IBM Research, US

General Info

Rank: #28 Worldwide
#21 in US
Papers: 90
Number of Researchers: 82
APA
(average papers per authors):
1.1
Country: USA

Activity Map

Contributors

  • Xiaolan Zhang (8 papers)
  • Hugo Krawczyk (7 papers)
  • Trent Jaeger (7 papers)
  • Reiner Sailer (7 papers)
  • Shai Halevi (6 papers)
  • Mudhakar Srivatsa (6 papers)
  • Ran Canetti (5 papers)
  • Josyula R. Rao (5 papers)
  • Pankaj Rohatgi (5 papers)
  • Leendert van Doorn (5 papers)
  • Dakshi Agrawal (4 papers)
  • Rosario Gennaro (4 papers)
  • Kapil Singh (4 papers)
  • Pau-Chen Cheng (3 papers)
  • Zhongshu Gu (3 papers)
  • Jan Camenisch (3 papers)
  • Dimitrios Pendarakis (2 papers)
  • Tal Rabin (2 papers)
  • Suresh N. Chari (2 papers)
  • Wietse Venema (2 papers)
  • Charanjit Jutla (2 papers)
  • Marcel C. Rosu (2 papers)
  • Michael Steiner (2 papers)
  • Supriyo Chakraborty (2 papers)
  • Marco Pistoia (2 papers)
  • Mihai Christodorescu (2 papers)
  • Craig Gentry (2 papers)
  • Antony Edwards (2 papers)
  • Omer Tripp (2 papers)
  • Jiyong Jang (2 papers)
  • Douglas Lee Schales (2 papers)
  • Marc Ph. Stoecklin (2 papers)
  • Changchang Liu (2 papers)
  • Wei-Han Lee (2 papers)
  • Benjamin Andow (2 papers)
  • Frederique Giraud (1 papers)
  • Pankay Rohatgi (1 papers)
  • Michael Spreitzer (1 papers)
  • Mohan Dhawan (1 papers)
  • Rishabh Poddar (1 papers)
  • Kshiteej Mahajan (1 papers)
  • Vijay Mann (1 papers)
  • Bin Liu (1 papers)
  • Dalit Naor (1 papers)
  • Benjamin Grosof (1 papers)
  • Jonathan S. Shapiro (1 papers)
  • Sam Weber (1 papers)
  • Dmitri Asonov (1 papers)
  • Rakesh Agrawal (1 papers)
  • Claudia Keser (1 papers)
  • Paul A. Karger (1 papers)
  • Selcuk Baktir (1 papers)
  • Arun Iyengar (1 papers)
  • Arvind Seshadri (1 papers)
  • Mariana Raykova (1 papers)
  • Nick Howgrave-Graham (1 papers)
  • Susan Hohenberger (1 papers)
  • Wilfred Plouffe (1 papers)
  • Yaoping Ruan (1 papers)
  • David Cash (1 papers)
  • Gregory Neven (1 papers)
  • Ian Molloy (1 papers)
  • Salvatore Guarnieri (1 papers)
  • Aleksandr Aravkin (1 papers)
  • Tzipora Halevi (1 papers)
  • Victor Shoup (1 papers)
  • Xiaokui Shu (1 papers)
  • Frederico Araujo (1 papers)
  • Heqing Huang (1 papers)
  • Hani Jamjoom (1 papers)
  • Sunil Manandhar (1 papers)
  • Peter Gutmann (1 papers)
  • Mark Lindemann (1 papers)
  • Stefan Berger (1 papers)
  • Ramon Caceres (1 papers)
  • Kenneth A. Goldman (1 papers)
  • Ronald Perez (1 papers)
  • Dan Tsafrir (1 papers)
  • Julia Rubin (1 papers)
  • Xin Hu (1 papers)
  • Mimi Zohar (1 papers)
  • Kevin Eykholt (1 papers)

Papers

"An IPSec-based Host Architecture for Secure Internet Multicast"

Ran Canetti, Pau-Chen Cheng, Frederique Giraud, Dimitrios Pendarakis, Josyula R. Rao, Pankay Rohatgi, ... -- NDSS 2000

"Chameleon Signatures"

