Microsoft Research, US

General Info

Rank: #4 Worldwide
#4 in US
Papers: 202
Number of Researchers: 157
APA
(average papers per authors):
1.3
Country: USA

Activity Map

Contributors

  • Cedric Fournet (19 papers)
  • Helen J. Wang (17 papers)
  • Shuo Chen (15 papers)
  • Benjamin Livshits (15 papers)
  • Yinglian Xie (12 papers)
  • Marcus Peinado (12 papers)
  • Weidong Cui (11 papers)
  • Fang Yu (10 papers)
  • Markulf Kohlweiss (10 papers)
  • Yi-Min Wang (8 papers)
  • Santiago Zanella-Beguelin (8 papers)
  • Melissa Chase (8 papers)
  • Bryan Parno (7 papers)
  • Jonathan Protzenko (7 papers)
  • Stuart Schechter (6 papers)
  • Alexander Moshchuk (6 papers)
  • Greg Zaverucha (6 papers)
  • Martin Abadi (5 papers)
  • Srinath Setty (5 papers)
  • Cormac Herley (5 papers)
  • Manuel Costa (5 papers)
  • David Molnar (5 papers)
  • Kim Laine (5 papers)
  • Seny Kamara (5 papers)
  • Hao Chen (2) (5 papers)
  • Nikhil Swamy (4 papers)
  • Rui Wang (4 papers)
  • Olga Ohrimenko (4 papers)
  • Antoine Delignat-Lavaud (4 papers)
  • Jaeyeon Jung (4 papers)
  • Boris Kopf (4 papers)
  • Chad Verbowski (3 papers)
  • Ilya Mironov (3 papers)
  • Nishanth Chandran (3 papers)
  • Jacob R. Lorch (3 papers)
  • Shaz Qadeer (3 papers)
  • Benjamin Zorn (3 papers)
  • Jon Howell (3 papers)
  • Craig Costello (3 papers)
  • Michael Naehrig (3 papers)
  • Margus Veanes (3 papers)
  • Aseem Rastogi (3 papers)
  • Kapil Vaswani (3 papers)
  • Sangho Lee (3 papers)
  • Tahina Ramananandro (3 papers)
  • Sebastian Angel (3 papers)
  • Ted Wobber (2 papers)
  • John Dunagan (2 papers)
  • Patrice Godefroid (2 papers)
  • Ming Zhang (2 papers)
  • Kathryn S. McKinley (2 papers)
  • Suman Nath (2 papers)
  • George Danezis (2 papers)
  • John R. Douceur (2 papers)
  • James Mickens (2 papers)
  • Shuvendu K. Lahiri (2 papers)
  • Christos Gkantsidis (2 papers)
  • Gloria Mainar-Ruiz (2 papers)
  • Eyal Ofek (2 papers)
  • Hao Chen (2 papers)
  • Stefan Saroiu (2 papers)
  • David Chisnall (2 papers)
  • Chris Hawblitzel (2 papers)
  • Esha Ghosh (2 papers)
  • Andrew D. Gordon (2 papers)
  • Kristin Lauter (2 papers)
  • Wei Dai (2 papers)
  • Divya Gupta (2 papers)
  • Shruti Tople (2 papers)
  • Andrew Paverd (2 papers)
  • Xinyang Ge (2 papers)
  • Yuanchao Shu (2 papers)
  • Michael Burrows (1 papers)
  • Mark Manasse (1 papers)
  • Doug Beck (1 papers)
  • Sam King (1 papers)
  • Ming Ma (1 papers)
  • Ranyeer Chandra (1 papers)
  • Andrew Birrell (1 papers)
  • Jeremiah Blocki (1 papers)
  • Daniel Gruss (1 papers)
  • Satya Lokam (1 papers)
  • Vipal Goyal (1 papers)
  • Daniel R. Simon (1 papers)
  • Wilf Russell (1 papers)
  • Venkat Padmanabhan (1 papers)
  • Lili Qiu (1 papers)
  • John DeTreville (1 papers)
  • Chandramohan Thekkath (1 papers)
  • Dan Simon (1 papers)
  • Ralf Sasse (1 papers)
  • Yi Wang (1 papers)
  • Alice Brush (1 papers)
  • Moritz Y. Becker (1 papers)
  • Janice Tsai (1 papers)
  • Jeannette M. Wing (1 papers)
  • Chris Rossbach (1 papers)
  • Ran Gal (1 papers)
  • Siddhartha Sen (1 papers)
  • Paul England (1 papers)
  • Andrey Marochko (1 papers)
  • Dennis Mattoon (1 papers)
  • Lucian Cojocar (1 papers)
  • Alec Wolman (1 papers)
  • Joonwon Choi (1 papers)
  • Antione Delignat-Lavaud (1 papers)
  • Jonathan Lee (1 papers)
  • Hongyan Xia (1 papers)
  • Istvan Haller (1 papers)
  • Karthikeyan Bhargavan (1 papers)
  • David Jao (1 papers)
  • Mihai Budiu (1 papers)
  • Ulfar Erlingsson (1 papers)
  • Frank McSherry (1 papers)
  • David Ross (1 papers)
  • Jeremy Elson (1 papers)
  • Guy N. Rothblum (1 papers)
  • Qifa Ke (1 papers)
  • Tom Roeder (1 papers)
  • Mariusz Jakubowski (1 papers)
  • Saikat Guha (1 papers)
  • Protzenko Jonathan (1 papers)
  • Yongsoo Song (1 papers)
  • Shang Gao (1 papers)
  • Deevashwer Rathee (1 papers)
  • Mayank Rathee (1 papers)
  • Nishant Kumar (1 papers)
  • Rahul Sharma (1 papers)
  • Lukas Wutschitz (1 papers)
  • Victor Ruhle (1 papers)
  • Marc Brockschmidt (1 papers)
  • Radames Cruz Moreno (1 papers)
  • Thomas Moscibroda (1 papers)
  • Onur Mutlu (1 papers)
  • Zhuowei Li (1 papers)
  • Miguel Castro (1 papers)
  • Piali Choudhury (1 papers)
  • Herman Venter (1 papers)
  • John P. John (1 papers)
  • Justin M. Rao (1 papers)
  • Oriana Riva (1 papers)
  • Karin Strauss (1 papers)
  • Dimitrios Lymberopoulos (1 papers)
  • Alex Moshchuk (1 papers)
  • Yuri Gurevich (1 papers)
  • Dinei Florencio (1 papers)
  • Sebastian Nowozin (1 papers)
  • Felix Schuster (1 papers)
  • Daniel Shumow (1 papers)
  • Barry Bond (1 papers)
  • K. Rustan M. Leino (1 papers)
  • Rishabh Poddar (1 papers)
  • Ganesh Ananthanarayanan (1 papers)
  • Stavros Volos (1 papers)
  • Ilya Razenshteyn (1 papers)
  • Naman Gupta (1 papers)
  • Sai Lakshmi Bhavana Obbattu (1 papers)

