"Optimized Rekey for Group Communication Systems"
Kenneth Birman, ... -- NDSS 2000
"IRM Enforcement of Java Stack Inspection"
Fred B. Schneider, ... -- Oakland 2000
"Detecting Backdoors"
Yin Zhang, ... -- Usenix 2000
"Detecting Stepping Stones"
Yin Zhang, ... -- Usenix 2000
"On the relationship between strand spaces and multi-agent systems"
Joseph Y. Halpern, Riccardo Pucella, ... -- CCS 2001
"Using Replication and Partitioning to Build Secure Distributed Systems"
Lantian Zheng, Stephen Chong, Andrew C. Myers, ... -- Oakland 2003
"Security Policies for Downgrading"
Stephen Chong, Andrew C. Myers, ... -- CCS 2004
"RICH: Automatically Protecting Against Integer-Based Vulnerabilities"
Huijia Rachel Lin, ... -- NDSS 2007
"SIF: Enforcing Confidentiality and Integrity in Web Applications"
Stephen Chong, Krishnaprasad Vikram, Andrew C. Myers, ... -- Usenix 2007
"Anonymous Networking with Minimum Latency in Multihop Networks"
Parvathinathan Venkitasubramaniam, Lang Tong, ... -- Oakland 2008
"Civitas: Toward a Secure Voting System"
Michael Clarkson, Stephen Chong, Andrew C. Myers, ... -- Oakland 2008
"Mitigating DNS DoS Attacks"
Hitesh Ballani, Paul Francis, ... -- CCS 2008
"Ripley: automatically securing web 2.0 applications through replicated execution"
Krishnaprasad Vikram, ... -- CCS 2009
"NOZZLE: A Defense Against Heap-spraying Code Injection Attacks"
Paruj Ratanaworabhan, ... -- Usenix 2009
"Locating Prefix Hijackers using LOCK"
Hitesh Ballani, ... -- Usenix 2009
"Predictive black-box mitigation of timing channels"
Aslan Askarov, Danfeng Zhang, Andrew C. Myers, ... -- CCS 2010
"Dude, Where's That IP? Circumventing Measurement-based IP Geolocation"
Bernard Wong, ... -- Usenix 2010
"Predictive Mitigation of Timing Channels in Interactive Systems"
Danfeng Zhang, Aslan Askarov, Andrew C. Myers, ... -- CCS 2011
"Flash Memory for Ubiquitous Hardware Security Functions: True Random Number Generation and Device Fingerprints"
Yinglei Wang, Wing-kei Yu, Shuo Wu, Greg Malysa, G. Edward Su, Edwin Kan, ... -- Oakland 2012
"Sharing Mobile Code Securely With Information Flow Control"
Owen Arden, Michael George, Jed Liu, Krishnaprasad Vikram, Aslan Askarov, Andrew C. Myers, ... -- Oakland 2012
"Non-tracking Web Analytics"
Johannes Gehrke, ... -- CCS 2012
"Hiding Information in Flash Memory"
Yinglei Wang, Wing-kei Yu, Sarah Q. Xu, Edwin Kan, Gookwon Edward Suh, ... -- Oakland 2013
"The Miner's Dilemma"
Ittay Eyal, ... -- Oakland 2015
"Nonoutsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining Coalitions"
Elaine Shi, ... -- CCS 2015
"Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound"
Elaine Shi, ... -- CCS 2015
"Leakage-Abuse Attacks Against Searchable Encryption"
Paul Grubbs, ... -- CCS 2015
"Constants Count: Practical Improvements to Oblivious RAM"
Elaine Shi, ... -- Usenix 2015
"Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts"
Elaine Shi, Zikai Wen, ... -- Oakland 2016
"pASSWORD tYPOS and How to Correct Them Securely"
Rahul Chatterjee, ... -- Oakland 2016
"Town Crier: An Authenticated Data Feed for Smart Contracts"
Fan Zhang, Ethan Cecchetti, Elaine Shi, ... -- CCS 2016
"Breaking web applications built on top of encrypted data"
Paul Grubbs, ... -- CCS 2016
"The Ring of Gyges: Investigating the Future of Criminal Smart Contracts"
Elaine Shi, ... -- CCS 2016
"The Honey Badger of BFT Protocols"
Kyle Croman, Elaine Shi, ... -- CCS 2016
"Safe Serializable Secure Scheduling: Transactions and the Trade-off Between Security and Consistency"
Isaac Sheff, Tom Magrino, Jed Liu, Andrew C. Myers, Robbert van Renesse, ... -- CCS 2016
"Amortizing Secure Computation with Penalties"
Iddo Bentov, ... -- CCS 2016
"Stealing Machine Learning Models via Prediction APIs"
Fan Zhang, ... -- Usenix 2016
"HOP: Hardware makes Obfuscation Practical"
Elaine Shi, ... -- NDSS 2017
"Leakage-Abuse Attacks on Order-Revealing Encryption"
Kevin Sekniqi, ... -- Oakland 2017
"Membership Inference Attacks against Machine Learning Models"
Congzheng Song, ... -- Oakland 2017
"Machine Learning Models that Remember Too Much"
Congzheng Song, ... -- CCS 2017
"Nonmalleable Information Flow Control"
Ethan Cecchetti, Andrew C. Myers, ... -- CCS 2017
"Practical Secure Aggregation for Privacy-Preserving Machine Learning"
Antonio Marcedone, ... -- CCS 2017
"Solidus: Confidential Distributed Ledger Transactions via PVORM"
Ethan Cecchetti, Fan Zhang, Elaine Shi, ... -- CCS 2017
"The TypTop System: Personalized Typo-tolerant Password Checking"
Anusha Chowdhury, ... -- CCS 2017
"Vale: Verifying High-Performance Cryptographic Assembly Code"
Laure Thompson, ... -- Usenix 2017
"REM: Resource-Efficient Mining for Blockchains"
Fan Zhang, Ittay Eyal, Robert Escriva, Robbert van Renesse, ... -- Usenix 2017
"Things You May Not Know About Android (Un)Packers: A Systematic Study based on Whole-System Emulation."