Hugo Krawczyk, Tal Rabin, ... -- NDSS 2000

"Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers"

Dalit Naor, ... -- Oakland 2000

"A Practically Implementable and Tractable Delegation Logic"

Benjamin Grosof, ... -- Oakland 2000

"Efficient Authentication and Signing of Multicast Streams over Lossy Channels"

Ran Canetti, ... -- Oakland 2000

"Verifying the EROS Confinement Mechanism"

Jonathan S. Shapiro, Sam Weber, ... -- Oakland 2000

"An Access Control Model for Simplifying Constraint Expression"

Trent Jaeger, ... -- CCS 2000

"A Secure JaveTM Virtual Machine"

Leendert van Doorn, ... -- Usenix 2000

"Can Pseudonymity Really Guarantee Privacy?"

Josyula R. Rao, Pankaj Rohatgi, ... -- Usenix 2000

"Efficient and Secure Source Authentication for Multicast"

Ran Canetti, ... -- NDSS 2001

"Cryptology As a Network Service"

Michael Spreitzer, ... -- NDSS 2001

"Paillier's cryptosystem revisited"

Rosario Gennaro, Nick Howgrave-Graham, ... -- CCS 2001

"Data Remanence in Semiconductor Devices"

Peter Gutmann, ... -- Usenix 2001

"Improving DES Coprocessor Throughput for Short Operations"

Mark Lindemann, ... -- Usenix 2001

"BlueBox : A Policy-Driven, Host-Based Intrusion Detection System"

Suresh N. Chari, Pau-Chen Cheng, ... -- NDSS 2002

"Partitioning Attacks: Or How to Rapidly Clone Some GSM Cards"

Josyula R. Rao, Pankaj Rohatgi, ... -- Oakland 2002

"Efficient, DoS-resistant, secure key exchange for internet protocols"

Ran Canetti, ... -- CCS 2002

"Runtime verification of authorization hook placement for the linux security modules framework"

Antony Edwards, Trent Jaeger, Xiaolan Zhang, ... -- CCS 2002

"Using CQUAL for Static Analysis of Authorization Hook Placement"

Xiaolan Zhang, Antony Edwards, Trent Jaeger, ... -- Usenix 2002

"Probabilistic Treatment of MIXes to Hamper Traffic Analysis"

Dakshi Agrawal, ... -- Oakland 2003

"Analyzing Integrity Protection in the SELinux Example Policy"

Trent Jaeger, Reiner Sailer, Xiaolan Zhang, ... -- Usenix 2003

"Keyboard Acoustic Emanations"

Dmitri Asonov, Rakesh Agrawal, ... -- Oakland 2004

"Attestation-based Policy Enforcement for Remote Access"

Reiner Sailer, Trent Jaeger, Xiaolan Zhang, Leendert van Doorn, ... -- CCS 2004

"Design and Implementation of a TCG-based Integrity Measurement Architecture"

Reiner Sailer, Xiaolan Zhang, Trent Jaeger, Leendert van Doorn, ... -- Usenix 2004

"Bind: A Time-Of-Use Attestation Service For Secure Distributed System"

Leendert van Doorn, ... -- Oakland 2005

"Untraceable RFID Tags via Insubvertible Encryption"

Jan Camenisch, ... -- CCS 2005

"New Approaches for Deniable Authentication"

Rosario Gennaro, ... -- CCS 2005

"An architecture for robust pseudo-random generation and Applications to /dev/random"

Shai Halevi, ... -- CCS 2005

"Toward Automated Information-Flow Integrity Verification for Security-Critical Applications"

Trent Jaeger, Reiner Sailer, ... -- NDSS 2006

"Fundamental Limits on the Anonymity Provided by the MIX Technique"

Dakshi Agrawal, ... -- Oakland 2006

"Deniable Authentication and Key Exchange"

Rosario Gennaro, Hugo Krawczyk, ... -- CCS 2006

"How to Win the Clone Wars: Efficient Periodic n-Times Anonymous Authentication"

Jan Camenisch, Susan Hohenberger, ... -- CCS 2006

"vTPM: Virtualizing the Trusted Platform Module"

Stefan Berger, Ramon Caceres, Kenneth A. Goldman, Ronald Perez, Reiner Sailer, Leendert van Doorn, ... -- Usenix 2006