Papers

"Statistical Identification of Encrypted Web Browsing Traffic"

Daniel R. Simon, Yi-Min Wang, Wilf Russell, Venkat Padmanabhan, Lili Qiu, ... -- Oakland 2002

"Binder, a Logic-based Security Language"

John DeTreville, ... -- Oakland 2002

"Access Control Based on Execution History"

Cedric Fournet, ... -- NDSS 2003

"Moderately Hard, Memory-Bound Functions"

Michael Burrows, Mark Manasse, Ted Wobber, ... -- NDSS 2003

"Specifying and Verifying Hardware for Tamper-Resistant Software"

Chandramohan Thekkath, ... -- Oakland 2003

"Securing OLAP Data Cubes Against Privacy Breaches"

Dan Simon, ... -- Oakland 2004

"Verifying Policy-Based Security for Web Services"

Karthikeyan Bhargavan, Cedric Fournet, Andrew D. Gordon, ... -- CCS 2004

"Privacy-Preserving Friends Troubleshooting Network"

Helen J. Wang, ... -- NDSS 2005

"A Black-Box Tracing Technique to Identify Causes of Least-Privilege Incompatibilities"

John Dunagan, Chad Verbowski, Yi-Min Wang, ... -- NDSS 2005

"Applications of Secure Electronic Voting to Automated Privacy-Preserving Troubleshooting"

David Jao, Helen J. Wang, ... -- CCS 2005

"Control-Flow Integrity: Principles, Implementations, and Applications"

Mihai Budiu, Ulfar Erlingsson, ... -- CCS 2005

"Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities"

Yi-Min Wang, Doug Beck, Chad Verbowski, Shuo Chen, Sam King, ... -- NDSS 2006

"SubVirt: Implementing malware with virtual machines"

Yi-Min Wang, Chad Verbowski, Helen J. Wang, Jacob R. Lorch, ... -- Oakland 2006

"Data Collection With Self-Enforcing Privacy"

Frank McSherry, Ilya Mironov, ... -- CCS 2006

"A Quantitative Study of Forum Spamming Using Context-based Analysis"

Yi-Min Wang, Ming Ma, ... -- NDSS 2007

"Generic Application-Level Protocol Analyzer and its Language"

Helen J. Wang, John Dunagan, ... -- NDSS 2007

"A Systematic Approach to Uncover Security Flaws in GUI Logic"

