans, ... -- Oakland 2015

"Using Hardware Features for Increased Debugging Transparency"

Kevin Leach, ... -- Oakland 2015

"Micropayments for Decentralized Currencies"

Abhi Shelat, ... -- CCS 2015

"Automatically Evading Classifiers: A Case Study on PDF Malware Classifiers"

Weilin Xu, Yanjun Qi, David Evans, ... -- NDSS 2016

"LO-PHI: Low-Observable Physical Host Instrumentation for Malware Analysis"

Kevin Leach, ... -- NDSS 2016

"Revisiting Square-Root ORAM: Efficient Random Access in Multi-Party Computation"

Samee Zahur, Jack Doerner, David Evans, ... -- Oakland 2016

"Verifiable ASICs"

Abhi Shelat, ... -- Oakland 2016

"Secure Stable Matching at Scale"

Jack Doerner, David Evans, Abhi Shelat, ... -- CCS 2016

"Automatically Detecting Error Handling Bugs using Error Specifications"

Baishakhi Ray, ... -- Usenix 2016

"The Cut-and-Choose Game and its Application to Cryptographic Protocols"

Abhi Shelat, ... -- Usenix 2016

"Feature Squeezing: Detecting Adversarial Examples in Deep Neural Networks."

Weilin Xu, David Evans, Yanjun Qi, ... -- NDSS 2018

"Dangerous Skills: Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems"

Yuan Tian, ... -- Oakland 2019

"Demystifying Hidden Privacy Settings in Mobile Apps"

Fnu Suya, Yuan Tian, ... -- Oakland 2019

"MalMax: Multi-Aspect Execution for Automated Dynamic Web Server Malware Analysis"

Abbas Naderi-Afooshteh, Yonghwi Kwon, Jack W. Davidson, Anh Nguyen-Tuong, ... -- CCS 2019

"Birthday, Name and Bifacial-security: Understanding Passwords of Chinese Web Users"

Yuan Tian, ... -- Usenix 2019

"Evaluating Differentially Private Machine Learning in Practice"

Bargav Jayaraman, David Evans, ... -- Usenix 2019

"TKPERM: Cross-platform Permission Knowledge Transfer to Detect Overprivileged Third-party Applications"

Faysal Hossain Shezan, Kaiming Cheng, Yuan Tian, ... -- NDSS 2020

"PMP: Cost-effective Forced Execution with Probabilistic Memory Pre-planning"

Yonghwi Kwon, ... -- Oakland 2020

"TARDIS: Rolling Back The Clock On CMS-Targeting Cyber Attacks"

Yonghwi Kwon, ... -- Oakland 2020

"Hybrid Batch Attacks: Finding Black-box Adversarial Examples with Limited Queries"

Fnu Suya, Jianfeng Chi, David Evans, Yuan Tian, ... -- Usenix 2020

"iOS, Your OS, Everybody's OS: Vetting and Analyzing Network Services of iOS Applications"

Yuan Tian, ... -- Usenix 2020

"C$^2$SR: Cybercrime Scene Reconstruction for Post-mortem Forensic Analysis"

Yonghwi Kwon, ... -- NDSS 2021

"CryptGPU: Fast Privacy-Preserving Machine Learning on the GPU"

Sijun Tan, Yuan Tian, David J. Wu, ... -- Oakland 2021

"Is Private Learning Possible with Instance Encoding?"

Mohammad Mahmoody, ... -- Oakland 2021

"OSPREY: Recovery of Variable and Data Structure via Probabilistic Analysis for Stripped Binary"

Yonghwi Kwon, ... -- Oakland 2021

"Shorter and Faster Post-Quantum zkSNARKs from Lattices"

Hang Su, David J. Wu, ... -- CCS 2021

"Spinner: Automated Dynamic Command Subsystem Perturbation"

Meng Wang, Chijung Jung, Ali Ahad, Yonghwi Kwon, ... -- CCS 2021

"Same Coverage, Less Bloat: Accelerating Binary-only Fuzzing with Coverage-preserving Coverage-guided Tracing"

Anh Nguyen-Tuong, Jason Hiser, Jack Davidson, ... -- CCS 2021

"Breaking Through Binaries: Compiler-quality Instrumentation for Better Binary-only Fuzzing"

Anh Nguyen-Tuong, Jason D. Hiser, Jack W. Davidson, ... -- Usenix 2021

"MPInspector: A Systematic and Automatic Approach for Evaluating the Security of IoT Messaging Protocols"

Yuan Tian, ... -- Usenix 2021

"Forensic Analysis of Configuration-based Attacks"

Ali Ahad, ... -- NDSS 2022

"Locally Differentially Private Sparse Vector Aggregation"

Tianhao Wang, ... -- Oakland 2022

"SwarmFlawFinder: Discovering and Exploiting Logic Flaws of Swarm Algorithms"

Chijung Jung, Ali Ahad, Yonghwi Kwon, ... -- Oakland 2022

"Are Attribute Inference Attacks Just Imputation?"

Bargav Jayaraman, David Evans, ... -- CCS 2022

"DriveFuzz: Discovering Autonomous Driving Bugs through Driving Quality-Guided Fuzzing"

Yonghwi Kwon, ... -- CCS 2022

"Federated Boosted Decision Trees with Differential Privacy"

Tianhao Wang, ... -- CCS 2022

"Graph Unlearning"

Tianhao Wang, ... -- CCS 2022

"SecSMT: Securing SMT Processors against Contention-Based Covert Channels"

Xida Ren, Ashish Venkat, ... -- Usenix 2022

"Your Microphone Array Retains Your Identity: A Robust Voice Liveness Detection System for Smart Speakers"

Matthew Pillari, Arjun Deopujari, Liam Brennan, Hafsah Shamsie, Yuan Tian, ... -- Usenix 2022

"Creating a Secure Underlay for the Internet"

Yixin Sun, ... -- Usenix 2022