"A Chosen Ciphertext Attack Against Several E-Mail Encryption Protocols"
Jonathan Katz, ... -- Usenix 2000
"Data Mining Methods for Detection of New Malicious Executables"
Matthew Schultz, Eleazar Eskin, Salvatore J. Stolfo, ... -- Oakland 2001
"Efficient, DoS-resistant, secure key exchange for internet protocols"
Angelos D. Keromytis, ... -- CCS 2002
"Using graphic turing tests to counter automated DDoS attacks against web servers"
William G. Morein, Angelos Stavrou, Debra L. Cook, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein, ... -- CCS 2003
"On the performance, feasibility, and use of forward-secure signatures"
Tal Malkin, ... -- CCS 2003
"Countering code-injection attacks with instruction-set randomization"
Gaurav S. Kc, Angelos D. Keromytis, ... -- CCS 2003
"k-Anonymous Secret Handshakes with Reusable Credentials"
Moti Yung, ... -- CCS 2004
"The Dual Receiver Cryptogram and Its Applications"
Theodore Diament, Homin K. Lee, Angelos D. Keromytis, Moti Yung, ... -- CCS 2004
"MOVE: An End-to-End Solution to Network Denial of Service"
Angelos Stavrou, Angelos D. Keromytis, Jason Nieh, Vishal Misra, Dan Rubenstein, ... -- NDSS 2005
"Countering DoS Attacks With Stateless Multipath Overlays"
Angelos Stavrou, Angelos D. Keromytis, ... -- CCS 2005
"Detecting Targeted Attacks Using Shadow Honeypots"
Stelios Sidiroglou, Angelo D. Keromytis, ... -- Usenix 2005
"Software Self-Healing Using Collaborative Application"
Stelios Sidiroglou, Michael E. Locasto, Angelos D. Keromytis, ... -- NDSS 2006
"Deploying a New Hash Algorithm"
Steven M. Bellovin, ... -- NDSS 2006
"ShieldGen: Automatic Data Patch Generation for Unknown Vulnerabilities with Informed Probing"
Michael E. Locasto, ... -- Oakland 2007
"Using Rescue Points to Navigate Software Recovery (Short Paper)"
Stelios Sidiroglou, Oren Laadan, Angelos D. Keromytis, Jason Nieh, ... -- Oakland 2007
"Forward-Secure Signatures in Untrusted Update Environments: Efficient and Generic Constructions"
Moti Yung, ... -- CCS 2007
"On the Infeasibility of Modeling Polymorphic Shellcode"
Yingbo Song, Michael E. Locasto, Angelos Stavrou, Angelos D. Keromytis, Salvatore J. Stolfo, ... -- CCS 2007
"Proximity Breeds Danger: Emerging Threats in Metro-area Wireless Networks"
Stelios Sidiroglou, ... -- Usenix 2007
"Taming the Devil: Techniques for Evaluating Anonymized Network Data"
Angelos D. Keromytis, ... -- NDSS 2008
"Casting out Demons: Sanitizing Training Data for Anomaly Sensors"
Angelos D. Keromytis, Salvatore J. Stolfo, Gabriela F. Cretu-Ciocarlie, ... -- Oakland 2008
"Spectrogram: A Mixture-of-Markov-Chains Model for Anomaly Detection in Web Traffic"
Yingbo Song, Angelos D. Keromytis, Salvatore J. Stolfo, ... -- NDSS 2009
"Tamper Evident Microprocessors"
Adam Waksman, Simha Sethumadhavan, ... -- Oakland 2010
"Practical leakage-resilient pseudorandom generators"
Moti Yung, ... -- CCS 2010
"Silencing Hardware Backdoors"
Adam Waksman, Simha Sethumadhavan, ... -- Oakland 2011
"MIDeA: A Multi-Parallel Intrusion Detection Architecture"
Michalis Polychronakis, ... -- CCS 2011
"A General Approach for Efficiently Accelerating Software-based Dynamic Data Flow Tracking on Commodity Hardware"
Kangkook Jee, Georgios Portokalidis, Vasileios P. Kemerlis, Angelos D. Keromytis, ... -- NDSS 2012
"Smashing the Gadgets: Hindering Return-Oriented Programming Using In-Place Code Randomization"
Vasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis, ... -- Oakland 2012
"Adaptive Defenses for Commodity Software through Virtual Application Partitioning"