Shuo Chen, Ralf Sasse, Helen J. Wang, Yi-Min Wang, ... -- Oakland 2007

"ShieldGen: Automatic Data Patch Generation for Unknown Vulnerabilities with Informed Probing"

Weidong Cui, Marcus Peinado, Helen J. Wang, ... -- Oakland 2007

"An Analysis of Browser Domain-Isolation Bugs and A Light-Weight Transparent Defense Mechanism"

Shuo Chen, Yi-Min Wang, David Ross, ... -- CCS 2007

"Asirra: A CAPTCHA that Exploits Interest-Aligned Manual Image Categorization"

Jeremy Elson, John R. Douceur, Jon Howell, ... -- CCS 2007

"Discoverer: Automatic Protocol Reverse Engineering from Network Traces"

Weidong Cui, Helen J. Wang, ... -- Usenix 2007

"Memory Performance Attacks: Denial of Memory Service in Multi-Core Systems"

Thomas Moscibroda, Onur Mutlu, ... -- Usenix 2007

"Automated Whitebox Fuzz Testing"

Patrice Godefroid, ... -- NDSS 2008

"Towards Practical Biometric Key Generation with Randomized Biometric Templates"

Seny Kamara, ... -- CCS 2008

"Tupni: Automatic Reverse Engineering of Input Formats"

Weidong Cui, Helen J. Wang, ... -- CCS 2008

"Panalyst: Privacy-Aware Remote Error Analysis on Commodity Software"

Zhuowei Li, ... -- Usenix 2008

"Sphinx: A Compact and Provably Secure Mix Format"

George Danezis, ... -- Oakland 2009

"Pretty-Bad-Proxy: An Overlooked Adversary in Browsers' HTTPS Deployments"

Shuo Chen, Yi Wang, Ming Zhang, ... -- Oakland 2009

"It's No Secret. Measuring the Security and Reliability of Authentication via 'Secret' Questions"

Stuart Schechter, Alice Brush, ... -- Oakland 2009

"Improving privacy and security in multi-authority attribute-based encryption"

Melissa Chase, ... -- CCS 2009

"Ripley: automatically securing web 2.0 applications through replicated execution"

Benjamin Livshits, ... -- CCS 2009

"Secure in-VM monitoring using hardware virtualization"

Weidong Cui, ... -- CCS 2009

"Countering kernel rootkits with lightweight hook protection"

Weidong Cui, ... -- CCS 2009

"Mapping kernel objects to enable systematic integrity checking"

Weidong Cui, Marcus Peinado, ... -- CCS 2009

"Baggy Bounds Checking: An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors"

Manuel Costa, Miguel Castro, ... -- Usenix 2009

"NOZZLE: A Defense Against Heap-spraying Code Injection Attacks"

Benjamin Livshits, Benjamin Zorn, ... -- Usenix 2009

"GATEKEEPER: Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code"

Benjamin Livshits, ... -- Usenix 2009

"The Multi-Principal OS Construction of the Gazelle Web Browser"

Helen J. Wang, Piali Choudhury, Herman Venter, ... -- Usenix 2009

"On Network-level Clusters for Spam Detection"

Yinglian Xie, Fang Yu, ... -- NDSS 2010

"Side-Channel Leaks in Web Applications: a Reality Today, a Challenge Tomorrow"

Shuo Chen, ... -- Oakland 2010

"Investigation of Triangular Spamming: a Stealthy and Efficient Spamming Technique"

Yinglian Xie, Fang Yu, ... -- Oakland 2010

"On the Incoherencies in Web Browser Access Control Policies"

Alexander Moshchuk, Helen J. Wang, ... -- Oakland 2010

"ConScript: Specifying and Enforcing Fine-Grained Security Policies for JavaScript in the Browser"

Benjamin Livshits, ... -- Oakland 2010

"Searching the Searchers with SearchAudit"

John P. John, Fang Yu, Yinglian Xie, Martin Abadi, ... -- Usenix 2010

"Using Classification to Protect the Integrity of Spectrum Measurements in White Space Networks"

Ranyeer Chandra, ... -- NDSS 2011

"Verified Security for Browser Extensions"

Benjamin Livshits, Nikhil Swamy, ... -- Oakland 2011

"RePriv: Re-Imagining Content Personalization and In-Browser Privacy"

Benjamin Livshits, ... -- Oakland 2011

"Memoir: Practical State Continuity for Protected Modules"

Bryan Parno, Jacob R. Lorch, John R. Douceur, James Mickens, ... -- Oakland 2011

"How to Shop for Free Online - Security Analysis of Cashier-as-a-Service Based Web Stores"