"Beyond Stack Inspection: A Unified Access-Control and Information-Flow Security Model"

Marco Pistoia, ... -- Oakland 2007

"Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control"

Pau-Chen Cheng, Pankaj Rohatgi, Claudia Keser, Paul A. Karger, ... -- Oakland 2007

"Trojan Detection using IC Fingerprinting"

Dakshi Agrawal, Selcuk Baktir, Pankaj Rohatgi, ... -- Oakland 2007

"Chosen-Ciphertext Secure Proxy Re-Encryption"

Ran Canetti, ... -- CCS 2007

"Security under Key-Dependent Inputs"

Shai Halevi, Hugo Krawczyk, ... -- CCS 2007

"Secretly Monopolizing the CPU Without Superuser Privileges"

Dan Tsafrir, ... -- Usenix 2007

"Preserving Caller Anonymity in Voice-over-IP Networks"

Mudhakar Srivatsa, Arun Iyengar, ... -- Oakland 2008

"Trust Management for Secure Information Flows"

Mudhakar Srivatsa, Pankaj Rohatgi, ... -- CCS 2008

"AutoISES: Automatically Inferring Security Specification and Detecting Violations"

Xiaolan Zhang, ... -- Usenix 2008

"Attacking cryptographic schemes based on 'perturbation polynomials'"

Craig Gentry, Shai Halevi, ... -- CCS 2009

"Certificateless onion routing"

Rosario Gennaro, ... -- CCS 2009

"The fable of the bees: incentivizing robust revocation decision making in ad hoc networks"

Mudhakar Srivatsa, ... -- CCS 2009

"Effective implementation of the cell broadband engine isolation loader"

Wilfred Plouffe, ... -- CCS 2009

"A metadata calculus for secure information sharing"

Mudhakar Srivatsa, Dakshi Agrawal, ... -- CCS 2009

"Where Do You Want to Go Today? Escalating Privileges by Pathname Manipulation"

Suresh N. Chari, Shai Halevi, Wietse Venema, ... -- NDSS 2010

"Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors"

Mihai Christodorescu, Reiner Sailer, ... -- Oakland 2010

"Scalable Parametric Verification of Secure Systems: How to Verify Reference Monitors without Worrying about Data Structure Size"

Arvind Seshadri, ... -- Oakland 2010

"HyperSentry: enabling stealthy in-context measurement of hypervisor integrity"

Xiaolan Zhang, ... -- CCS 2010

"AccessMiner: using system-centric models for malware protection"

Mihai Christodorescu, ... -- CCS 2010

"Proofs of Ownerhip in Remote Storage Systems"

Shai Halevi, ... -- CCS 2011

"Sedic: Privacy-Aware Data Intensive Computing on Hybrid Cloud"

Yaoping Ruan, ... -- CCS 2011

"SICE: A Hardware-Level Strongly Isolated Computing Environment for x86 Multi-core Platforms"

Xiaolan Zhang, ... -- CCS 2011

"Ciphers that Encipher their own Keys"

David Cash, ... -- CCS 2011

"Deanonymizing Mobility Traces: Using Social Network as a Side-Channel"

Mudhakar Srivatsa, ... -- CCS 2012

"Practical Yet Universally Composable Two-Server Password-Authenticated Secret Sharing"

Jan Camenisch, Gregory Neven, ... -- CCS 2012

"Using Probabilistic Generative Models for Ranking Risks of Android Apps"

Ian Molloy, ... -- CCS 2012

"Pinocchio: Nearly Practical Verifiable Computation"

Craig Gentry, Mariana Raykova, ... -- Oakland 2013

"Outsourced Symmetric Private Information Retrieval"

Charanjit Jutla, Hugo Krawczyk, Marcel C. Rosu, Michael Steiner, ... -- CCS 2013

"Practical Comprehensive Bounds on Surreptitious Communication over DNS"

Josyula R. Rao, Reiner Sailer, Douglas Lee Schales, Marc Ph. Stoecklin, Wietse Venema, ... -- Usenix 2013

"Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation"

Charanjit Jutla, Hugo Krawczyk, Marcel C. Rosu, Michael Steiner, ... -- NDSS 2014

