"A First Step Towards the Automatic Generation of Security Protocols"
Adrian Perrig, Dawn Song, ... -- NDSS 2000
"Why 6? Defining the Operational Limits of stide"
Kymie M.C. Tan, Roy A. Maxion, ... -- Oakland 2002
"Automated Generation and Analysis of Attack Graphs"
Oleg Sheyner, Jeannette M. Wing, ... -- Oakland 2002
"Toward Speech-Generated Cryptographic Keys on Resource-Constrained Devices"
Michael K. Reiter, ... -- Usenix 2002
"Efficient Security Mechanisms for Routing Protocols"
Yih-Chun Hu, Adrian Perrig, ... -- NDSS 2003
"Defending Against Denial-of-Service Attacks with Puzzle Auctions"
XiaoFeng Wang, Michael K. Reiter, ... -- Oakland 2003
"Pi: A Path Identification Mechanism to Defend against DDoS Attacks"
Abraham Yaar, Adrian Perrig, Dawn Song, ... -- Oakland 2003
"Random Key Predistribution Schemes for Sensor Networks"
Haowen Chan, Adrian Perrig, Dawn Song, ... -- Oakland 2003
"k-anonymous message transmission"
Luis von Ahn, Andrew Bortz, Nicholas Hopper, ... -- CCS 2003
"Automatic generation of two-party computations"
Alina Oprea, Michael K. Reiter, ... -- CCS 2003
"Storage-based Intrusion Detection: Watching Storage Activity for Suspicious Behavior"
Adam G. Pennington, John D. Strunk, John Linwood Griffin, Craig A.N. Soules, Garth R. Goodson, Gregory R. Ganger, ... -- Usenix 2003
"Distillation Codes and Applications to DoS Resistant Multicast Authentication"
Adrian Perrig, ... -- NDSS 2004
"An empirical analysis of target-resident DoS filters"
Michael K. Reiter, ... -- Oakland 2004
"SIFF: A Stateless Internet Flow Filter to Mitigate DDoS Flooding Attacks"
Abraham Yaar, Dawn Song, Adrian Perrig, ... -- Oakland 2004
"Securing OLAP Data Cubes Against Privacy Breaches"
Michael K. Reiter, ... -- Oakland 2004
"SWAtt: Software-based Attestation for Embedded Devices"
Arvind Seshadri, Adrian Perrig, Pradeep Khosla, ... -- Oakland 2004
"Fragile Mixing"
Michael K. Reiter, ... -- CCS 2004
"Mitigating Bandwidth-Exhaustion Attacks using Congestion Puzzles"
Michael K. Reiter, ... -- CCS 2004
"Gray-Box Extraction of Execution Graphs for Anomaly Detection"
Debin Gao, Michael K. Reiter, Dawn Song, ... -- CCS 2004
"Privtrans: Automatically Partitioning Programs for Privilege Separation"
David Brumley, Dawn Song, ... -- Usenix 2004
"On Gray-Box Program Tracking for Anomaly Detection"
Debin Gao, Michael K. Reiter, Dawn Song, ... -- Usenix 2004
"On User Choice in Graphical Password Schemes"
Michael K. Reiter, ... -- Usenix 2004
"Autograph: Toward Automated, Distributed Worm Signature Detection"
Hyang-Ah Kim, Brad Karp, ... -- Usenix 2004
"Space-Efficient Block Storage Integrity"
Alina Oprea, Michael K. Reiter, ... -- NDSS 2005
"New Streaming Algorithms for Fast Detection of Superspreaders"
Shobha Venkataraman, Dawn Song, Avrim Blum, ... -- NDSS 2005
"Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software"
James Newsome, Dawn Song, ... -- NDSS 2005
"Semantics-Aware Malware Detection"
Sanjit A. Seshia, Dawn Song, Randal E. Bryant, ... -- Oakland 2005
"Distributed Detection of Node Replication Attacks in Sensor Networks"
Bryan Parno, Adrian Perrig, ... -- Oakland 2005
"Detection of Denial-Of-Message Attacks on Sensor Network Broadcasts"
Jonathan M. McCune, Elaine Shi, Adrian Perrig, Michael K. Reiter, ... -- Oakland 2005
"Distributed Proving in Access-Control Systems"
Lujo Bauer, Scott Garriss, Michael K. Reiter, ... -- Oakland 2005
"Seeing-Is-Believing: Using Camera Phones For Human-Verifiable Authentication"
Jonathan M. McCune, Adrian Perrig, Michael K. Reiter, ... -- Oakland 2005
"Bind: A Time-Of-Use Attestation Service For Secure Distributed System"