Dimitris Geneiatakis, Georgios Portokalidis, Vasileios P. Kemerlis, Angelos D. Keromytis, ... -- CCS 2012
"Secure Two-Party Computation in Sublinear (Amortized) Time"
Fernando Krell, Tal Malkin, Mariana Raykova, ... -- CCS 2012
"kGuard: Lightweight Kernel Protection against Return-to-User Attacks"
Vasileios P. Kemerlis, Georgios Portokalidis, Angelos D. Keromytis, ... -- Usenix 2012
"Privacy-Preserving Social Plugins"
Georgios Kontaxis, Michalis Polychronakis, Angelos D. Keromytis, ... -- Usenix 2012
"When Firmware Modifications Attack: A Case Study of Embedded Exploitation"
Ang Cui, Michael Costello, Salvatore J. Stolfo, ... -- NDSS 2013
"FANCI: Identification of Stealthy Malicious Logic Using Boolean Functional Analysis"
Adam Waksman, Matthew Suozzo, Simha Sethumadhavan, ... -- CCS 2013
"ShadowReplica: Efficient Parallelization of Dynamic Data Flow Tracking"
Kangkook Jee, Vasileios P. Kemerlis, Angelos D. Keromytis, ... -- CCS 2013
"SAuth: Protecting User Accounts from Password Database Leaks"
Georgios Kontaxis, Elias Athanasopoulos, Angelos D. Keromytis, ... -- CCS 2013
"Transparent ROP Exploit Mitigation Using Indirect Branch Tracing"
Vasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis, ... -- Usenix 2013
"Blind Seer: A Scalable Private DBMS"
Vasilis Pappas, Fernando Krell, Binh Vo, Tal Malkin, Angelos D. Keromytis, Steven M. Bellovin, ... -- Oakland 2014
"Out Of Control: Overcoming Control-Flow Integrity"
Elias Athanasopoulos, ... -- Oakland 2014
"Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication"
Iasonas Polakis, Georgios Kontaxis, Angelos D. Keromytis, ... -- CCS 2014
"PixelVault: Using GPUs for Securing Cryptographic Operations"
Michalis Polychronakis, ... -- CCS 2014
"xRay: Enhancing the Web's Transparency with Differential Correlation"
Mathias Lecuyer, Riley Spahn, Andrei Papancea, Theofilos Petsios, Augustin Chaintreau, Roxana Geambasu, ... -- Usenix 2014
"Privee: An Architecture for Automatically Analyzing Web Privacy Policies"
Sebastian Zimmeck, Steven M. Bellovin, ... -- Usenix 2014
"From the Aether to the Ethernet-Attacking the Internet using Broadcast Digital Television"
Yossef Oren, Angelos D. Keromytis, ... -- Usenix 2014
"ret2dir: Rethinking Kernel Isolation"
Vasileios P. Kemerlis, Michalis Polychronakis, Angelos D. Keromytis, ... -- Usenix 2014
"Size Does Matter: Why Using Gadget-Chain Length to Prevent Code-reuse Attacks is Hard"
Michalis Polychronakis, ... -- Usenix 2014
"Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting"
Vasileios P. Kemerlis, ... -- NDSS 2015
"EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework"
Yinzhi Cao, ... -- NDSS 2015
"I Do Not Know What You Visited Last Summer - Protecting users from third-party web tracking with TrackingFree browser"
Yinzhi Cao, ... -- NDSS 2015
"The Devil is in the Constants: Bypassing Defenses in Browser JIT Engines"
Michalis Polychronakis, ... -- NDSS 2015
"I know what you did last summer - Towards Making Systems Forget with Machine Unlearning"
Yinzhi Cao, Junfeng Yang, ... -- Oakland 2015
"Malicious-Client Security in Blind Seer"
Ben Fisch, Tal Malkin, Fernando Krell, Binh Vo, Steven M. Bellovin, ... -- Oakland 2015
"Vetting SSL Usage in Applications with SSLINT"
Yinzhi Cao, ... -- Oakland 2015
"Face/Off: Preventing Privacy Leakage From Photos in Social Networks"
Iasonas Polakis, ... -- CCS 2015
"Where's Wally? Precise User Discovery Attacks in Location Proximity Services"
