National University of Singapore

General Info

Rank: #40 Worldwide
#4 outside of US and Europe
Papers: 68
Number of Researchers: 115
APA
(average papers per authors):
0.6
Country: SINGAPORE

Activity Map

Contributors

  • Prateek Saxena (28 papers)
  • Zhenkai Liang (15 papers)
  • Zheng Leong Chua (6 papers)
  • Abhik Roychoudhury (6 papers)
  • Shruti Tople (5 papers)
  • Teodora Baluta (5 papers)
  • Ee-Chien Chang (5 papers)
  • Haifeng Yu (5 papers)
  • Reza Shokri (5 papers)
  • Shweta Shinde (4 papers)
  • Shiqi Shen (4 papers)
  • Jun Zeng (4 papers)
  • Loi Luu (4 papers)
  • Soundarya Ramesh (3 papers)
  • Pengfei Wu (3 papers)
  • Muoi Tran (3 papers)
  • Xiaokui Xiao (3 papers)
  • Kaihang Ji (2 papers)
  • Jiamin Shen (2 papers)
  • Feng Xiao (2 papers)
  • Hong Hu (2 papers)
  • Min Suk Kang (2 papers)
  • Ruomu Hou (2 papers)
  • Duc-Hiep Chu (2 papers)
  • Aquinas Hobor (2 papers)
  • Yaoqi Jia (2 papers)
  • Van-Thuan Pham (2 papers)
  • Aashish Kolluri (2 papers)
  • Mun Choon Chan (2 papers)
  • Jun Han (2 papers)
  • Yun Lin (2 papers)
  • Ruofan Liu (2 papers)
  • Jin Song Dong (2 papers)
  • Mingwei Zhang (1 papers)
  • Xiaolei Li (1 papers)
  • Guangdong Bai (1 papers)
  • Guozhu Meng (1 papers)
  • Jike Lei (1 papers)
  • Sai Sathyanarayan Venkatraman (1 papers)
  • Jinsong Dong (1 papers)
  • Dat Le Tien (1 papers)
  • Gregory J. Duck (1 papers)
  • Roland H. C. Yap (1 papers)
  • Hongbin Wang (1 papers)
  • Hongbing Wang (1 papers)
  • Chenwei Shi (1 papers)
  • Adrian Sendroiu (1 papers)
  • Inho Choi (1 papers)
  • Ivica Nikolic (1 papers)
  • Xiang Wang (1 papers)
  • Jiahao Liu (1 papers)
  • Tat-Seng Chua (1 papers)
  • Mohan S. Kankanhalli (1 papers)
  • Wei Wang (1 papers)
  • Mehul Motani (1 papers)
  • Zhaofeng Chen (1 papers)
  • Xinshu Dong (1 papers)
  • Minh-Thai Trinh (1 papers)
  • Joxan Jaffar (1 papers)
  • Jason Teutsch (1 papers)
  • Raghav Kulkarni (1 papers)
  • Pratik Soni (1 papers)
  • Enrico Budianto (1 papers)
  • Viswesh Narayanan (1 papers)
  • Chaodong Zheng (1 papers)
  • Kunal Baweja (1 papers)
  • Seth Gilbert (1 papers)
  • Hong Huang (1 papers)
  • Marcel Boehme (1 papers)
  • Marcel Bohme (1 papers)
  • Manh-Dung Nguyen (1 papers)
  • Hung Dang (1 papers)
  • Huang Yue (1 papers)
  • Ziqi Yang (1 papers)
  • Jiyi Zhang (1 papers)
  • Jianting Ning (1 papers)
  • Geong Sen Poh (1 papers)
  • Jia-Chng Loh (1 papers)
  • Jason Chia (1 papers)
  • Kuldeep S. Meel (1 papers)
  • Jinhua Cui (1 papers)
  • Zhijingcheng Yu (1 papers)
  • Jianxin Wei (1 papers)
  • Ergute Bao (1 papers)
  • Jiayuan Ye (1 papers)
  • Aadyaa Maddi (1 papers)
  • Xinjian Luo (1 papers)
  • Yangfan Jiang (1 papers)
  • Bryan Hooi (1 papers)
  • S. Hitarth (1 papers)
  • Chuqi Zhang (1 papers)
  • Ghozali Suhariyanto Hadi (1 papers)
  • Sendroiu Adrian (1 papers)
  • Anh Dinh (1 papers)
  • Chang Ee-chien (1 papers)
  • Zhang Chunwang (1 papers)
  • Ooi Beng Chin (1 papers)
  • Jernej Kos (1 papers)
  • Shengyi Wang (1 papers)
  • Pinghai Yuan (1 papers)
  • Akshaye Shenoi (1 papers)
  • Rui Xiao (1 papers)
  • Jong Taek Lee (1 papers)
  • Harini Ramprasad (1 papers)
  • Ananda Kumar (1 papers)
  • Jun Yang Ng (1 papers)
  • Qing Zhou Chan (1 papers)
  • Nitya Lakshmanan (1 papers)
  • Nishant Budhdev (1 papers)
  • Jason Zhijingcheng Yu (1 papers)
  • Trevor E. Carlson (1 papers)
  • Xianglin Yang (1 papers)
  • Siang Hwee Ng (1 papers)
  • Jinsheng Ba (1 papers)
  • Yuancheng Jiang (1 papers)

