Columbia University

General Info

Rank: #19 Worldwide
#15 in US
Papers: 107
Number of Researchers: 102
APA
(average papers per authors):
1.0
Country: USA

Activity Map

Contributors

  • Angelos D. Keromytis (33 papers)
  • Suman Jana (19 papers)
  • Salvatore J. Stolfo (8 papers)
  • Michalis Polychronakis (8 papers)
  • Vasileios P. Kemerlis (7 papers)
  • Simha Sethumadhavan (7 papers)
  • Steven M. Bellovin (6 papers)
  • Dongdong She (6 papers)
  • Eran Tromer (6 papers)
  • Moti Yung (6 papers)
  • Jason Nieh (5 papers)
  • Kexin Pei (5 papers)
  • Tal Malkin (5 papers)
  • Angelos Stavrou (4 papers)
  • Stelios Sidiroglou (4 papers)
  • Yinzhi Cao (4 papers)
  • Suphannee Sivakorn (4 papers)
  • Junfeng Yang (4 papers)
  • George Argyros (4 papers)
  • Iasonas Polakis (4 papers)
  • Theofilos Petsios (4 papers)
  • Mathias Lecuyer (4 papers)
  • Roxana Geambasu (4 papers)
  • Yizheng Chen (4 papers)
  • Abhishek Shah (4 papers)
  • Georgios Kontaxis (4 papers)
  • Shiqi Wang (4 papers)
  • Michael E. Locasto (3 papers)
  • Georgios Portokalidis (3 papers)
  • Adam Waksman (3 papers)
  • Vasilis Pappas (3 papers)
  • Fernando Krell (3 papers)
  • Adrian Tang (3 papers)
  • Riley Spahn (3 papers)
  • Shih-Wei Li (3 papers)
  • Asaf Cidon (3 papers)
  • Vishal Misra (2 papers)
  • Dan Rubenstein (2 papers)
  • Yingbo Song (2 papers)
  • Kangkook Jee (2 papers)
  • Binh Vo (2 papers)
  • Elias Athanasopoulos (2 papers)
  • Daniel Hsu (2 papers)
  • Baishakhi Ray (2 papers)
  • Xupeng Li (2 papers)
  • Ronghui Gu (2 papers)
  • Augustin Chaintreau (2 papers)
  • Yossef Oren (2 papers)
  • Ang Cui (1 papers)
  • Michael Costello (1 papers)
  • Ethan Katz-Bassett (1 papers)
  • David Williams-King (1 papers)
  • Matthew Schultz (1 papers)
  • Eleazar Eskin (1 papers)
  • Oren Laadan (1 papers)
  • Gabriela F. Cretu-Ciocarlie (1 papers)
  • Ben Fisch (1 papers)
  • Vaggelis Atlidakis (1 papers)
  • Dave Epstein (1 papers)
  • John Hui (1 papers)
  • Luca Piccolboni (1 papers)
  • Giuseppe Di Guglielmo (1 papers)
  • Luca P. Carloni (1 papers)
  • Samuel Deng (1 papers)
  • Miranda Christ (1 papers)
  • Steven Bellovin (1 papers)
  • William G. Morein (1 papers)
  • Debra L. Cook (1 papers)
  • Gaurav S. Kc (1 papers)
  • Theodore Diament (1 papers)
  • Homin K. Lee (1 papers)
  • Dimitris Geneiatakis (1 papers)
  • Mariana Raykova (1 papers)
  • Matthew Suozzo (1 papers)
  • Yannis Spiliopoulos (1 papers)
  • Marshall Ball (1 papers)
  • Jason Zhao (1 papers)
  • Rachel Cummings (1 papers)
  • Tim Roughgarden (1 papers)
  • Samanway Sadhu (1 papers)
  • Krish Singal (1 papers)
  • Peter Coffman (1 papers)
  • Jonathan Katz (1 papers)
  • Angelo D. Keromytis (1 papers)
  • Andrei Papancea (1 papers)
  • Sebastian Zimmeck (1 papers)
  • Yuan Jochen Kang (1 papers)
  • Jie S. Li (1 papers)
  • Hyungtae Kim (1 papers)
  • Tony Jebara (1 papers)
  • Shankara Pailoor (1 papers)
  • Andrew Aday (1 papers)
  • Justin Whitehouse (1 papers)
  • John S. Koh (1 papers)
  • Gabriel Ryan (1 papers)
  • Weifan Jiang (1 papers)
  • John Zhuang Hui (1 papers)
  • Henrique Teles Maia (1 papers)
  • Chang Xiao (1 papers)
  • Eitan Grinspun (1 papers)
  • Changxi Zheng (1 papers)
  • Andrew J. Blumberg (1 papers)

