University of Waterloo

General Info

Rank: #43 Worldwide
#5 outside of US and Europe
Papers: 67
Number of Researchers: 61
APA
(average papers per authors):
1.1
Country: CANADA

Activity Map

Contributors

  • Ian Goldberg (26 papers)
  • Florian Kerschbaum (11 papers)
  • Yousra Aafer (7 papers)
  • Mahesh V. Tripunitara (5 papers)
  • Sergey Gorbunov (5 papers)
  • Ryan Henry (4 papers)
  • Simon Oya (3 papers)
  • Kevin Bauer (2 papers)
  • Sajin Sasy (2 papers)
  • Nik Unger (2 papers)
  • Yuyan Bao (2 papers)
  • Femi Olumofin (2 papers)
  • Tao Wang (2 papers)
  • Douglas Stebila (2 papers)
  • Zeinab El-Rewini (2 papers)
  • Rasoul Akhavan Mahdavi (2 papers)
  • Yizhou Huang (1 papers)
  • Mohamed El Massad (1 papers)
  • Stefanie Roos (1 papers)
  • Zhiwei Shang (1 papers)
  • Georgios Vlachos (1 papers)
  • Nils Lukas (1 papers)
  • Edward Jiang (1 papers)
  • Xinda Li (1 papers)
  • Can Tang (1 papers)
  • Mashael Al-Sabah (1 papers)
  • Hooman Mohajeri Moghaddam (1 papers)
  • Baiyu Li (1 papers)
  • Mohammad Derakhshani (1 papers)
  • Tariq Elahi (1 papers)
  • Mark Dittmer (1 papers)
  • Werner Dietl (1 papers)
  • Cecylia Bocovich (1 papers)
  • Dhinakaran Vinayagamurthy (1 papers)
  • Nahid Juma (1 papers)
  • Xiaowei Huang (1 papers)
  • Philip Hodges (1 papers)
  • Thomas Humphries (1 papers)
  • Shannon Veitch (1 papers)
  • Michael Brown (1 papers)
  • Donny Cheung (1 papers)
  • Michael Kirkup (1 papers)
  • Alfred Menezes (1 papers)
  • Bryce Zimny (1 papers)
  • David Chaum (1 papers)
  • Jeremy Clark (1 papers)
  • Aleksander Essex (1 papers)
  • Casey Devet (1 papers)
  • Frank Imeson (1 papers)
  • Ariq Emtenan (1 papers)
  • Siddharth Garg (1 papers)
  • Leah Zhang-Kennedy (1 papers)
  • Jiayi Chen (1 papers)
  • Urs Hengartner (1 papers)
  • Chelsea H. Komlo (1 papers)
  • Hans Liljestrand (1 papers)
  • N. Asokan (1 papers)
  • Justin Tracey (1 papers)
  • Bailey Kacsmar (1 papers)
  • Kyle Tilbury (1 papers)
  • Miti Mazmudar (1 papers)

Papers

"PGP in Constrained Wireless Devices"

Michael Brown, Donny Cheung, Michael Kirkup, Alfred Menezes, ... -- Usenix 2000

"Improving the Robustness of Private Information Retrieval"

Ian Goldberg, ... -- Oakland 2007

"Web-Based Inference Detection"

Bryce Zimny, ... -- Usenix 2007

"Sphinx: A Compact and Provably Secure Mix Format"

Ian Goldberg, ... -- Oakland 2009

"Multi-party off-the-record messaging"

Ian Goldberg, ... -- CCS 2009

"Improving Tor using a TCP-over-DTLS Tunnel"

Ian Goldberg, ... -- Usenix 2009

"An improved algorithm for tor circuit scheduling"

Can Tang, Ian Goldberg, ... -- CCS 2010

"Scantegrity II Municipal Election at Takoma Park: The First E2E Binding Governmental Election with Ballot Privacy"

David Chaum, Jeremy Clark, Aleksander Essex, ... -- Usenix 2010

"Formalizing Anonymous Blacklisting Systems"

Ryan Henry, Ian Goldberg, ... -- Oakland 2011

"Extending Nymble-like Systems"

Ryan Henry, Ian Goldberg, ... -- Oakland 2011

"Automatic Error Finding in Access-Control Policies"