Elaine Shi, Adrian Perrig, ... -- Oakland 2005
"Polygraph: Automatically Generating Signatures For Polymorphic Worms"
James Newsome, Dawn Song, ... -- Oakland 2005
"Worm Origin Identification Using Random Moonwalks"
Yinglian Xie, Vyas Sekar, David A. Maltz, Michael K. Reiter, Hui Zhang, ... -- Oakland 2005
"Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software"
James Newsome, David Brumley, Dawn Song, Jad Chamcham, Xeno Kovah, ... -- NDSS 2006
"Towards Automatic Generation of Vulnerability-Based Signatures"
David Brumley, James Newsome, Dawn Song, Hao Wang, ... -- Oakland 2006
"New Constructions and Practical Applications for Private Stream Searching (Extended Abstract)"
John Bethencourt, Dawn Song, ... -- Oakland 2006
"Packet Vaccine: Black-box Exploit Detection and Signature Generation"
Michael K. Reiter, ... -- CCS 2006
"Secure Hierarchical In-Network Aggregation in Sensor Networks"
Haowen Chan, Adrian Perrig, Dawn Song, ... -- CCS 2006
"Replayer: Automatic Protocol Replay by Binary Analysis"
James Newsome, David Brumley, Jason Franklin, Dawn Song, ... -- CCS 2006
"SANE: A Protection Architecture for Enterprise Networks"
Aditya Akella, ... -- Usenix 2006
"Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting"
Jason Franklin, ... -- Usenix 2006
"Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces"
Michael Collins, Michael K. Reiter, ... -- NDSS 2007
"Fig: Automatic Fingerprint Generation"
Shobha Venkataraman, Juan Caballero, Pongsin Poosankam, Min Gyung Kang, Dawn Song, ... -- NDSS 2007
"Phinding Phish: An Evaluation of Anti-Phishing Toolbars"
Lorrie Faith Cranor, Serge Egelman, Jason Hong, Yue Zhang, ... -- NDSS 2007
"Consumable Credentials in Linear-Logic-Based Access-Control Systems"
Kevin D. Bowers, Lujo Bauer, Deepak Garg, Frank Pfenning, Michael K. Reiter, ... -- NDSS 2007
"Cryptographic Methods for Storing Ballots on a Voting Machine"
John Bethencourt, ... -- NDSS 2007
"RICH: Automatically Protecting Against Integer-Based Vulnerabilities"
David Brumley, Dawn Song, ... -- NDSS 2007
"Generic Application-Level Protocol Analyzer and its Language"
David Brumley, ... -- NDSS 2007
"Minimal TCB Code Execution"
Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, Arvind Seshadri, ... -- Oakland 2007
"Ciphertext-Policy Attribute-Based Encryption"
John Bethencourt, ... -- Oakland 2007
"Multi-Dimensional Range Query over Encrypted Data"
Elaine Shi, John Bethencourt, T-H. Hubert Chan, Dawn Song, Adrian Perrig, ... -- Oakland 2007
"Panorama: Capturing System-wide Information Flow for Malware Detection and Analysis"
Heng Yin, Dawn Song, ... -- CCS 2007
"Polyglot: Automatic Extraction of Protocol Format using Dynamic Binary Analysis"
Juan Caballero, Dawn Song, ... -- CCS 2007
"An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants"
Jason Franklin, Adrian Perrig, ... -- CCS 2007
"Provable Data Possession at Untrusted Stores"
Dawn Song, ... -- CCS 2007
"Exploiting Network Structure for Proactive Spam Mitigation"
Shobha Venkataraman, Dawn Song, ... -- Usenix 2007
"Integrity Checking in Cryptographic File Systems with Constant Trusted Storage"
Alina Oprea, Michael K. Reiter, ... -- Usenix 2007
"Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation"
David Brumley, Juan Caballero, Zhenkai Liang, James Newsome, Dawn Song, ... -- Usenix 2007
"On Web Browsing Privacy in Anonymized NetFlows"
Michael Collins, Michael K. Reiter, ... -- Usenix 2007
"A New Privacy-Enhanced Matchmaking Protocol"
Virgil Gligor, ... -- NDSS 2008
"Would Diversity Really Increase the Robustness of the Routing Infrastructure against Software Defects?"