Papers

"A Chosen Ciphertext Attack Against Several E-Mail Encryption Protocols"

Jonathan Katz, ... -- Usenix 2000

"Data Mining Methods for Detection of New Malicious Executables"

Matthew Schultz, Eleazar Eskin, Salvatore J. Stolfo, ... -- Oakland 2001

"Efficient, DoS-resistant, secure key exchange for internet protocols"

Angelos D. Keromytis, ... -- CCS 2002

"Using graphic turing tests to counter automated DDoS attacks against web servers"

William G. Morein, Angelos Stavrou, Debra L. Cook, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein, ... -- CCS 2003

"On the performance, feasibility, and use of forward-secure signatures"

Tal Malkin, ... -- CCS 2003

"Countering code-injection attacks with instruction-set randomization"

Gaurav S. Kc, Angelos D. Keromytis, ... -- CCS 2003

"k-Anonymous Secret Handshakes with Reusable Credentials"

Moti Yung, ... -- CCS 2004

"The Dual Receiver Cryptogram and Its Applications"

Theodore Diament, Homin K. Lee, Angelos D. Keromytis, Moti Yung, ... -- CCS 2004

"MOVE: An End-to-End Solution to Network Denial of Service"

Angelos Stavrou, Angelos D. Keromytis, Jason Nieh, Vishal Misra, Dan Rubenstein, ... -- NDSS 2005

"Countering DoS Attacks With Stateless Multipath Overlays"

Angelos Stavrou, Angelos D. Keromytis, ... -- CCS 2005

"Detecting Targeted Attacks Using Shadow Honeypots"

Stelios Sidiroglou, Angelo D. Keromytis, ... -- Usenix 2005

"Software Self-Healing Using Collaborative Application"

Stelios Sidiroglou, Michael E. Locasto, Angelos D. Keromytis, ... -- NDSS 2006

"Deploying a New Hash Algorithm"

Steven M. Bellovin, ... -- NDSS 2006

"ShieldGen: Automatic Data Patch Generation for Unknown Vulnerabilities with Informed Probing"

Michael E. Locasto, ... -- Oakland 2007

"Using Rescue Points to Navigate Software Recovery (Short Paper)"

Stelios Sidiroglou, Oren Laadan, Angelos D. Keromytis, Jason Nieh, ... -- Oakland 2007

"Forward-Secure Signatures in Untrusted Update Environments: Efficient and Generic Constructions"

Moti Yung, ... -- CCS 2007

"On the Infeasibility of Modeling Polymorphic Shellcode"

Yingbo Song, Michael E. Locasto, Angelos Stavrou, Angelos D. Keromytis, Salvatore J. Stolfo, ... -- CCS 2007

"Proximity Breeds Danger: Emerging Threats in Metro-area Wireless Networks"

Stelios Sidiroglou, ... -- Usenix 2007

"Taming the Devil: Techniques for Evaluating Anonymized Network Data"

Angelos D. Keromytis, ... -- NDSS 2008

"Casting out Demons: Sanitizing Training Data for Anomaly Sensors"

Angelos D. Keromytis, Salvatore J. Stolfo, Gabriela F. Cretu-Ciocarlie, ... -- Oakland 2008

"Spectrogram: A Mixture-of-Markov-Chains Model for Anomaly Detection in Web Traffic"

Yingbo Song, Angelos D. Keromytis, Salvatore J. Stolfo, ... -- NDSS 2009

"Tamper Evident Microprocessors"

Adam Waksman, Simha Sethumadhavan, ... -- Oakland 2010

"Practical leakage-resilient pseudorandom generators"

Moti Yung, ... -- CCS 2010

"Silencing Hardware Backdoors"

Adam Waksman, Simha Sethumadhavan, ... -- Oakland 2011

"MIDeA: A Multi-Parallel Intrusion Detection Architecture"

Michalis Polychronakis, ... -- CCS 2011

"A General Approach for Efficiently Accelerating Software-based Dynamic Data Flow Tracking on Commodity Hardware"

Kangkook Jee, Georgios Portokalidis, Vasileios P. Kemerlis, Angelos D. Keromytis, ... -- NDSS 2012

"Smashing the Gadgets: Hindering Return-Oriented Programming Using In-Place Code Randomization"

Vasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis, ... -- Oakland 2012

"Adaptive Defenses for Commodity Software through Virtual Application Partitioning"

Dimitris Geneiatakis, Georgios Portokalidis, Vasileios P. Kemerlis, Angelos D. Keromytis, ... -- CCS 2012

"Secure Two-Party Computation in Sublinear (Amortized) Time"

Fernando Krell, Tal Malkin, Mariana Raykova, ... -- CCS 2012

"kGuard: Lightweight Kernel Protection against Return-to-User Attacks"

Vasileios P. Kemerlis, Georgios Portokalidis, Angelos D. Keromytis, ... -- Usenix 2012

"Privacy-Preserving Social Plugins"

Georgios Kontaxis, Michalis Polychronakis, Angelos D. Keromytis, ... -- Usenix 2012

"When Firmware Modifications Attack: A Case Study of Embedded Exploitation"

Ang Cui, Michael Costello, Salvatore J. Stolfo, ... -- NDSS 2013

"FANCI: Identification of Stealthy Malicious Logic Using Boolean Functional Analysis"

Adam Waksman, Matthew Suozzo, Simha Sethumadhavan, ... -- CCS 2013

"ShadowReplica: Efficient Parallelization of Dynamic Data Flow Tracking"

Kangkook Jee, Vasileios P. Kemerlis, Angelos D. Keromytis, ... -- CCS 2013

"SAuth: Protecting User Accounts from Password Database Leaks"

Georgios Kontaxis, Elias Athanasopoulos, Angelos D. Keromytis, ... -- CCS 2013

"Transparent ROP Exploit Mitigation Using Indirect Branch Tracing"

Vasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis, ... -- Usenix 2013

"Blind Seer: A Scalable Private DBMS"

Vasilis Pappas, Fernando Krell, Binh Vo, Tal Malkin, Angelos D. Keromytis, Steven M. Bellovin, ... -- Oakland 2014

"Out Of Control: Overcoming Control-Flow Integrity"

Elias Athanasopoulos, ... -- Oakland 2014

"Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication"

Iasonas Polakis, Georgios Kontaxis, Angelos D. Keromytis, ... -- CCS 2014

"PixelVault: Using GPUs for Securing Cryptographic Operations"

Michalis Polychronakis, ... -- CCS 2014

"xRay: Enhancing the Web's Transparency with Differential Correlation"

Mathias Lecuyer, Riley Spahn, Andrei Papancea, Theofilos Petsios, Augustin Chaintreau, Roxana Geambasu, ... -- Usenix 2014

"Privee: An Architecture for Automatically Analyzing Web Privacy Policies"

Sebastian Zimmeck, Steven M. Bellovin, ... -- Usenix 2014

"From the Aether to the Ethernet-Attacking the Internet using Broadcast Digital Television"

Yossef Oren, Angelos D. Keromytis, ... -- Usenix 2014

"ret2dir: Rethinking Kernel Isolation"

Vasileios P. Kemerlis, Michalis Polychronakis, Angelos D. Keromytis, ... -- Usenix 2014

"Size Does Matter: Why Using Gadget-Chain Length to Prevent Code-reuse Attacks is Hard"

Michalis Polychronakis, ... -- Usenix 2014

"Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting"

Vasileios P. Kemerlis, ... -- NDSS 2015

"EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework"

Yinzhi Cao, ... -- NDSS 2015

"I Do Not Know What You Visited Last Summer - Protecting users from third-party web tracking with TrackingFree browser"

Yinzhi Cao, ... -- NDSS 2015

"The Devil is in the Constants: Bypassing Defenses in Browser JIT Engines"

Michalis Polychronakis, ... -- NDSS 2015

"I know what you did last summer - Towards Making Systems Forget with Machine Unlearning"

Yinzhi Cao, Junfeng Yang, ... -- Oakland 2015

"Malicious-Client Security in Blind Seer"

Ben Fisch, Tal Malkin, Fernando Krell, Binh Vo, Steven M. Bellovin, ... -- Oakland 2015

"Vetting SSL Usage in Applications with SSLINT"

Yinzhi Cao, ... -- Oakland 2015

"Face/Off: Preventing Privacy Leakage From Photos in Social Networks"

Iasonas Polakis, ... -- CCS 2015

"Where's Wally? Precise User Discovery Attacks in Location Proximity Services"

Iasonas Polakis, George Argyros, Theofilos Petsios, Suphannee Sivakorn, Angelos D. Keromytis, ... -- CCS 2015