Papers

"Print signatures for document authentication"

Mohan S. Kankanhalli, ... -- CCS 2003

"SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks"

Haifeng Yu, Feng Xiao, ... -- Oakland 2008

"Dependent Link Padding Algorithms for Low Latency Anonymity Systems"

Wei Wang, Mehul Motani, ... -- CCS 2008

"DSybil: Optimal Sybil-Resistance for Recommendation Systems"

Haifeng Yu, Feng Xiao, Chenwei Shi, ... -- Oakland 2009

"Identifying and Analyzing Pointer Misuses for Sophisticated Memory-corruption Exploit Diagnosis"

Mingwei Zhang, Xiaolei Li, Zhenkai Liang, ... -- NDSS 2012

"A Framework to Eliminate Backdoors from Response-Computable Authentication"

Zhenkai Liang, ... -- Oakland 2012

"DCast: Sustaining Collaboration in Overlay Multicast despite Rational Collusion"

Haifeng Yu, ... -- CCS 2012

"AuthScan: Automatic Extraction of Web Authentication Protocols From Implementations"

Guangdong Bai, Guozhu Meng, Jike Lei, Sai Sathyanarayan Venkatraman, Prateek Saxena, Jinsong Dong, ... -- NDSS 2013

"AUTOCRYPT: Enabling Homomorphic Computation On Servers To Protect Sensitive Web Content"

Shruti Tople, Shweta Shinde, Prateek Saxena, Zhaofeng Chen, ... -- CCS 2013

"Protecting Sensitive Web Content from Client-side Vulnerabilities with Cryptons"

Xinshu Dong, Shruti Tople, Prateek Saxena, Zhenkai Liang, ... -- CCS 2013

"AirBag: Boosting Smartphone Resistance to Malware Infection"

Zhenkai Liang, ... -- NDSS 2014

"S3: A Symbolic String Solver for Vulnerability Detection in Web Applications"

Minh-Thai Trinh, Duc-Hiep Chu, Joxan Jaffar, ... -- CCS 2014

"A Look at Targeted Attacks Through the Lense of an NGO"

Zheng Leong Chua, Prateek Saxena, ... -- Usenix 2014

"Demystifying Incentives In The Consensus Computer: How To Repurpose Cryptocurrencies for Outsourcing Computation"

Loi Luu, Jason Teutsch, Raghav Kulkarni, Prateek Saxena, ... -- CCS 2015

"The SICILIAN Defense: Signature-based Whitelisting of Web JavaScript"

Pratik Soni, Enrico Budianto, Prateek Saxena, ... -- CCS 2015

"Automatic Generation of Data-Oriented Exploits"

Hong Hu, Zheng Leong Chua, Sendroiu Adrian, Prateek Saxena, Zhenkai Liang, ... -- Usenix 2015

"M2R: Enabling Stronger Privacy in MapReduce Computation"

Anh Dinh, Prateek Saxena, Chang Ee-chien, Zhang Chunwang, Ooi Beng Chin, ... -- Usenix 2015

"Data-Oriented Programming: On the Expressiveness of Non-Control Data Attacks"

Hong Hu, Shweta Shinde, Adrian Sendroiu, Zheng Leong Chua, Prateek Saxena, Zhenkai Liang, ... -- Oakland 2016

"Making Smart Contracts Smarter"

Loi Luu, Duc-Hiep Chu, Prateek Saxena, Aquinas Hobor, ... -- CCS 2016

"A Secure Sharding Protocol For Open Blockchains"

Loi Luu, Viswesh Narayanan, Chaodong Zheng, Kunal Baweja, Seth Gilbert, Prateek Saxena, ... -- CCS 2016