Juan Caballero, Theocharis Kampouris, Dawn Song, ... -- NDSS 2008
"HookFinder: Identifying and Understanding Malware Hooking Behaviors"
Heng Yin, Zhenkai Liang, Dawn Song, ... -- NDSS 2008
"Limits of Learning-based Signature Generation with Adversaries"
Shobha Venkataraman, Avrim Blum, ... -- NDSS 2008
"Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications"
David Brumley, Pongsin Poosankam, ... -- Oakland 2008
"Efficient Security Primitives Derived from a Secure Aggregation Algorithm"
Haowen Chan, Adrian Perrig, ... -- CCS 2008
"Unidirectional Key Distribution Across Time and Space with Applications to RFID Security"
Bryan Parno, ... -- Usenix 2008
"Safe Passage for Passwords and Other Sensitive Data"
Jonathan M. McCune, Adrian Perrig, ... -- NDSS 2009
"Noninterference for a Practical DIFC-Based Operating System"
Maxwell Krohn, ... -- Oakland 2009
"CLAMP: Practical Prevention of Large-Scale Data Leaks"
Adrian Perrig, Jonathan M. McCune, Bryan Parno, Dan Wendlandt, David Andersen, ... -- Oakland 2009
"A Logic of Secure Systems and its Application to Trusted Computing"
Anupam Datta, Jason Franklin, Deepak Garg, Dilsun Kaynar, ... -- Oakland 2009
"Secure Content Sniffing for Web Browsers, or How to Stop Papers from Reviewing Themselves"
Juan Caballero, ... -- Oakland 2009
"It's No Secret. Measuring the Security and Reliability of Authentication via 'Secret' Questions"
Serge Egelman, ... -- Oakland 2009
"Scalable onion routing with torsk"
Andrew Tran, ... -- CCS 2009
"Crying Wolf: An Empirical Study of SSL Warning Effectiveness"
Lorrie Faith Cranor, Serge Egelman, Joshua Sunshine, Hazim Almuhimedi, Neha Atri, ... -- Usenix 2009
"FLAX: Systematic Discovery of Client-side Validation Vulnerabilities in Rich Web Applications"
Pongsin Poosankam, ... -- NDSS 2010
"Contractual Anonymity"
Edward J. Schwartz, David Brumley, Jonathan M. McCune, ... -- NDSS 2010
"Binary Code Extraction and Interface Identification for Security Applications"
Juan Caballero, ... -- NDSS 2010
"TrustVisor: Efficient TCB Reduction and Attestation"
Jonathan M. McCune, Yanlin Li, Zongwei Zhou, Anupam Datta, Virgil Gligor, Adrian Perrig, ... -- Oakland 2010
"Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes"
Haowen Chan, Adrian Perrig, ... -- Oakland 2010
"All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution but might have been afraid to ask"
Thanassis Avgerinos, Edward J. Schwartz, David Brumley, ... -- Oakland 2010
"A Proof-Carrying File System"
Deepak Garg, Frank Pfenning, ... -- Oakland 2010
"Scalable Parametric Verification of Secure Systems: How to Verify Reference Monitors without Worrying about Data Structure Size"
Jason Franklin, Sagar Chaki, Anupam Datta, ... -- Oakland 2010
"Bootstrapping Trust in Commodity Computers"
Bryan Parno, Jonathan M. McCune, Adrian Perrig, ... -- Oakland 2010
"Dissecting one click frauds"
Nicolas Christin, Sally S. Yanagihara, Keisuke Kamataki, ... -- CCS 2010
"Input generation via decomposition and re-stitching: finding bugs in Malware"
Juan Caballero, Pongsin Poosankam, ... -- CCS 2010
"Platform-independent programs"
Sang Kil Cha, Brian Pak, David Brumley, ... -- CCS 2010
"Protecting browsers from cross-origin CSS attacks"
Lin-Shung Huang, Zack Weinberg, Collin Jackson, ... -- CCS 2010
"An Analysis of Private Browsing Modes in Modern Browsers"
Collin Jackson, ... -- Usenix 2010
"TIE: Principled Reverse Engineering of Types in Binary Programs"
JongHyup Lee, Thanassis Avgerinos, David Brumley, ... -- NDSS 2011
"DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation"
Min Gyung Kang, Pongsin Poosankam, ... -- NDSS 2011
"AEG: Automatic Exploit Generation"
Thanassis Avgerinos, Sang Kil Cha, Brent Lim Tze Hao, David Brumley, ... -- NDSS 2011
"Usability Testing a Malware-Resistant Input Mechanism"
Jonathan M. McCune, ... -- NDSS 2011
"I Still Know What You Visited Last Summer: User interaction and side-channel attacks on browsing history"
Zachary Weinberg, Eric Chen, Pavithra Ramesh Jayaraman, Collin Jackson, ... -- Oakland 2011