Shuo Chen, Shaz Qadeer, ... -- Oakland 2011

"Extracting and Verifying Cryptographic Models from C Protocol Code by Symbolic Execution"

Andrew D. Gordon, ... -- CCS 2011

"Modular Code-Based Cryptographic Verification"

Cedric Fournet, Markulf Kohlweiss, ... -- CCS 2011

"Information-Flow Types for Homomorphic Encryptions"

Cedric Fournet, ... -- CCS 2011

"Practical Delegation of Computation using Multiple Servers"

Guy N. Rothblum, ... -- CCS 2011

"ScriptGard: Automatic Context-Sensitive Sanitization for Large-Scale Legacy Web Applications"

David Molnar, Benjamin Livshits, ... -- CCS 2011

"These Aren't the Droids You're Looking For: Retrofitting Android to Protect Data from Imperious Applications"

Jaeyeon Jung, Stuart Schechter, ... -- CCS 2011

"Fast and Precise Sanitizer Analysis with BEK"

Benjamin Livshits, David Molnar, Margus Veanes, ... -- Usenix 2011

"ZOZZLE: Fast and Precise In-Browser JavaScript Malware Detection"

Benjamin Livshits, Benjamin Zorn, ... -- Usenix 2011

"Permission Re-Delegation: Attacks and Defenses"

Helen J. Wang, Alexander Moshchuk, ... -- Usenix 2011

"deSEO: Combating Search-Result Poisoning"

Fang Yu, Yinglian Xie, Martin Abadi, ... -- Usenix 2011

"You Can Run, but You Can't Hide: Exposing Network Location for Targeted DoS Attacks in Cellular Networks"

Ming Zhang, Yi-Min Wang, ... -- NDSS 2012

"Host Fingerprinting and Tracking on the Web: Privacy and Security Implications"

Yinglian Xie, Fang Yu, Martin Abadi, ... -- NDSS 2012

"Foundations of Logic-Based Trust Management"

Moritz Y. Becker, ... -- Oakland 2012

"User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems"

Alexander Moshchuk, Bryan Parno, Helen J. Wang, ... -- Oakland 2012

"Signing Me onto Your Accounts through Facebook and Google: a Traffic-Guided Security Study of Commercially Deployed Single-Sign-On Web Services"

Shuo Chen, ... -- Oakland 2012

"Rozzle: De-Cloaking Internet Malware"

Benjamin Livshits, Benjamin Zorn, ... -- Oakland 2012

"[SoK] The quest to replace passwords: A framework for comparative evaluation of web authentication schemes"

Cormac Herley, ... -- Oakland 2012

"Populated IP Addresses -- Classification and Applications"

Fang Yu, Yinglian Xie, ... -- CCS 2012

"Innocent by Association: Early Recognition of Legitimate Users"

Yinglian Xie, Fang Yu, Qifa Ke, Martin Abadi, ... -- CCS 2012

"Full Proof Cryptography: Verifiable Compilation of Efficient Zero-Knowledge Protocols"

Santiago Zanella-Beguelin, ... -- CCS 2012

"Knowing Your Enemy: Understanding and Detecting Malicious Web Advertising"

Yinglian Xie, Fang Yu, ... -- CCS 2012

"Privacy-Aware Personalization for Mobile Advertising"

Suman Nath, ... -- CCS 2012

"Collaborative TCP Sequence Number Inference Attack"

Yinglian Xie, ... -- CCS 2012

"Operating System Framed in Case of Mistaken Identity"

Stuart Schechter, ... -- CCS 2012

"On Significance of the Least Significant Bits For Differential Privacy"

Ilya Mironov, ... -- CCS 2012

"Dynamic Searchable Symmetric Encryption"

Seny Kamara, Tom Roeder, ... -- CCS 2012

"Verified Security of Redundancy-Free Encryption from Rabin and RSA"

Santiago Zanella-Beguelin, ... -- CCS 2012

"Salus: A System for Server-Aided Secure Function Evaluation"

Seny Kamara, ... -- CCS 2012

"Impact of Spam Exposure on User Engagement"

Justin M. Rao, ... -- Usenix 2012

"Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services"

Stefan Saroiu, ... -- Usenix 2012

"STEALTHMEM: System-Level Protection Against Cache-Based Side Channel Attacks in the Cloud"

Marcus Peinado, Gloria Mainar-Ruiz, ... -- Usenix 2012

"Progressive Authentication: Deciding When to Authenticate on Mobile Phones"

Oriana Riva, Karin Strauss, Dimitrios Lymberopoulos, ... -- Usenix 2012

"Clickjacking: Attacks and Defenses"