"Structural Data De-anonymization: Quantification, Practice, and Implications"

Mudhakar Srivatsa, ... -- CCS 2014

"Aletheia: Improving the Usability of Static Security Analysis"

Omer Tripp, Salvatore Guarnieri, Marco Pistoia, Aleksandr Aravkin, ... -- CCS 2014

"A Bayesian Approach to Privacy Enforcement in Smartphones"

Omer Tripp, Julia Rubin, ... -- Usenix 2014

"SPHINX: Detecting Security Attacks in Software-Defined Networks"

Mohan Dhawan, Rishabh Poddar, Kshiteej Mahajan, Vijay Mann, ... -- NDSS 2015

"WebCapsule: Towards a Lightweight Forensic Engine for Web Browsers"

Kapil Singh, ... -- CCS 2015

"The Dropper Effect: Insights into Malware Distribution with Downloader Graph Analytics"

Jiyong Jang, ... -- CCS 2015

"SecGraph: A Uniform and Open-source Evaluation System for Graph Data Anonymization and De-anonymization"

Xin Hu, ... -- Usenix 2015

"Dependence Makes You Vulnberable: Differential Privacy Under Dependent Tuples"

Supriyo Chakraborty, ... -- NDSS 2016

"A Unilateral-to-Mutual Authentication Compiler for Key Exchange (with Applications to Client Authentication in TLS 1.3)"

Hugo Krawczyk, ... -- CCS 2016

"Attribute-based Key Exchange with General Policies"

Hugo Krawczyk, Tal Rabin, ... -- CCS 2016

"Implementing BP-Obfuscation Using Graph-Induced Encoding"

Shai Halevi, Tzipora Halevi, Victor Shoup, ... -- CCS 2017

"Securing Real-Time Microcontroller Systems through Customized Memory View Switching."

Zhongshu Gu, ... -- NDSS 2018

"Threat Intelligence Computing"

Xiaokui Shu, Frederico Araujo, Douglas Lee Schales, Marc Ph. Stoecklin, Jiyong Jang, Heqing Huang, Josyula R. Rao, ... -- CCS 2018

"Security Namespace: Making Linux Security Frameworks Available to Containers"

Mimi Zohar, Dimitrios Pendarakis, Zhongshu Gu, ... -- Usenix 2018

"Houdini's Escape: Breaking the Resource Rein of Linux Control Groups"

Zhongshu Gu, Hani Jamjoom, ... -- CCS 2019

"PolicyLint: Investigating Internal Privacy Policy Contradictions on Google Play"

Kapil Singh, ... -- Usenix 2019

"MOPT: Optimized Mutation Scheduling for Fuzzers"

Wei-Han Lee, ... -- Usenix 2019

"Text Captcha Is Dead? A Large Scale Deployment and Empirical Study"

Changchang Liu, ... -- CCS 2020

"Actions Speak Louder than Words: Entity-Sensitive Privacy Policy and Data Flow Analysis with PoliCheck"

Benjamin Andow, Kapil Singh, ... -- Usenix 2020

"Cardpliance: PCI DSS Compliance of Android Applications"

Benjamin Andow, ... -- Usenix 2020

"Data Poisoning Attacks to Deep Learning Based Recommender Systems"

Bin Liu, ... -- NDSS 2021

"AHEAD: Adaptive Hierarchical Decomposition for Range Query under Local Differential Privacy"

Changchang Liu, ... -- CCS 2021

"WristPrint: Characterizing User Re-identification Risks from Wrist-worn Accelerometry Data"

Supriyo Chakraborty, ... -- CCS 2021

"UNIFUZZ: A Holistic and Pragmatic Metrics-Driven Platform for Evaluating Fuzzers"

Wei-Han Lee, ... -- Usenix 2021

"Understanding IoT Security from a Market-Scale Perspective"

Sunil Manandhar, ... -- CCS 2022

"Transferring Adversarial Robustness Through Robust Representation Matching"

Kevin Eykholt, ... -- Usenix 2022

"Smart Home Privacy Policies Demystified: A Study of Availability, Content, and Coverage"

Kapil Singh, ... -- Usenix 2022