"Verification of Information Flow and Access Control Policies via Dependent Types"
Deepak Garg, ... -- Oakland 2011
"SCION: Scalability, Control, and Isolation On Next-Generation Networks"
Xin Zhang, Hsu-Chun Hsiao, Geoffrey Hasker, Haowen Chan, Adrian Perrig, David Andersen, ... -- Oakland 2011
"Differential Slicing: Identifying Causal Execution Differences for Security Applications"
Pongsin Poosankam, ... -- Oakland 2011
"Memoir: Practical State Continuity for Protected Modules"
Jonathan M. McCune, ... -- Oakland 2011
"VIPER: Verifying the Integrity of PERipherals' Firmware"
Yanlin Li, Jonathan M. McCune, Adrian Perrig, ... -- CCS 2011
"Policy Auditing over Incomplete Logs: Theory, Implementation and Applications"
Deepak Garg, Limin Jia, Anupam Datta, ... -- CCS 2011
"Fashion Crimes: Trending-Term Exploitation on the Web"
Nektarios Leontiadis, Nicolas Christin, ... -- CCS 2011
"BitShred: Feature Hashing Malware for Scalable Triage and Semantic Analysis"
Jiyong Jang, David Brumley, ... -- CCS 2011
"App Isolation: Get the Security of Multiple Browsers with Just One"
Eric Chen, Collin Jackson, ... -- CCS 2011
"MACE: Model-inference-Assisted Concolic Exploration for Protocol and Vulnerability Discovery"
Pongsin Poosankam, ... -- Usenix 2011
"Q: Exploit Hardening Made Easy"
Edward J. Schwartz, Thanassis Avgerinos, David Brumley, ... -- Usenix 2011
"Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade"
Nektarios Leontiadis, Nicolas Christin, ... -- Usenix 2011
"ShortMAC: Efficient Data-Plane Fault Localization"
Xin Zhang, Zongwei Zhou, Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim, Adrian Perrig, Patrick Tague, ... -- NDSS 2012
"The Case for Prefetching and Prevalidating TLS Server Certificates"
Lin-Shung Huang, Dinesh Israni, Collin Jackson, ... -- NDSS 2012
"ReDeBug: Finding Unpatched Code Clones in Entire OS Distributions"
Jiyong Jang, Abeer Agrawal, David Brumley, ... -- Oakland 2012
"Formalizing and Enforcing Purpose Restrictions of Privacy Policies"
Michael Carl Tschantz, Anupam Datta, Jeannette M. Wing, ... -- Oakland 2012
"Scalable Fault Localization under Dynamic Traffic Patterns"
Xin Zhang, Adrian Perrig, ... -- Oakland 2012
"Unleashing Mayhem on Binary Code"
Sang Kil Cha, Thanassis Avgerinos, Alexandre Rebert, David Brumley, ... -- Oakland 2012
"LAP: Lightweight Anonymity and Privacy"
Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim, Adrian Perrig, ... -- Oakland 2012
"Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms"
Patrick Gage Kelley, Saranga Komanduri, Michelle L. Mazurek, Richard Shay, Tim Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Julio Lopez, ... -- Oakland 2012
"Building Verifiable Trusted Path on Commodity X86 Computers"
Zongwei Zhou, Virgil Gligor, James Newsome, Jonathan M. McCune, ... -- Oakland 2012
"Towards a Bayesian Network Game Framework for Evaluating DDoS Attacks and Defense"
Ritchie Lee, ... -- CCS 2012
"GPS Software Attacks"
Tyler Nighswander, David Brumley, ... -- CCS 2012
"Operating System Framed in Case of Mistaken Identity"
Cristian Bravo-Lillo, Lorrie Faith Cranor, Julie Downs, Saranga Komanduri, Manya Sleeper, ... -- CCS 2012
"OTO: Online Trust Oracle for User-Centric Trust Establishment"
Tiffany Hyun-Jin Kim, Jun Han, Emmanuel Owusu, Jason Hong, Adrian Perrig, ... -- CCS 2012
"StegoTorus: A Camouflage Proxy for the Tor Anonymity System"
Zachary Weinberg, ... -- CCS 2012
"How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation"
Blase Ur, Patrick Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michelle L. Mazurek, Timothy Passaro, Richard Shay, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, ... -- Usenix 2012
"Clickjacking: Attacks and Defenses"
Lin-Shung Huang, Collin Jackson, ... -- Usenix 2012
"Tachyon: Tandem Execution for Efficient Live Patch Testing"
Matthew Maurer, David Brumley, ... -- Usenix 2012
"COMPA: Detecting Compromised Accounts on Social Networks"
Manuel Egele, ... -- NDSS 2013
"Automatically Inferring the Evolution of Malicious Activity on the Internet"
David Brumley, ... -- NDSS 2013
"The Crossfire Attack"