Alex Moshchuk, Helen J. Wang, Stuart Schechter, ... -- Usenix 2012

"Tracking Rootkit Footprints with a Practical Memory Analysis System"

Weidong Cui, Marcus Peinado, ... -- Usenix 2012

"InteGuard: Toward Automatic Protection of Third-Party Web Service Integrations"

Shuo Chen, ... -- NDSS 2013

"Intention and Origination: An Inside Look at Large-Scale Bot Queries"

Yinglian Xie, Fang Yu, ... -- NDSS 2013

"Fix Me Up: Repairing Access-Control Bugs in Web Applications"

Kathryn S. McKinley, ... -- NDSS 2013

"Towards Practical Reactive Security Audit Using Extended Static Checkers"

Shuvendu K. Lahiri, ... -- Oakland 2013

"Finding the Linchpins of the Dark Web: a Study on Topologically Dedicated Hosts on Malicious Web Infrastructures"

Yinglian Xie, Fang Yu, ... -- Oakland 2013

"Pinocchio: Nearly Practical Verifiable Computation"

Bryan Parno, Jon Howell, ... -- Oakland 2013

"Implementing TLS with Verified Cryptographic Security"

Cedric Fournet, Markulf Kohlweiss, ... -- Oakland 2013

"Fully Automated Analysis of Padding-Based Encryption in the Computational Model"

Santiago Zanella-Beguelin, ... -- CCS 2013

"Diglossia: Detecting Code Injection Attacks With Precision and Efficiency"

Kathryn S. McKinley, ... -- CCS 2013

"deDacota: Toward Preventing Server-Side XSS via Automatic Code and Data Separation"

Weidong Cui, Mariusz Jakubowski, Marcus Peinado, ... -- CCS 2013

"Content-Based Isolation: Rethinking Isolation Policy Design on Client Systems"

Alexander Moshchuk, Helen J. Wang, ... -- CCS 2013

"Unauthorized Origin Crossing on Mobile Platforms: Threats and Mitigation"

Rui Wang, Shuo Chen, ... -- CCS 2013

"Automatic Mediation of Privacy-Sensitive Resource Access in Smartphone Applications"

Benjamin Livshits, Jaeyeon Jung, ... -- Usenix 2013

"ZQL: A Compiler for Privacy-Preserving Data Processing"

Cedric Fournet, Markulf Kohlweiss, George Danezis, ... -- Usenix 2013

"Explicating SDKs: Uncovering Assumptions Underlying Secure Authentication and Authorization"

Rui Wang, Shuo Chen, Shaz Qadeer, Yuri Gurevich, ... -- Usenix 2013

"Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers"

Benjamin Livshits, Helen J. Wang, Eyal Ofek, ... -- Usenix 2013

"Web PKI: Closing the Gap between Guidelines and Practices"

Martin Abadi, Andrew Birrell, Ilya Mironov, Ted Wobber, Yinglian Xie, ... -- NDSS 2014

"Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS"

Cedric Fournet, ... -- Oakland 2014

"Pivot: Fast, Synchronous Mashup Isolation Using Generator Chains"

James Mickens, ... -- Oakland 2014

"Bootstrapping Privacy Compliance in Big Data Systems"

Janice Tsai, Jeannette M. Wing, ... -- Oakland 2014

"Upgrading Your Android, Elevating My Malware: Privilege Escalation Through Mobile OS Updating"

Rui Wang, ... -- Oakland 2014

"PermaCoin: Repurposing Bitcoin Work for Data Preservation"

Bryan Parno, ... -- Oakland 2014

"World-Driven Access Control for Continuous Sensing"

David Molnar, Alexander Moshchuk, Helen J. Wang, ... -- CCS 2014

"OAuth Demystified for Mobile Application Developers"

Shuo Chen, ... -- CCS 2014

"Algebraic MACs and Keyed-Verification Anonymous Credentials"

Melissa Chase, Greg Zaverucha, ... -- CCS 2014

"Characterizing Large-Scale Click Fraud in ZeroAccess"

Saikat Guha, ... -- CCS 2014

"ZØ: An Optimizing Distributing Zero-Knowledge Compiler"

Benjamin Livshits, ... -- Usenix 2014

"Brahmastra: Driving Apps to Test the Security of Third-Party Components"

Jaeyeon Jung, ... -- Usenix 2014

"Towards Reliable Storage of 56-bit Secrets in Human Memory"

Stuart Schechter, ... -- Usenix 2014

"Password Portfolios and the Finite-Effort User: Sustainably Managing Large Numbers of Accounts"

Dinei Florencio, Cormac Herley, ... -- Usenix 2014

"Telepathwords: Preventing Weak Passwords by Reading Users' Minds"