"The Web/Local Boundary Is Fuzzy - A Security Study of Chrome's Process-based Sandboxing"

Yaoqi Jia, Zheng Leong Chua, Hong Huang, Prateek Saxena, Zhenkai Liang, ... -- CCS 2016

"Coverage-based Greybox Fuzzing as Markov Chain"

Marcel Boehme, Van-Thuan Pham, Abhik Roychoudhury, ... -- CCS 2016

"OblivP2P: An Oblivious Peer-to-Peer Content Sharing System"

Yaoqi Jia, Shruti Tople, Prateek Saxena, ... -- Usenix 2016

"Panoply: Low-TCB Linux Applications With SGX Enclaves"

Shweta Shinde, Dat Le Tien, Shruti Tople, Prateek Saxena, ... -- NDSS 2017

"Stack Object Protection with Low Fat Pointers"

Gregory J. Duck, Roland H. C. Yap, ... -- NDSS 2017

"Directed Greybox Fuzzing"

Marcel Bohme, Van-Thuan Pham, Manh-Dung Nguyen, Abhik Roychoudhury, ... -- CCS 2017

"Evading Classifiers by Morphing in the Dark"

Hung Dang, Huang Yue, Ee-Chien Chang, ... -- CCS 2017

"Neural Nets Can Learn Function Type Signatures From Binaries"

Zheng Leong Chua, Shiqi Shen, Prateek Saxena, Zhenkai Liang, ... -- Usenix 2017

"SmartPool: Practical Decentralized Pooled Mining"

Loi Luu, Prateek Saxena, ... -- Usenix 2017

"Machine Learning with Membership Privacy"

Reza Shokri, ... -- CCS 2018

"One Engine To Serve'em All: Inferring Taint Rules Without Architectural Semantics"

Zheng Leong Chua, Teodora Baluta, Prateek Saxena, Zhenkai Liang, ... -- NDSS 2019

"Neuro-Symbolic Execution: Augmenting Symbolic Execution with Neural Constraints"

Shiqi Shen, Shweta Shinde, Soundarya Ramesh, Prateek Saxena, Abhik Roychoudhury, ... -- NDSS 2019

"Comprehensive Privacy Analysis of Deep Learning"

Reza Shokri, Reza Shokri, ... -- Oakland 2019

"On the Feasibility of Rerouting-Based DDoS Defenses"

Muoi Tran, Min Suk Kang, ... -- Oakland 2019

"Analyzing Subgraph Statistics from Extended Local Views with Decentralized Differential Privacy"

Xiaokui Xiao, ... -- CCS 2019

"Neural Network Inversion in Adversarial Setting via Background Knowledge Alignment"

Ziqi Yang, Jiyi Zhang, Ee-Chien Chang, Zhenkai Liang, ... -- CCS 2019

"Privacy Risks of Securing Machine Learning Models against Adversarial Examples"

Reza Shokri, Reza Shokri, ... -- CCS 2019

"PrivDPI: Privacy-Preserving Encrypted Traffic Inspection with Reusable Obfuscated Rules"

Jianting Ning, Geong Sen Poh, Jia-Chng Loh, Jason Chia, Ee-Chien Chang, ... -- CCS 2019

"Quantitative Verification of Neural Networks and Its Security Applications"

Teodora Baluta, Shiqi Shen, Kuldeep S. Meel, Prateek Saxena, ... -- CCS 2019

"The Secret Sharer: Evaluating and Testing Unintended Memorization in Neural Networks"

Jernej Kos, ... -- Usenix 2019

"A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network"

Muoi Tran, Inho Choi, Min Suk Kang, ... -- Oakland 2020

"OHIE: Blockchain Scaling Made Simple"

Haifeng Yu, Ivica Nikolic, Ruomu Hou, Prateek Saxena, ... -- Oakland 2020

"BesFS: A POSIX Filesystem for Enclaves with a Mechanized Safety Proof"

Shengyi Wang, Pinghai Yuan, Aquinas Hobor, Abhik Roychoudhury, Prateek Saxena, ... -- Usenix 2020

"WATSON: Abstracting Behaviors from Audit Logs via Aggregation of Contextual Semantics"

Jun Zeng, Kaihang Ji, Zhenkai Liang, ... -- NDSS 2021

"SmashEx: Smashing SGX Enclaves Using Exceptions"