Min Suk Kang, Soo Bum Lee, Virgil Gligor, ... -- Oakland 2013
"Design, Implementation and Verification of an eXtensible and Modular Hypervisor Framework"
Amit Vasudevan, Sagar Chaki, Limin Jia, Anupam Datta, ... -- Oakland 2013
"OASIS: On Achieving a Sanctuary for Integrity and Secrecy on Untrusted Platforms"
Emmanuel Owusu, Jonathan M. McCune, Jim Newsome, Adrian Perrig, Amit Vasudevan, ... -- CCS 2013
"Policy-based Secure Deletion"
Hsu-Chun Hsiao, ... -- CCS 2013
"An Empirical Study of Cryptographic Misuse in Android Applications"
Manuel Egele, David Brumley, ... -- CCS 2013
"Cross-Origin Pixel Stealing: Timing Attacks Using CSS Filters"
Robert Kotcher, Yutong Pei, Pranjal Jumde, Collin Jackson, ... -- CCS 2013
"Measuring Password Guessability for an Entire University"
Michelle L. Mazurek, Saranga Komanduri, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Richard Shay, Blase Ur, ... -- CCS 2013
"Scheduling Blackbox Mutational Fuzzing"
Maverick Woo, Sang Kil Cha, Samantha Gottlieb, David Brumley, ... -- CCS 2013
"Towards Automatic Software Lineage Inference"
Jiyong Jang, Maverick Woo, David Brumley, ... -- Usenix 2013
"Native x86 Decompilation Using Semantics-Preserving Structural Analysis and Iterative Control-Flow Structuring"
Edward J. Schwartz, Maverick Woo, David Brumley, ... -- Usenix 2013
"ROPecker: A Generic and Practical Approach For Defending Against ROP Attacks"
Zongwei Zhou, Miao Yu, ... -- NDSS 2014
"All Your Screens Are Belong to Us: Attacks Exploiting the HTML5 Screen Sharing API"
Yuan Tian, Ying-Chuan Liu, Amar Bhosale, Lin-Shung Huang, Patrick Tague, Collin Jackson, ... -- Oakland 2014
"Analyzing Forged SSL Certificates in the Wild"
Lin-Shung Huang, Collin Jackson, ... -- Oakland 2014
"Dancing with Giants: Wimpy Kernels for On-demand Isolated I/O on Commodity Platforms"
Zongwei Zhou, Miao Yu, Virgil Gligor, ... -- Oakland 2014
"Bootstrapping Privacy Compliance in Big Data Systems"
Shayak Sen, Anupam Datta, ... -- Oakland 2014
"Increasing Security Sensitivity With Social Proof: A Large-Scale Experimental Confirmation"
Sauvik Das, Laura A. Dabbish, Jason Hong, ... -- CCS 2014
"Routing Bottlenecks in the Internet - Causes, Exploits, and Countermeasures"
Min Suk Kang, Virgil Gligor, ... -- CCS 2014
"OAuth Demystified for Mobile Application Developers"
Eric Chen, Yutong Pei, Yuan Tian, Robert Kotcher, Patrick Tague, ... -- CCS 2014
"A Nearly Four-Year Longitudinal Study of Search-Engine Poisoning"
Nektarios Leontiadis, Nicolas Christin, ... -- CCS 2014
"Mechanized Network Origin and Path Authenticity Proofs"
Fuyuan Zhang, Limin Jia, Tiffany Hyun-Jin Kim, ... -- CCS 2014
"PoliCert: Secure and Flexible TLS Certificate Management"
Stephanos Matsumoto, ... -- CCS 2014
"ARPKI: Attack Resilient Public-key Infrastructure"
Tiffany Hyun-Jin Kim, ... -- CCS 2014
"Password Managers: Risks, Pitfalls, and Improvements"
Eric Chen, Collin Jackson, ... -- Usenix 2014
"Telepathwords: Preventing Weak Passwords by Reading Users' Minds"
Saranga Komanduri, Rich Shay, Lorrie Faith Cranor, ... -- Usenix 2014
"Automatically Detecting Vulnerable Websites Before They Turn Malicious"
Kyle Soska, Nicolas Christin, ... -- Usenix 2014
"The Long "Taile" of Typosquatting Domain Names"
Janos Szurdi, Jonathan M. Spring, ... -- Usenix 2014
"Blanket Execution: Dynamic Similarity Testing for Program Binaries and Components"
Manuel Egele, Maverick Woo, Peter Chapman, David Brumley, ... -- Usenix 2014
"Optimizing Seed Selection for Fuzzing"
Alexandre Rebert, Sang Kil Cha, Thanassis Avgerinos, David Brumley, ... -- Usenix 2014
"BYTEWEIGHT: Learning to Recognize Functions in Binary Code"
Tiffany Bao, Jonathan Burket, Maverick Woo, David Brumley, ... -- Usenix 2014
"Run-time Monitoring and Formal Analysis of Information Flows in Chromium"
Lujo Bauer, Limin Jia, Timothy Passaro, Michael Stroucken, Yuan Tian, ... -- NDSS 2015
"Spaced Repetition and Mnemonics Enable Recall of Multiple Strong Passwords"
Jeremiah Blocki, Saranga Komanduri, Lorrie Faith Cranor, Anupam Datta, ... -- NDSS 2015
"Program-Adaptive Mutational Fuzzing"