Mahesh V. Tripunitara, ... -- CCS 2011

"Practical PIR for Electronic Commerce"

Ryan Henry, Femi Olumofin, Ian Goldberg, ... -- CCS 2011

"Telex: Anticensorship in the Network Infrastructure"

Ian Goldberg, ... -- Usenix 2011

"PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval"

Femi Olumofin, Ian Goldberg, ... -- Usenix 2011

"Enhancing Tor's Performance using Real-time Traffic Classification"

Mashael Al-Sabah, Kevin Bauer, Ian Goldberg, ... -- CCS 2012

"SkypeMorph: Protocol Obfuscation for Tor Bridges"

Hooman Mohajeri Moghaddam, Baiyu Li, Mohammad Derakhshani, Ian Goldberg, ... -- CCS 2012

"Optimally Robust Private Information Retrieval"

Casey Devet, Ian Goldberg, ... -- Usenix 2012

"One (Block) Size Fits All: PIR and SPIR Over Arbitrary-Length Records via Multi-block PIR Queries"

Ryan Henry, Yizhou Huang, Ian Goldberg, ... -- NDSS 2013

"An Empirical Evaluation of Relay Selection in Tor"

Kevin Bauer, ... -- NDSS 2013

"PCTCP: Per-Circuit TCP-over-IPsec Transport for Anonymous Communication Overlay Networks"

Ian Goldberg, ... -- CCS 2013

"Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation"

Frank Imeson, Ariq Emtenan, Siddharth Garg, Mahesh V. Tripunitara, ... -- Usenix 2013

"PrivEx: Private Collection of Traffic Statistics for Anonymous Communication Networks"

Tariq Elahi, Ian Goldberg, ... -- CCS 2014

"A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses"

Tao Wang, Ian Goldberg, ... -- CCS 2014

"The UNIX Process Identity Crisis: A Standards-Driven Approach to Setuid"

Mark Dittmer, Mahesh V. Tripunitara, ... -- CCS 2014

"Collaborative verification of information flow for a high-assurance app store"

Werner Dietl, ... -- CCS 2014

"Effective Attacks and Provable Defenses for Website Fingerprinting"

Tao Wang, Ian Goldberg, ... -- Usenix 2014

"Integrated Circuit (IC) Decamouflaging: Reverse Engineering Camouflaged ICs within Minutes (Not Years)"

Mohamed El Massad, Mahesh V. Tripunitara, ... -- NDSS 2015

"SoK: Secure Messaging"

Nik Unger, Ian Goldberg, ... -- Oakland 2015

"Deniable Key Exchanges for Secure Messaging"

Nik Unger, Ian Goldberg, ... -- CCS 2015

"Slitheen: Perfectly imitated decoy routing through traffic replacement"

Cecylia Bocovich, Ian Goldberg, ... -- CCS 2016

"Iron: Functional Encryption using Intel SGX"

Dhinakaran Vinayagamurthy, Sergey Gorbunov, ... -- CCS 2017

"Walkie-Talkie: An Efficient Defense Against Passive Website Fingerprinting Attacks"

Ian Goldberg, ... -- Usenix 2017

"ZeroTrace : Oblivious Memory Primitives from Intel SGX."

Sajin Sasy, Sergey Gorbunov, ... -- NDSS 2018

"Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions."

Stefanie Roos, Ian Goldberg, ... -- NDSS 2018

"The aftermath of a crypto-ransomware attack at a large academic institution"

Leah Zhang-Kennedy, ... -- Usenix 2018

"Secure Sublinear Time Differentially Private Median Computation"

Florian Kerschbaum, ... -- NDSS 2020

"Pointproofs: Aggregating Proofs for Multiple Vector Commitments"

Sergey Gorbunov, ... -- CCS 2020

"Cyber-Physical Inconsistency Vulnerability Identification for Safety Checks in Robotic Vehicles"

Yousra Aafer, ... -- CCS 2020

"Forensic Analysis in Access Control: Foundations and a Case-Study from Practice"

Nahid Juma, Xiaowei Huang, Mahesh V. Tripunitara, ... -- CCS 2020

"Post-quantum TLS without handshake signatures"