Cormac Herley, Stuart Schechter, ... -- Usenix 2014

"Bloom Cookies: Web Search Personalization without User Tracking"

Suman Nath, ... -- NDSS 2015

"A Messy State of the Union: Taming the Composite State Machines of TLS"

Cedric Fournet, Markulf Kohlweiss, ... -- Oakland 2015

"Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems"

Weidong Cui, Marcus Peinado, ... -- Oakland 2015

"Geppetto: Versatile Verifiable Computation"

Craig Costello, Cedric Fournet, Jon Howell, Markulf Kohlweiss, Michael Naehrig, Olga Ohrimenko, Bryan Parno, ... -- Oakland 2015

"Post-quantum key exchange for the TLS protocol from the ring learning with errors problem"

Craig Costello, Michael Naehrig, ... -- Oakland 2015

"Securing MapReduce with SGX: Data Analytics in the Untrusted Cloud using COTS Secure Processors"

Manuel Costa, Cedric Fournet, Christos Gkantsidis, Marcus Peinado, Gloria Mainar-Ruiz, ... -- Oakland 2015

"Securing Multiparty Online Services via Certified Symbolic Transactions"

Shuo Chen, Shaz Qadeer, Rui Wang, ... -- Oakland 2015

"SurroundWeb: Mitigating Privacy Concerns in a 3D Web Browser"

David Molnar, Eyal Ofek, Chris Rossbach, Benjamin Livshits, Alexander Moshchuk, Helen J. Wang, Ran Gal, ... -- Oakland 2015

"Inference Attacks against Property-Preserving Encrypted Databases"

Seny Kamara, ... -- CCS 2015

"GRECS: Graph Encryption for Approximate Shortest Distance Queries"

Seny Kamara, ... -- CCS 2015

"Observing and Preventing Leakage in MapReduce"

Olga Ohrimenko, Cedric Fournet, Manuel Costa, Christos Gkantsidis, Markulf Kohlweiss, ... -- CCS 2015

"Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice"

Santiago Zanella-Beguelin, ... -- CCS 2015

"Cookies Lack Integrity: Real-World Implications"

Shuo Chen, ... -- Usenix 2015

"Differentially Private Password Frequency Lists"

Jeremiah Blocki, ... -- NDSS 2016

"Cinderella: Turning Shabby X.509 Certificates into Elegant Anonymous Credentials with the Magic of Verifiable Computation"

Antoine Delignat-Lavaud, Cedric Fournet, Markulf Kohlweiss, Bryan Parno, ... -- Oakland 2016

"Downgrade Resilience in Key-Exchange Protocols"

Cedric Fournet, Markulf Kohlweiss, Santiago Zanella-Beguelin, ... -- Oakland 2016

"Prepose: Privacy, Security, and Reliability for Gesture-Based Programming"

Benjamin Livshits, David Molnar, Margus Veanes, ... -- Oakland 2016

"Security Analysis of Emerging Smart Home Applications"

Jaeyeon Jung, ... -- Oakland 2016

"Hash First, Argue Later: Adaptive Verifiable Computations on Outsourced Data"

Cedric Fournet, Markulf Kohlweiss, Olga Ohrimenko, Bryan Parno, ... -- CCS 2016

"Transparency Overlays and Applications"

Melissa Chase, ... -- CCS 2016

"The Web/Local Boundary Is Fuzzy - A Security Study of Chrome's Process-based Sandboxing"

Shuo Chen, ... -- CCS 2016

"Frodo: Take off the ring! Practical, Quantum-Secure Key Exchange from LWE"

Craig Costello, Michael Naehrig, ... -- CCS 2016

"Authenticated Network Time Synchronization"

Greg Zaverucha, ... -- Usenix 2016

"SGX-Enabled Oblivious Machine Learning"

Olga Ohrimenko, Manuel Costa, Cedric Fournet, Sebastian Nowozin, Felix Schuster, Kapil Vaswani, ... -- Usenix 2016

"Hello from the Other Side: SSH over Robust Cache Covert Channels in the Cloud"

Daniel Gruss, ... -- NDSS 2017

"T-SGX: Eradicating Controlled-Channel Attacks Against Enclave Programs"

Marcus Peinado, ... -- NDSS 2017

"HOP: Hardware makes Obfuscation Practical"

Nishanth Chandran, Satya Lokam, Vipal Goyal, ... -- NDSS 2017

"Implementing and Proving the TLS 1.3 Record Layer"

Antoine Delignat-Lavaud, Cedric Fournet, Markulf Kohlweiss, Jonathan Protzenko, Aseem Rastogi, Nikhil Swamy, Santiago Zanella-Beguelin, ... -- Oakland 2017

