"Protocol-Independent Secrecy"
Jonathan Millen, Harald Ruess, ... -- Oakland 2000
"Efficient Fault-Tolerant Certificate Revocation"
Patrick Lincoln, Jonathan Millen, ... -- CCS 2000
"Constraint solving for bounded-process cryptographic protocol analysis"
Jonathan Millen, Vitaly Shmatikov, ... -- CCS 2001
"Intrusion-Tolerant Enclaves"
Bruno Dutertre, Valentin Crettaz, ... -- Oakland 2002
"Self-Healing Key Distribution with Revocation"
Drew Dean, ... -- Oakland 2002
"Setuid Demystified"
Drew Dean, ... -- Usenix 2002
"Model Checking One Million Lines of C Code"
Drew Dean, ... -- NDSS 2004
"Fixing Races for Fun and Profit: How to Use access(2)"
Drew Dean, ... -- Usenix 2004
"Privacy-Preserving Sharing and Correlation of Security Alerts"
Patrick Lincoln, Phillip Porras, Vitaly Shmatikov, ... -- Usenix 2004
"New Constructions and Practical Applications for Private Stream Searching (Extended Abstract)"
Brent Waters, ... -- Oakland 2006
"A Fully Collusion Resistant Broadcast, Trace, and Revoke System"
Brent Waters, ... -- CCS 2006
"Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data"
Brent Waters, ... -- CCS 2006
"Secure Attribute-Based Systems"
Brent Waters, ... -- CCS 2006
"Forward Secure Signatures with Untrusted Update"
Brent Waters, ... -- CCS 2006
"Cryptographic Methods for Storing Ballots on a Voting Machine"
Brent Waters, ... -- NDSS 2007
"Ciphertext-Policy Attribute-Based Encryption"
Brent Waters, ... -- Oakland 2007
"Attribute-Based Encryption with Non-Monotonic Access Structures"
Brent Waters, ... -- CCS 2007
"Harvesting Verifiable Challenges from Oblivious Online Sources"
Brent Waters, ... -- CCS 2007
"BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation"
Phillip Porras, Vinod Yegneswaran, Martin Fong, ... -- Usenix 2007
"Analysis-Resistant Malware"
Brent Waters, ... -- NDSS 2008
"Black Box Accountable Authority Identity-Based Encryption"
Brent Waters, ... -- CCS 2008
"Highly Predictive Blacklisting"
Phillip Porras, Jian Zhang, ... -- Usenix 2008
"BLADE: an attack-agnostic approach for preventing drive-by malware infections"
Vinod Yegneswaran, Phillip Porras, ... -- CCS 2010
"PathCutter: Severing the Self-Propagation Path of XSS JavaScript Worms in Social Web Networks"
Vinod Yegneswaran, Phillip Porras, ... -- NDSS 2012
"StegoTorus: A Camouflage Proxy for the Tor Anonymity System"
Vinod Yegneswaran, Linda Briesemeister, Steven Cheung, ... -- CCS 2012
"Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks"
Patrick Lincoln, ... -- Usenix 2012
"Aurasium: Practical Policy Enforcement for Android Applications"
Hassen Saidi, ... -- Usenix 2012
"FRESCO: Modular Composable Security Services for Software-Defined Networks"
Phillip Porras, Vinod Yegneswaran, Martin Fong, Mabry Tyson, ... -- NDSS 2013
"Clear and Present Data: Opaque Traffic and its Security Implications for the Future"
Phillip Porras, ... -- NDSS 2013
"AVANT-GUARD: Scalable and Vigilant Switch Flow Management in Software-Defined Networks"
Vinod Yegneswaran, Phillip Porras, ... -- CCS 2013
"Rosemary: A Robust, Secure, and High-performance Network Operating System"
Phillip Porras, Vinod Yegneswaran, ... -- CCS 2014
"EKHunter: A Counter-Offensive Toolkit for Exploit Kit Infiltration"
Phillip Porras, Vinod Yegneswaran, ... -- NDSS 2015
"P2C: Understanding Output Data Files via On-the-Fly Transformation from Producer to Consumer Executions"
Vinod Yegneswaran, ... -- NDSS 2015
"Securing the Software Defined Network Control Layer"
Phillip Porras, Martin Fong, Vinod Yegneswaran, Steven Cheung, Keith Skinner, ... -- NDSS 2015
"CHERI: A Hybrid Capability-System Architecture for Scalable Software Compartmentalization"
Peter G. Neumann, Nirav Dave, Brooks Davis, ... -- Oakland 2015
"Clean Application Compartmentalization with SOAAP"
Brooks Davis, Peter G. Neumann, ... -- CCS 2015
"Revisiting Square-Root ORAM: Efficient Random Access in Multi-Party Computation"
Mariana Raykova, ... -- Oakland 2016
"DELTA: A Security Assessment Framework for Software-Defined Networks"
Vinod Yegneswaran, Phillip Porras, ... -- NDSS 2017
"MCI : Modeling-based Causality Inference in Audit Logging for Attack Investigation."
Gabriela Ciocarlie, Ashish Gehani, Vinod Yegneswaran, ... -- NDSS 2018
"Thunderclap: Exploiting the Attack Surface of Operating-System IOMMU Protection with DMA from Malicious Peripherals"
Peter G. Neumann, ... -- NDSS 2019
"A High-Assurance Evaluator for Machine-Checked Secure Multiparty Computation"
Karim Eldefrawy, ... -- CCS 2019
"VRASED: A Verified Hardware/Software Co-Design for Remote Attestation"
Karim Eldefrawy, ... -- Usenix 2019
"Cornucopia: Temporal Safety for CHERI Heaps"
Brooks Davis, Peter G. Neumann, ... -- Oakland 2020
"Rigorous Engineering for Hardware Security: Formal Modelling and Proof in the CHERI Design and Implementation Process"
Peter G. Neumann, ... -- Oakland 2020
"APEX: A Verified Architecture for Proofs of Execution on Remote Devices under Full Software Compromise"
Karim Eldefrawy, ... -- Usenix 2020
"ALchemist: Fusing Application and Audit Logs for Precise Attack Provenance without Instrumentation"
Gabriela Ciocarlie, Vinod Yegneswaran, Ashish Gehani, ... -- NDSS 2021
"Machine-checked ZKP for NP relations: Formally Verified Security Proofs and Implementations of MPC-in-the-Head"
Karim Eldefrawy, Stephane Graham-Lengrand, Vitor Pereira, ... -- CCS 2021
"CLARION: Sound and Clear Provenance Tracking for Microservice Deployments"
Hassaan Irshad, Ashish Gehani, Vinod Yegneswaran, ... -- Usenix 2021