Sang Kil Cha, Maverick Woo, David Brumley, ... -- Oakland 2015
"Securing Multiparty Online Services via Certified Symbolic Transactions"
Eric Chen, ... -- Oakland 2015
"HORNET: High-speed Onion Routing at the Network Layer"
Chen Chen, ... -- CCS 2015
"Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits"
Limin Jia, Anupam Datta, ... -- CCS 2015
"Observing and Preventing Leakage in MapReduce"
Divya Sharma, ... -- CCS 2015
"Nomad: Mitigating Arbitrary Cloud Side Channels via Provider-Assisted Migration"
Soo-Jin Moon, Vyas Sekar, ... -- CCS 2015
"Trusted Display on Untrusted Commodity Platforms"
Miao Yu, Virgil Gligor, Zongwei Zhou, ... -- CCS 2015
"Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem"
Kyle Soska, Nicolas Christin, ... -- Usenix 2015
"Measuring Real-World Accuracies and Biases in Modeling Password Guessability"
Blase Ur, Sean M. Segreti, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Saranga Komanduri, Darya Kurilova, Michelle L. Mazurek, William Melicher, Richard Shay, ... -- Usenix 2015
"Flexible and Elastic DDoS Defense using Bohatei"
Seyed K. Fayaz, Yoshiaki Tobioka, Vyas Sekar, ... -- Usenix 2015
"SPIFFY: Inducing Cost-Detectability Tradeoffs for Persistent Link-Flooding Attacks"
Min Suk Kang, Virgil Gligor, Vyas Sekar, ... -- NDSS 2016
"Towards Automated Dynamic Analysis for Linux-based Embedded Firmware"
Daming D. Chen, Maverick Woo, David Brumley, ... -- NDSS 2016
"Differentially Private Password Frequency Lists"
Anupam Datta, ... -- NDSS 2016
"Algorithmic Transparency via Quantitative Input Influence: Theory and Experiments with Learning Systems"
Anupam Datta, Shayak Sen, Yair Zick, ... -- Oakland 2016
"High-Speed Inter-domain Fault Localization"
Haoming Zhang, ... -- Oakland 2016
"Build It, Break It, Fix It: Contesting Secure Development"
Piotr Mardziel, ... -- CCS 2016
"Accessorize to a Crime: Real and Stealthy Attacks on State-Of-The-Art Face Recognition"
Mahmood Sharif, Sruti Bhagavatula, Lujo Bauer, ... -- CCS 2016
"UberSpark: Enforcing Secure Object Abstractions for Automated Compositional Security Analysis of a Hypervisor"
Amit Vasudevan, Sagar Chaki, Limin Jia, Anupam Datta, ... -- Usenix 2016
"Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks"
William Melicher, Blase Ur, Sean M. Segreti, Saranga Komanduri, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, ... -- Usenix 2016
"PSI: Precise Security Instrumentation for Enterprise Networks"
Tianlong Yu, Seyed K. Fayaz, Vyas Sekar, Srinivasan Seshan, ... -- NDSS 2017
"Automated Analysis of Privacy Requirements for Mobile Apps"
Sebastian Zimmeck, Ziqi Wang, Lieyong Zou, Bin Liu, Norman Sadeh, ... -- NDSS 2017
"IKP: Turning a PKI Around with Decentralized Automated Incentives"
Stephanos Matsumoto, ... -- Oakland 2017
"IVD: Automatic Learning and Enforcement of Authorization Rules in Online Social Networks"
Yuan Tian, Patrick Tague, ... -- Oakland 2017
"Verifying and Synthesizing Constant-Resource Implementations with Types"
Van Chan Ngo, Mario Dehesa-Azuara, Matthew Fredrikson, Jan Hoffmann, ... -- Oakland 2017
"Your Exploit is Mine: Automatic Shellcode Transplant for Remote Exploits"
Tiffany Bao, David Brumley, ... -- Oakland 2017
"Let's go in for a closer look: Observing passwords in their natural habitat"
Sarah Pearman, Jeremy Thomas, Pardis Emami Naeini, Hana Habib, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, ... -- CCS 2017
"Use Privacy in Data-Driven Systems: Theory and Experiments with Machine Learnt Programs"
Anupam Datta, Matthew Fredrikson, Gihyuk Ko, Piotr Mardziel, Shayak Sen, ... -- CCS 2017
"Verified Correctness and Security of mbedTLS HMAC-DRBG"
Katherine Q. Ye, ... -- CCS 2017
"SmartAuth: User-Centered Authorization for the Internet of Things"
Yuan Tian, Xianzheng Guo, Patrick Tague, ... -- Usenix 2017
"Vale: Verifying High-Performance Cryptographic Assembly Code"
Bryan Parno, ... -- Usenix 2017
"A Privacy Analysis of Cross-device Tracking"
Sebastian Zimmeck, ... -- Usenix 2017
"Riding out DOMsday: Towards Detecting and Preventing DOM Cross-Site Scripting."