Douglas Stebila, ... -- CCS 2020

"Chaperone: Real-time Locking and Loss Prevention for Smartphones"

Jiayi Chen, Urs Hengartner, ... -- Usenix 2020

"Walking Onions: Scaling Anonymity Networks while Protecting Users"

Chelsea H. Komlo, Ian Goldberg, ... -- Usenix 2020

"Pixel: Multi-signatures for Consensus"

Sergey Gorbunov, ... -- Usenix 2020

"Secure Multi-party Computation of Differentially Private Median"

Florian Kerschbaum, ... -- Usenix 2020

"Obfuscated Access and Search Patterns in Searchable Encryption"

Zhiwei Shang, Simon Oya, Florian Kerschbaum, ... -- NDSS 2021

"Compact Certificates of Collective Knowledge"

Georgios Vlachos, ... -- Oakland 2021

"OSPREY: Recovery of Variable and Data Structure via Probabilistic Analysis for Stripped Binary"

Yousra Aafer, ... -- Oakland 2021

"STOCHFUZZ: Sound and Cost-effective Fuzzing of Stripped Binaries by Incremental and Stochastic Rewriting"

Yousra Aafer, ... -- Oakland 2021

"Secure Multi-party Computation of Differentially Private Heavy Hitters"

Florian Kerschbaum, ... -- CCS 2021

"Differential Privacy for Directional Data"

Florian Kerschbaum, ... -- CCS 2021

"Dissecting Residual APIs in Custom Android ROMs"

Zeinab El-Rewini, Yousra Aafer, ... -- CCS 2021

"Hiding the Access Pattern is Not Enough: Exploiting Search Pattern Leakage in Searchable Encryption"

Simon Oya, Florian Kerschbaum, ... -- Usenix 2021

"PACStack: an Authenticated Call Stack"

Hans Liljestrand, N. Asokan, ... -- Usenix 2021

"Android SmartTVs Vulnerability Discovery via Log-Guided Fuzzing"

Yousra Aafer, ... -- Usenix 2021

"Once is Never Enough: Foundations for Sound Statistical Inference in Tor Network Experimentation"

Justin Tracey, Ian Goldberg, ... -- Usenix 2021

"SoK: Demystifying Binary Lifters Through the Lens of Downstream Applications"

Yuyan Bao, ... -- Oakland 2022

"SoK: How Robust is Image Classification Deep Neural Network Watermarking?"

Nils Lukas, Edward Jiang, Xinda Li, Florian Kerschbaum, ... -- Oakland 2022

"Cache Refinement Type for Side-Channel Detection of Cryptographic Software"

Yuyan Bao, ... -- CCS 2022

"Fast Fully Oblivious Compaction and Shuffling"

Sajin Sasy, Ian Goldberg, ... -- CCS 2022

"Poirot: Probabilistically Recommending Protections for the Android Framework"

Zeinab El-Rewini, Yousra Aafer, ... -- CCS 2022

"Proof-of-Possession for KEM Certificates using Verifiable Generation"

Philip Hodges, Douglas Stebila, ... -- CCS 2022

"Selective MPC: Distributed Computation of Differentially Private Key-Value Statistics"

Thomas Humphries, Rasoul Akhavan Mahdavi, Shannon Veitch, Florian Kerschbaum, ... -- CCS 2022

"Aardvark: An Asynchronous Authenticated Dictionary with Applications to Account-based Cryptocurrencies"

Sergey Gorbunov, ... -- Usenix 2022

"Caring about Sharing: User Perceptions of Multiparty Data Sharing"

Bailey Kacsmar, Kyle Tilbury, Miti Mazmudar, Florian Kerschbaum, ... -- Usenix 2022

"ProFactory: Improving IoT Security via Formalized Protocol Customization"

Yousra Aafer, ... -- Usenix 2022

"Constant-weight PIR: Single-round Keyword PIR via Constant-weight Equality Operators"

Rasoul Akhavan Mahdavi, Florian Kerschbaum, ... -- Usenix 2022

"IHOP: Improved Statistical Query Recovery against Searchable Symmetric Encryption through Quadratic Optimization"

Simon Oya, Florian Kerschbaum, ... -- Usenix 2022