Iasonas Polakis, George Argyros, Theofilos Petsios, Suphannee Sivakorn, Angelos D. Keromytis, ... -- CCS 2015
"Sunlight: Fine-grained Targeting Detection at Scale with Statistical Confidence"
Mathias Lecuyer, Riley Spahn, Yannis Spiliopoulos, Augustin Chaintreau, Roxana Geambasu, Daniel Hsu, ... -- CCS 2015
"Heisenbyte: Thwarting Memory Disclosure Attacks using Destructive Code Reads"
Adrian Tang, Simha Sethumadhavan, Salvatore J. Stolfo, ... -- CCS 2015
"The Spy in the Sandbox: Practical Cache Attacks in Javascript and their Implications"
Yossef Oren, Vasileios P. Kemerlis, Angelos D. Keromytis, Simha Sethumadhavan, ... -- CCS 2015
"Back in Black: Towards Formal, Black Box Analysis of Sanitizers and Filters"
George Argyros, Angelos D. Keromytis, ... -- Oakland 2016
"The Cracked Cookie Jar: HTTP Cookie Hijacking and the Exposure of Private Information"
Suphannee Sivakorn, Iasonas Polakis, Angelos D. Keromytis, ... -- Oakland 2016
"Protecting insecure communications with topology-aware network tunnels"
Georgios Kontaxis, Angelos D. Keromytis, ... -- CCS 2016
"SFADiff: Automated Evasion Attacks and Fingerprinting Using Blackbox Differential Automata Learning"
George Argyros, Suman Jana, Angelos D. Keromytis, ... -- CCS 2016
"Garbling Gadgets for Boolean and Arithmetic Circuits"
Marshall Ball, Tal Malkin, ... -- CCS 2016
"Automatically Detecting Error Handling Bugs using Error Specifications"
Suman Jana, Yuan Jochen Kang, ... -- Usenix 2016
"Automated Analysis of Privacy Requirements for Mobile Apps"
Steven M. Bellovin, ... -- NDSS 2017
"HVLearn: Automated Black-box Analysis of Hostname Verification in SSL/TLS Implementations"
Suphannee Sivakorn, George Argyros, Kexin Pei, Angelos D. Keromytis, Suman Jana, ... -- Oakland 2017
"NEZHA: Efficient Domain-independent Differential Testing"
Theofilos Petsios, Adrian Tang, Salvatore J. Stolfo, Angelos D. Keromytis, Suman Jana, ... -- Oakland 2017
"Pyramid: Enhancing Selectivity in Big Data Protection with Count Featurization"
Mathias Lecuyer, Riley Spahn, Roxana Geambasu, ... -- Oakland 2017
"Generic Semantic Security against a Kleptographic Adversary"
Moti Yung, ... -- CCS 2017
"SlowFuzz: Automated Domain-Independent Detection of Algorithmic Complexity Vulnerabilities"
Theofilos Petsios, Jason Zhao, Angelos D. Keromytis, Suman Jana, ... -- CCS 2017
"CLKSCREW: Exposing the Perils of Security-Oblivious Energy Management"
Adrian Tang, Simha Sethumadhavan, Salvatore J. Stolfo, ... -- Usenix 2017
"Beauty and the Burst: Remote Identification of Encrypted Video Streams"
Eran Tromer, ... -- Usenix 2017
"A Privacy Analysis of Cross-device Tracking"
Jie S. Li, Hyungtae Kim, Steven M. Bellovin, Tony Jebara, ... -- Usenix 2017
"Situational Access Control in the Internet of Things"
Eran Tromer, ... -- CCS 2018
"MoonShine: Optimizing OS Fuzzer Seed Selection with Trace Distillation"
Shankara Pailoor, Andrew Aday, Suman Jana, ... -- Usenix 2018
"Formal Security Analysis of Neural Networks using Symbolic Intervals"
Shiqi Wang, Kexin Pei, Justin Whitehouse, Junfeng Yang, Suman Jana, ... -- Usenix 2018
"Countering Malicious Processes with Process-DNS Association"
Suphannee Sivakorn, ... -- NDSS 2019
"Certified Robustness to Adversarial Examples with Differential Privacy"
Mathias Lecuyer, Vaggelis Atlidakis, Roxana Geambasu, Daniel Hsu, Suman Jana, ... -- Oakland 2019
"NEUZZ: Efficient Fuzzing with Neural Program Smoothing"
Dongdong She, Kexin Pei, Dave Epstein, Junfeng Yang, Baishakhi Ray, Suman Jana, ... -- Oakland 2019
"Synesthesia: Detecting Screen Content via Remote Acoustic Side Channels"