"Pyramid: Enhancing Selectivity in Big Data Protection with Count Featurization"

Siddhartha Sen, ... -- Oakland 2017

"SoK: Science, Security, and the Elusive Goal of Security as a Scientific Pursuit"

Cormac Herley, ... -- Oakland 2017

"FAME: Fast Attribute-based Message Encryption"

Melissa Chase, ... -- CCS 2017

"Fast Private Set Intersection from Homomorphic Encryption"

Hao Chen (2), Kim Laine, ... -- CCS 2017

"HACL*: A Verified Modern Cryptographic Library"

Protzenko Jonathan, ... -- CCS 2017

"Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives"

Melissa Chase, Greg Zaverucha, ... -- CCS 2017

"Hacking in Darkness: Return-oriented Programming against Secure Enclaves"

Marcus Peinado, ... -- Usenix 2017

"Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing"

Marcus Peinado, ... -- Usenix 2017

"Speeding up detection of SHA-1 collision attacks using unavoidable attack conditions"

Daniel Shumow, ... -- Usenix 2017

"Vale: Verifying High-Performance Cryptographic Assembly Code"

Barry Bond, Chris Hawblitzel, K. Rustan M. Leino, Jacob R. Lorch, Srinath Setty, ... -- Usenix 2017

"EnclaveDB: A Secure Database using SGX"

Kapil Vaswani, Manuel Costa, ... -- Oakland 2018

"PIR with Compressed Queries and Amortized Query Processing"

Hao Chen, Kim Laine, Srinath Setty, ... -- Oakland 2018

"Labeled PSI from Fully Homomorphic Encryption with Malicious Security"

Hao Chen (2), Kim Laine, ... -- CCS 2018

"Secure Outsourced Matrix Computation and Application to Neural Networks"

Kristin Lauter, ... -- CCS 2018

"We Still Don't Have Secure Cross-Domain Requests: an Empirical Study of CORS"

Shuo Chen, ... -- Usenix 2018

"All Your GPS Are Belong To Us: Towards Stealthy Manipulation of Road Navigation Systems"

Yuanchao Shu, ... -- Usenix 2018

"Dominance as a New Trusted Computing Primitive for the Internet of Things"

Paul England, Marcus Peinado, Sangho Lee, Andrey Marochko, Dennis Mattoon, ... -- Oakland 2019

"Formally Verified Cryptographic Web Applications in WebAssembly"

Jonathan Protzenko, ... -- Oakland 2019

"Theory and Practice of Finding Eviction Sets"

Boris Kopf, ... -- Oakland 2019

"Efficient Multi-Key Homomorphic Encryption with Packed Ciphertexts with Application to Oblivious Neural Network Inference"

Hao Chen (2), Wei Dai, Yongsoo Song, ... -- CCS 2019

"Onion Ring ORAM: Efficient Constant Bandwidth Oblivious RAM from (Leveled) TFHE"

Hao Chen (2), ... -- CCS 2019

"Power Adjusting and Bribery Racing: Novel Mining Attacks in the Bitcoin System"

Shang Gao, ... -- CCS 2019

"SEEMless: Secure End-to-End Encrypted Messaging with less Trust"

Melissa Chase, Esha Ghosh, ... -- CCS 2019

"All Your Clicks Belong to Me: Investigating Click Interception on the Web"

Sangho Lee, ... -- Usenix 2019

"EverParse: Verified Secure Zero-Copy Parsers for Authenticated Message Formats"

Tahina Ramananandro, Antoine Delignat-Lavaud, Cedric Fournet, Nikhil Swamy, Jonathan Protzenko, ... -- Usenix 2019

"XONN: XNOR-based Oblivious Deep Neural Network Inference"

Hao Chen (2), Kim Laine, Kristin Lauter, ... -- Usenix 2019

"Are We Susceptible to Rowhammer? An End-to-End Methodology for Cloud Providers"

Lucian Cojocar, Stefan Saroiu, Alec Wolman, ... -- Oakland 2020

"Cornucopia: Temporal Safety for CHERI Heaps"

David Chisnall, ... -- Oakland 2020

"EverCrypt: A Fast, Verified, Cross-Platform Crytographic Provider"

Jonathan Protzenko, Chris Hawblitzel, Joonwon Choi, Antione Delignat-Lavaud, Cedric Fournet, Tahina Ramananandro, Nikhil Swamy, ... -- Oakland 2020

"Replicated State Machines Without Replicated Execution"

Jonathan Lee, Srinath Setty, ... -- Oakland 2020

"Spectector: Principled Detection of Speculative Information Flows"

Boris Kopf, ... -- Oakland 2020

"CrypTFlow2: Practical 2-Party Secure Inference"