"Sunlight: Fine-grained Targeting Detection at Scale with Statistical Confidence"

Mathias Lecuyer, Riley Spahn, Yannis Spiliopoulos, Augustin Chaintreau, Roxana Geambasu, Daniel Hsu, ... -- CCS 2015

"Heisenbyte: Thwarting Memory Disclosure Attacks using Destructive Code Reads"

Adrian Tang, Simha Sethumadhavan, Salvatore J. Stolfo, ... -- CCS 2015

"The Spy in the Sandbox: Practical Cache Attacks in Javascript and their Implications"

Yossef Oren, Vasileios P. Kemerlis, Angelos D. Keromytis, Simha Sethumadhavan, ... -- CCS 2015

"Back in Black: Towards Formal, Black Box Analysis of Sanitizers and Filters"

George Argyros, Angelos D. Keromytis, ... -- Oakland 2016

"The Cracked Cookie Jar: HTTP Cookie Hijacking and the Exposure of Private Information"

Suphannee Sivakorn, Iasonas Polakis, Angelos D. Keromytis, ... -- Oakland 2016

"Protecting insecure communications with topology-aware network tunnels"

Georgios Kontaxis, Angelos D. Keromytis, ... -- CCS 2016

"SFADiff: Automated Evasion Attacks and Fingerprinting Using Blackbox Differential Automata Learning"

George Argyros, Suman Jana, Angelos D. Keromytis, ... -- CCS 2016

"Garbling Gadgets for Boolean and Arithmetic Circuits"

Marshall Ball, Tal Malkin, ... -- CCS 2016

"Automatically Detecting Error Handling Bugs using Error Specifications"

Suman Jana, Yuan Jochen Kang, ... -- Usenix 2016

"Automated Analysis of Privacy Requirements for Mobile Apps"

Steven M. Bellovin, ... -- NDSS 2017

"HVLearn: Automated Black-box Analysis of Hostname Verification in SSL/TLS Implementations"

Suphannee Sivakorn, George Argyros, Kexin Pei, Angelos D. Keromytis, Suman Jana, ... -- Oakland 2017

"NEZHA: Efficient Domain-independent Differential Testing"

Theofilos Petsios, Adrian Tang, Salvatore J. Stolfo, Angelos D. Keromytis, Suman Jana, ... -- Oakland 2017

"Pyramid: Enhancing Selectivity in Big Data Protection with Count Featurization"

Mathias Lecuyer, Riley Spahn, Roxana Geambasu, ... -- Oakland 2017

"Generic Semantic Security against a Kleptographic Adversary"

Moti Yung, ... -- CCS 2017

"SlowFuzz: Automated Domain-Independent Detection of Algorithmic Complexity Vulnerabilities"

Theofilos Petsios, Jason Zhao, Angelos D. Keromytis, Suman Jana, ... -- CCS 2017

"CLKSCREW: Exposing the Perils of Security-Oblivious Energy Management"

Adrian Tang, Simha Sethumadhavan, Salvatore J. Stolfo, ... -- Usenix 2017

"Beauty and the Burst: Remote Identification of Encrypted Video Streams"

Eran Tromer, ... -- Usenix 2017

"A Privacy Analysis of Cross-device Tracking"

Jie S. Li, Hyungtae Kim, Steven M. Bellovin, Tony Jebara, ... -- Usenix 2017

"Situational Access Control in the Internet of Things"

Eran Tromer, ... -- CCS 2018

"MoonShine: Optimizing OS Fuzzer Seed Selection with Trace Distillation"

Shankara Pailoor, Andrew Aday, Suman Jana, ... -- Usenix 2018

"Formal Security Analysis of Neural Networks using Symbolic Intervals"

Shiqi Wang, Kexin Pei, Justin Whitehouse, Junfeng Yang, Suman Jana, ... -- Usenix 2018

"Countering Malicious Processes with Process-DNS Association"

Suphannee Sivakorn, ... -- NDSS 2019

"Certified Robustness to Adversarial Examples with Differential Privacy"

Mathias Lecuyer, Vaggelis Atlidakis, Roxana Geambasu, Daniel Hsu, Suman Jana, ... -- Oakland 2019

"NEUZZ: Efficient Fuzzing with Neural Program Smoothing"

Dongdong She, Kexin Pei, Dave Epstein, Junfeng Yang, Baishakhi Ray, Suman Jana, ... -- Oakland 2019

"Synesthesia: Detecting Screen Content via Remote Acoustic Side Channels"