William Melicher, Anupam Das, Mahmood Sharif, Lujo Bauer, Limin Jia, ... -- NDSS 2018
"Do You Feel What I Hear? Enabling Autonomous IoT Device Pairing using Different Sensor Types"
Jun Han, Albert Jin Chung, Manal Kumar Sinha, Madhumitha Harishankar, Shijia Pan, Hae Young Noh, Pei Zhang, Patrick Tague, ... -- Oakland 2018
"When Good Components Go Bad: Formally Secure Compilation Despite Dynamic Compromise"
Arthur Azevedo de Amorim, ... -- CCS 2018
"Predicting Impending Exposure to Malicious Content from User Behavior"
Mahmood Sharif, Nicolas Christin, ... -- CCS 2018
"Using Logic Programming to Recover C++ Classes and Methods from Compiled Executables"
Edward J. Schwartz, Cory Cohen, Jeff Havrilla, Jeff Gennari, Charles Hines, Michael Duggan, ... -- CCS 2018
"nanoPI: Extreme-Scale Actively-Secure Multi-Party Computation"
Darion Cassel, ... -- CCS 2018
"Web's Sixth Sense: A Study of Scripts Accessing Smartphone Sensors"
Anupam Das, ... -- CCS 2018
"Plug and Prey? Measuring the Commoditization of Cybercrime via Online Anonymous Markets"
Kyle Soska, Nicolas Christin, ... -- Usenix 2018
"Establishing Software Root of Trust Unconditionally"
Virgil Gligor, ... -- NDSS 2019
"Towards Practical Differentially Private Convex Optimization"
Roger Iyengar, ... -- Oakland 2019
"Prism: Deconstructing the Blockchain to Approach Physical Limits"
Giulia Fanti, ... -- CCS 2019
"Succinct Arguments for Bilinear Group Arithmetic: Practical Structure-Preserving Cryptography"
Giulio Malavolta, ... -- CCS 2019
"CANvas: Fast and Inexpensive Automotive Network Mapping"
Sekar Kulandaivel, Tushar Goyal, Arnav Kumar Agrawal, Vyas Sekar, ... -- Usenix 2019
"Are We Susceptible to Rowhammer? An End-to-End Methodology for Cloud Providers"
Jeremie Kim, Onur Mutlu, ... -- Oakland 2020
"Ask the Experts: What Should Be on an IoT Privacy and Security Label?"
Pardis Emami Naeini, Yuvraj Agarwal, Lorrie Faith Cranor, Hanan Hibshi, ... -- Oakland 2020
"EverCrypt: A Fast, Verified, Cross-Platform Crytographic Provider"
Bryan Parno, Aymeric Fromherz, ... -- Oakland 2020
"Flash Boys 2.0: Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability"
Xueyuan Zhao, ... -- Oakland 2020
"ICLab: A Global, Longitudinal Internet Censorship Measurement Platform"
Zachary Weinberg, Nicholas Christin, ... -- Oakland 2020
"SoK: Differential Privacy as a Causal Property"
Shayak Sen, Anupam Datta, ... -- Oakland 2020
"A Generic Technique for Automatically Finding Defense-Aware Code Reuse Attacks"
Edward J. Schwartz, Cory Cohen, Jeff Gennari, ... -- CCS 2020
"HACL×N: Verified Generic SIMD Crypto (for all your favourite platforms)"
Aymeric Fromherz, ... -- CCS 2020
"Definitive recommendations for stronger, more usable passwords combining minimum-strength, minimum-length, and blacklist requirements"
Joshua Tan, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, ... -- CCS 2020
"Is the Classical GMW Paradigm Practical? The Case of Non-Interactive Actively Secure 2PC"
Jackson Abascal, ... -- CCS 2020
"The Impact of Ad-Blockers on Product Search and Purchase Behavior: A Lab Experiment"
Amelia Haviland, Alessandro Acquisti, ... -- Usenix 2020
"Stolen Memories: Leveraging Model Memorization for Calibrated White-Box Membership Inference"
Klas Leino, Matt Fredrikson, ... -- Usenix 2020
"SquirRL: Automating Attack Analysis on Blockchain Incentive Mechanisms with Deep Reinforcement Learning"
Charlie Hou, Giulia Fanti, ... -- NDSS 2021
"A Security Model and Fully Verified Implementation for the IETF QUIC Record Layer"
Bryan Parno, Jay Bosamiya, Yi Zhou, ... -- Oakland 2021
"An I/O Separation Model for Formal Verification of Kernel Implementations"
Miao Yu, Virgil Gligor, Limin Jia, ... -- Oakland 2021
"CANnon: Reliable and Stealthy Remote Shutdown Attacks via Unaltered Automotive Microcontrollers"
Sekar Kulandaivel, Vyas Sekar, ... -- Oakland 2021
"Self-Supervised Euphemism Detection and Identification for Content Moderation"
Rohan Bansal, Nicolas Christin, Giulia Fanti, ... -- Oakland 2021
"SoK: Computer-Aided Cryptography"
Bryan Parno, ... -- Oakland 2021
"Which Privacy and Security Attributes Most Impact Consumers‚ Risk Perception and Willingness to Purchase IoT Devices?"