Deevashwer Rathee, Mayank Rathee, Nishant Kumar, Nishanth Chandran, Divya Gupta, Aseem Rastogi, Rahul Sharma, ... -- CCS 2020

"HACL×N: Verified Generic SIMD Crypto (for all your favourite platforms)"

Jonathan Protzenko, Santiago Zanella-Beguelin, ... -- CCS 2020

"Analyzing Information Leakage of Updates to Natural Language Models"

Santiago Zanella-Beguelin, Lukas Wutschitz, Shruti Tople, Victor Ruhle, Andrew Paverd, Boris Kopf, Marc Brockschmidt, ... -- CCS 2020

"The Signal Private Group System and Anonymous Credentials Supporting Efficient Verifiable Encryption"

Melissa Chase, Greg Zaverucha, ... -- CCS 2020

"Visor: Privacy-Preserving Video Analytics as a Cloud Service"

Rishabh Poddar, Ganesh Ananthanarayanan, Srinath Setty, Stavros Volos, ... -- Usenix 2020

"SANNS: Scaling Up Secure Approximate k-Nearest Neighbors Search"

Hao Chen, Ilya Razenshteyn, ... -- Usenix 2020

"A Security Model and Fully Verified Implementation for the IETF QUIC Record Layer"

Antoine Delignat-Lavaud, Cedric Fournet, Jonathan Protzenko, Tahina Ramananandro, ... -- Oakland 2021

"Hardware-Software Contracts for Secure Speculation"

Boris Kopf, ... -- Oakland 2021

"SmartPulse: Automated Checking of Temporal Properties in Smart Contracts"

Shuvendu K. Lahiri, ... -- Oakland 2021

"HyperFuzzer: An Efficient Hybrid Fuzzer For Virtual CPUs"

Xinyang Ge, Patrice Godefroid, Weidong Cui, ... -- CCS 2021

"Labeled PSI from Homomorphic Encryption with Reduced Computation and Communication"

Radames Cruz Moreno, Wei Dai, Kim Laine, ... -- CCS 2021

"DICE*: A Formally Verified Implementation of DICE Measured Boot"

Aseem Rastogi, Naman Gupta, Kapil Vaswani, ... -- Usenix 2021

"CACTI: Captcha Avoidance via Client-side TEE Integration"

Andrew Paverd, ... -- Usenix 2021

"Leakage of Dataset Properties in Multi-Party Machine Learning"

Shruti Tople, ... -- Usenix 2021

"Stars Can Tell: A Robust Method to Defend against GPS Spoofing Attacks using Off-the-shelf Chipset"

Yuanchao Shu, ... -- Usenix 2021

"Transparency Dictionaries with Succinct Proofs of Correct Operation"

Srinath Setty, ... -- NDSS 2022

"A Secret-Free Hypervisor: Rethinking Isolation in the Age of Speculative Vulnerabilities"

Hongyan Xia, Istvan Haller, David Chisnall, ... -- Oakland 2022

"HardLog: Practical Tamper-Proof System Auditing Using a Novel Audit Device"

Sangho Lee, Marcus Peinado, ... -- Oakland 2022

"Noise: A Library of Verified High-Performance Secure Channel Protocol Implementations"

Jonathan Protzenko, ... -- Oakland 2022

"Property Inference from Poisoning"

Esha Ghosh, Melissa Chase, ... -- Oakland 2022

"Hecate: Lifting and Shifting On-Premises Workloads to an Untrusted Cloud"

Xinyang Ge, Weidong Cui, ... -- CCS 2022

"Ibex: Privacy-preserving Ad Conversion Tracking and Bidding"

Sebastian Angel, ... -- CCS 2022

"Proof-of-Possession for KEM Certificates using Verifiable Generation"

Greg Zaverucha, ... -- CCS 2022

"Shorter Signatures Based on Tailor-Made Minimalist Symmetric-Key Crypto"

Greg Zaverucha, ... -- CCS 2022

"Incremental Offline/Online PIR"

Sebastian Angel, ... -- Usenix 2022

"SIMC: ML Inference Secure Against Malicious Clients at Semi-Honest Cost"

Nishanth Chandran, Divya Gupta, Sai Lakshmi Bhavana Obbattu, ... -- Usenix 2022

"Counting in Regexes Considered Harmful: Exposing ReDoS Vulnerability of Nonbacktracking Matchers"

Margus Veanes, ... -- Usenix 2022

"Automated Detection of Automated Traffic"

Cormac Herley, ... -- Usenix 2022

"Efficient Representation of Numerical Optimization Problems for SNARKs"

Sebastian Angel, ... -- Usenix 2022