Eran Tromer, ... -- Oakland 2019
"Detecting and Characterizing Lateral Phishing at Scale"
Asaf Cidon, ... -- Usenix 2019
"High Precision Detection of Business Email Compromise"
Asaf Cidon, ... -- Usenix 2019
"Protecting Cloud Virtual Machines from Hypervisor and Host Operating System Exploits"
Shih-Wei Li, John S. Koh, Jason Nieh, ... -- Usenix 2019
"DISCO: Sidestepping RPKI’s Deployment Barriers"
Ethan Katz-Bassett, ... -- NDSS 2020
"Neutaint: Efficient Dynamic Taint Analysis with Neural Networks"
Dongdong She, Yizheng Chen, Abhishek Shah, Baishakhi Ray, Suman Jana, ... -- Oakland 2020
"On Training Robust PDF Malware Classifiers"
Yizheng Chen, Shiqi Wang, Dongdong She, Suman Jana, ... -- Usenix 2020
"XDA: Accurate, Robust Disassembly with Transfer Learning"
Kexin Pei, David Williams-King, Junfeng Yang, Suman Jana, ... -- NDSS 2021
"A Secure and Formally Verified Linux KVM Hypervisor"
Shih-Wei Li, Xupeng Li, John Hui, Jason Nieh, Ronghui Gu, ... -- Oakland 2021
"CRYLOGGER: Detecting Crypto Misuses Dynamically"
Luca Piccolboni, Giuseppe Di Guglielmo, Luca P. Carloni, Simha Sethumadhavan, ... -- Oakland 2021
"Is Private Learning Possible with Instance Encoding?"
Samuel Deng, ... -- Oakland 2021
""I need a better description": An Investigation Into User Expectations For Differential Privacy"
Rachel Cummings, ... -- CCS 2021
"How Does Blockchain Security Dictate Blockchain Implementation?"
Tim Roughgarden, ... -- CCS 2021
"Learning Security Classifiers with Verified Global Robustness Properties"
Yizheng Chen, Shiqi Wang, Suman Jana, ... -- CCS 2021
"You Autocomplete Me: Poisoning Vulnerabilities in Neural Code Completion"
Eran Tromer, ... -- Usenix 2021
"Fine Grained Dataflow Tracking with Proximal Gradients"
Gabriel Ryan, Abhishek Shah, Dongdong She, Suman Jana, ... -- Usenix 2021
"Cost-Aware Robust Tree Ensembles for Security Applications"
Yizheng Chen, Shiqi Wang, Weifan Jiang, Asaf Cidon, Suman Jana, ... -- Usenix 2021
"AdCube: WebVR Ad Fraud and Practical Confinement of Third-Party Ads"
Suman Jana, ... -- Usenix 2021
"Formally Verified Memory Protection for a Commodity Multiprocessor Hypervisor"
Shih-Wei Li, Xupeng Li, Ronghui Gu, Jason Nieh, John Zhuang Hui, ... -- Usenix 2021
"Differential Privacy and Swapping: Examining De-Identification's Impact on Minority Representation and Privacy Preservation in the U.S. Census"
Miranda Christ, Steven Bellovin, ... -- Oakland 2022
"Effective Seed Scheduling for Fuzzing with Graph Centrality Analysis"
Dongdong She, Abhishek Shah, Suman Jana, ... -- Oakland 2022
"MC^2: Rigorous and Efficient Directed Greybox Fuzzing"
Abhishek Shah, Dongdong She, Samanway Sadhu, Krish Singal, Peter Coffman, Suman Jana, ... -- CCS 2022
"Proving UNSAT in Zero Knowledge"
Eran Tromer, ... -- CCS 2022
"SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code Embeddings"
Kexin Pei, ... -- CCS 2022
"Can one hear the shape of a neural network?: Snooping the GPU via Magnetic Side Channel"
Henrique Teles Maia, Chang Xiao, Eitan Grinspun, Changxi Zheng, ... -- Usenix 2022
"FUGIO: Automatic Exploit Generation for PHP Object Injection Vulnerabilities"
Suman Jana, ... -- Usenix 2022
"Lend Me Your Ear: Passive Remote Physical Side Channels on PCs"
Eran Tromer, ... -- Usenix 2022
"Efficient Representation of Numerical Optimization Problems for SNARKs"
Andrew J. Blumberg, ... -- Usenix 2022
"End-to-Same-End Encryption: Modularly Augmenting an App with an Efficient, Portable, and Blind Cloud Storage"
Moti Yung, ... -- Usenix 2022