Eran Tromer, ... -- Oakland 2019

"Detecting and Characterizing Lateral Phishing at Scale"

Asaf Cidon, ... -- Usenix 2019

"High Precision Detection of Business Email Compromise"

Asaf Cidon, ... -- Usenix 2019

"Protecting Cloud Virtual Machines from Hypervisor and Host Operating System Exploits"

Shih-Wei Li, John S. Koh, Jason Nieh, ... -- Usenix 2019

"DISCO: Sidestepping RPKI’s Deployment Barriers"

Ethan Katz-Bassett, ... -- NDSS 2020

"Neutaint: Efficient Dynamic Taint Analysis with Neural Networks"

Dongdong She, Yizheng Chen, Abhishek Shah, Baishakhi Ray, Suman Jana, ... -- Oakland 2020

"On Training Robust PDF Malware Classifiers"

Yizheng Chen, Shiqi Wang, Dongdong She, Suman Jana, ... -- Usenix 2020

"XDA: Accurate, Robust Disassembly with Transfer Learning"

Kexin Pei, David Williams-King, Junfeng Yang, Suman Jana, ... -- NDSS 2021

"A Secure and Formally Verified Linux KVM Hypervisor"

Shih-Wei Li, Xupeng Li, John Hui, Jason Nieh, Ronghui Gu, ... -- Oakland 2021

"CRYLOGGER: Detecting Crypto Misuses Dynamically"

Luca Piccolboni, Giuseppe Di Guglielmo, Luca P. Carloni, Simha Sethumadhavan, ... -- Oakland 2021

"Is Private Learning Possible with Instance Encoding?"

Samuel Deng, ... -- Oakland 2021

""I need a better description": An Investigation Into User Expectations For Differential Privacy"

Rachel Cummings, ... -- CCS 2021

"How Does Blockchain Security Dictate Blockchain Implementation?"

Tim Roughgarden, ... -- CCS 2021

"Learning Security Classifiers with Verified Global Robustness Properties"

Yizheng Chen, Shiqi Wang, Suman Jana, ... -- CCS 2021

"You Autocomplete Me: Poisoning Vulnerabilities in Neural Code Completion"

Eran Tromer, ... -- Usenix 2021

"Fine Grained Dataflow Tracking with Proximal Gradients"

Gabriel Ryan, Abhishek Shah, Dongdong She, Suman Jana, ... -- Usenix 2021

"Cost-Aware Robust Tree Ensembles for Security Applications"

Yizheng Chen, Shiqi Wang, Weifan Jiang, Asaf Cidon, Suman Jana, ... -- Usenix 2021

"AdCube: WebVR Ad Fraud and Practical Confinement of Third-Party Ads"

Suman Jana, ... -- Usenix 2021

"Formally Verified Memory Protection for a Commodity Multiprocessor Hypervisor"

Shih-Wei Li, Xupeng Li, Ronghui Gu, Jason Nieh, John Zhuang Hui, ... -- Usenix 2021

"Differential Privacy and Swapping: Examining De-Identification's Impact on Minority Representation and Privacy Preservation in the U.S. Census"

Miranda Christ, Steven Bellovin, ... -- Oakland 2022

"Effective Seed Scheduling for Fuzzing with Graph Centrality Analysis"

Dongdong She, Abhishek Shah, Suman Jana, ... -- Oakland 2022

"MC^2: Rigorous and Efficient Directed Greybox Fuzzing"

Abhishek Shah, Dongdong She, Samanway Sadhu, Krish Singal, Peter Coffman, Suman Jana, ... -- CCS 2022

"Proving UNSAT in Zero Knowledge"

Eran Tromer, ... -- CCS 2022

"SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code Embeddings"

Kexin Pei, ... -- CCS 2022

"Can one hear the shape of a neural network?: Snooping the GPU via Magnetic Side Channel"

Henrique Teles Maia, Chang Xiao, Eitan Grinspun, Changxi Zheng, ... -- Usenix 2022

"FUGIO: Automatic Exploit Generation for PHP Object Injection Vulnerabilities"

Suman Jana, ... -- Usenix 2022

"Lend Me Your Ear: Passive Remote Physical Side Channels on PCs"

Eran Tromer, ... -- Usenix 2022

"Efficient Representation of Numerical Optimization Problems for SNARKs"

Andrew J. Blumberg, ... -- Usenix 2022

"End-to-Same-End Encryption: Modularly Augmenting an App with an Efficient, Portable, and Blind Cloud Storage"

Moti Yung, ... -- Usenix 2022