Jinhua Cui, Zhijingcheng Yu, Prateek Saxena, ... -- CCS 2021

"Private Hierarchical Clustering in Federated Networks"

Aashish Kolluri, Teodora Baluta, Prateek Saxena, ... -- CCS 2021

"On the Routing-Aware Peering against Network-Eclipse Attacks in Bitcoin"

Muoi Tran, Akshaye Shenoi, ... -- Usenix 2021

"Acoustics to the Rescue: Physical Key Inference Attack Revisited"

Soundarya Ramesh, Rui Xiao, Jong Taek Lee, Harini Ramprasad, Ananda Kumar, Jun Han, ... -- Usenix 2021

"Phishpedia: A Hybrid Deep Learning Based Approach to Visually Identify Phishing Webpages"

Yun Lin, Ruofan Liu, Jun Yang Ng, Qing Zhou Chan, Jin Song Dong, ... -- Usenix 2021

"A Stealthy Location Identification Attack Exploiting Carrier Aggregation in Cellular Networks"

Nitya Lakshmanan, Nishant Budhdev, Mun Choon Chan, Jun Han, ... -- Usenix 2021

"To Trust or Not to Trust: Hybrid Multi-party Computation with Trusted Execution Environment"

Pengfei Wu, Ee-Chien Chang, Hongbin Wang, Jiamin Shen, ... -- NDSS 2022

"Hybrid Trust Multi-party Computation with Trusted Execution Environment"

Pengfei Wu, Jiamin Shen, Hongbing Wang, Ee-Chien Chang, ... -- NDSS 2022

"ScriptChecker: To Tame Third-party Script Execution With Task Capabilities"

Pengfei Wu, ... -- NDSS 2022

"ShadeWatcher: Recommendation-guided Cyber Threat Analysis using System Audit Records"

Jun Zeng, Xiang Wang, Jiahao Liu, Zhenkai Liang, Tat-Seng Chua, ... -- Oakland 2022

"Using Throughput-Centric Byzantine Broadcast to Tolerate Malicious Majority in Blockchains"

Ruomu Hou, Haifeng Yu, Prateek Saxena, ... -- Oakland 2022

"DPIS: an Enhanced Mechanism for Differentially Private SGD with Importance Sampling"

Jianxin Wei, Ergute Bao, Xiaokui Xiao, ... -- CCS 2022

"Enhanced Membership Inference Attacks against Machine Learning Models"

Jiayuan Ye, Aadyaa Maddi, Reza Shokri, ... -- CCS 2022

"Feature Inference Attack on Shapley Values"

Xinjian Luo, Yangfan Jiang, Xiaokui Xiao, ... -- CCS 2022

"LPGNet: Link Private Graph Networks for Node Classification"

Aashish Kolluri, Teodora Baluta, Bryan Hooi, Prateek Saxena, ... -- CCS 2022

"Membership Inference Attacks and Generalization: A Causal Perspective"

Teodora Baluta, Shiqi Shen, S. Hitarth, Shruti Tople, Prateek Saxena, ... -- CCS 2022

"PalanTír: Optimizing Attack Provenance with Hardware-enhanced System Observability"

Jun Zeng, Chuqi Zhang, Zhenkai Liang, ... -- CCS 2022

"TickTock: Detecting Microphone Status in Laptops Leveraging Electromagnetic Leakage of Clock Signals"

Soundarya Ramesh, Ghozali Suhariyanto Hadi, Mun Choon Chan, ... -- CCS 2022

"Truth Serum: Poisoning Machine Learning Models to Reveal Their Secrets"

Reza Shokri, ... -- CCS 2022

"Elasticlave: An Efficient Memory Model for Enclaves"

Jason Zhijingcheng Yu, Trevor E. Carlson, Prateek Saxena, ... -- Usenix 2022

"Inferring Phishing Intention via Webpage Appearance and Dynamics: A Deep Vision Based Approach"

Ruofan Liu, Yun Lin, Xianglin Yang, Siang Hwee Ng, Jin Song Dong, ... -- Usenix 2022

"FreeWill: Automatically Diagnosing Use-after-free Bugs via Reference Miscounting Detection on Binaries"

Zhenkai Liang, ... -- Usenix 2022

"Stateful Greybox Fuzzing"

Jinsheng Ba, Abhik Roychoudhury, ... -- Usenix 2022

"FlowMatrix: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation"

Kaihang Ji, Jun Zeng, Yuancheng Jiang, Zhenkai Liang, Prateek Saxena, Abhik Roychoudhury, ... -- Usenix 2022