Janarth Dheenadhayalan, Yuvraj Agarwal, Lorrie Faith Cranor, ... -- Oakland 2021
"Key Agreement for Decentralized Secure Group Messaging with Strong Security Guarantees"
Matthew Weidner, ... -- CCS 2021
"Cerebro: A Platform for Multi-Party Cryptographic Collaborative Learning"
Wenting Zheng, ... -- Usenix 2021
"Causal Analysis for Software-Defined Networking Attacks"
William H. Sanders, ... -- Usenix 2021
"Jaqen: A High-Performance Switch-Native Approach for Detecting and Mitigating Volumetric DDoS Attacks with Programmable Switches"
Hun Namkung, Vyas Sekar, ... -- Usenix 2021
"Accurately Measuring Global Risk of Amplification Attacks using AmpMap"
Soo-Jin Moon, Yucheng Yin, Rahul Anand Sharma, Jonathan M. Spring, Vyas Sekar, ... -- Usenix 2021
"Capture: Centralized Library Management for Heterogeneous IoT Devices"
Han Zhang, Abhijith Anilkumar, Matt Fredrikson, Yuvraj Agarwal, ... -- Usenix 2021
"Transparency Dictionaries with Succinct Proofs of Correct Operation"
Abhiram Kothapalli, Bryan Parno, ... -- NDSS 2022
"CirC: Compiler infrastructure for proof systems, software verification, and more"
Fraser Brown, Riad Wahby, ... -- Oakland 2022
"Locally Differentially Private Sparse Vector Aggregation"
Mingxun Zhou, Tianhao Wang, Giulia Fanti, Elaine Shi, ... -- Oakland 2022
"Peekaboo: A Hub-Based Approach to Enable Transparency in Data Processing within Smart Homes"
Haojian Jin, Gregory William Joseph Liu, David Ethan Hwang, Swarun Kumar, Yuvraj Agarwal, Jason Hong, ... -- Oakland 2022
"Foundations of Coin Mixing Services"
Sri Aravinda Krishnan Thyagarajan, ... -- CCS 2022
"Hammurabi: A Framework for Pluggable, Logic-Based X.509 Certificate Validation Policies"
Bryan Parno, ... -- CCS 2022
"Sleepy Channels: Bi-directional Payment Channels without Watchtowers"
Sri AravindaKrishnan Thyagarajan, ... -- CCS 2022
"TurboPack: Honest Majority MPC with Constant Online Communication"
Vipul Goyal, Yifan Song, ... -- CCS 2022
"Lumos: Identifying and Localizing Diverse Hidden IoT Devices in an Unfamiliar Environment"
Rahul Anand Sharma, Elahe Soltanaghaei, Anthony Rowe, Vyas Sekar, ... -- Usenix 2022
"Augmenting Decompiler Output with Learned Variable Names and Types"
Qibin Chen, Jeremy Lacomis, Edward J. Schwartz, Claire Le Goues, Graham Neubig, Bogdan Vasilescu, ... -- Usenix 2022
"Polynomial Commitment with a One-to-Many Prover and Applications"
Elaine Shi, ... -- Usenix 2022
"Provably-Safe Multilingual Software Sandboxing using WebAssembly"
Jay Bosamiya, Wen Shih Lim, Bryan Parno, ... -- Usenix 2022
"Measurement by Proxy: On the Accuracy of Online Marketplace Measurements"
Alejandro Cuevas, Nicolas Christin, ... -- Usenix 2022