Mu Zhang, ... -- NDSS 2018
"Towards a Timely Causality Analysis for Enterprise Security."
Mu Zhang, ... -- NDSS 2018
"FPGA-Based Remote Power Side-Channel Attacks"
Mark Zhao, Gookwon Edward Suh, ... -- Oakland 2018
"The Spyware Used in Intimate Partner Violence"
Sam Havron, ... -- Oakland 2018
"xJsnark: A Framework for Efficient Verifiable Computation"
Elaine Shi, ... -- Oakland 2018
"HyperFlow: A High-Assurance Processor Architecture for Practical Timing-Safe Information Flow Security"
Andrew Ferraiuolo, Yuqi Zhao, Andrew C. Myers, Gookwon Edward Suh, ... -- CCS 2018
"NodeMerge: Template Based Efficient Data Reduction For Big-Data Causality Analysis"
Mu Zhang, ... -- CCS 2018
"Symbolic Proofs for Lattice-Based Cryptography"
Xiong Fan, Joshua Gancher, Elaine Shi, ... -- CCS 2018
"BurnBox: Self-Revocable Encryption in a World Of Compelled Access"
Nirvan Tyagi, ... -- Usenix 2018
"Balancing Image Privacy and Usability with Thumbnail-Preserving Encryption"
Rhea Dutta, ... -- NDSS 2019
"Beyond Credential Stuffing: Password Similarity Models using Neural Networks"
Bijeeta Pal, Rahul Chatterjee, ... -- Oakland 2019
"Exploiting Unintended Feature Leakage in Collaborative Learning"
Congzheng Song, ... -- Oakland 2019
"Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks"
Paul Grubbs, ... -- Oakland 2019
"Towards Automated Safety Vetting of PLC Code in Real-World Plants"
Mu Zhang, Elaine Shi, ... -- Oakland 2019
"Efficient Verifiable Secret Sharing with Share Recovery in BFT Protocols"
Soumya Basu, Emin Gun Sirer, ... -- CCS 2019
"Moving Beyond Set-It-And-Forget-It Privacy Settings on Social Media"
Mainack Mondal, ... -- CCS 2019
"Multisketches: Practical Secure Sketches Using Off-the-Shelf Biometric Matching Algorithms"
Rahul Chatterjee, ... -- CCS 2019
"Oh, the Places You've Been! User Reactions to Longitudinal Transparency About Third-Party Web Tracking and Inferencing"
Mainack Mondal, ... -- CCS 2019
"PIEs: Public Incompressible Encodings for Decentralized Storage"
Ethan Cecchetti, ... -- CCS 2019
"Proof-Carrying Network Code"
Steffen Smolka, Nate Foster, ... -- CCS 2019
"Protocols for Checking Compromised Credentials"
Lucy Li, Bijeeta Pal, Rahul Chatterjee, ... -- CCS 2019
"SEEMless: Secure End-to-End Encrypted Messaging with less Trust"
Harjasleen Malvai, ... -- CCS 2019
"Traceback for End-to-End Encrypted Messaging"
Nirvan Tyagi, ... -- CCS 2019
"DeepBinDiff: Learning Program-Wide Code Representations for Binary Diffing"
Yue Duan, ... -- NDSS 2020
"Path Oblivious Heap: Optimal and Practical Oblivious Priority Queue"
Elaine Shi, ... -- Oakland 2020
"Sync HotStuff: Simple and Practical Synchronous State Machine Replication"
Maofan Yin, ... -- Oakland 2020
"DECO: Liberating Web Data Using Decentralized Oracles for TLS"
Fan Zhang, Harjasleen Malvai, ... -- CCS 2020
"BDoS: Blockchain Denial-of-Service Attacks"
Jonathan Pang, Ariah Klages-Mundt, ... -- CCS 2020
"Information Leakage in Embedding Models"
Congzheng Song, ... -- CCS 2020
"Stealthy Tracking of Autonomous Vehicles with Cache Side Channels"
Mulong Luo, Andrew C. Myers, G. Edward Suh, ... -- Usenix 2020
"The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums"
Emily Tseng, ... -- Usenix 2020
"Pancake: Frequency Smoothing for Encrypted Data Stores"
Rachit Agarwal, ... -- Usenix 2020
"CanDID: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance, and Accountability"
Harjasleen Malvai, Alexander Frolov, ... -- Oakland 2021
"Compositional Security for Reentrant Applications"
Ethan Cecchetti, Siqiu Yao, Haobin Ni, Andrew C. Myers, ... -- Oakland 2021
"SoK: Hate, Harassment, and the Changing Landscape of Online Abuse"
Nicola Dell, ... -- Oakland 2021
"Wireless Charging Power Side-Channel Attacks"
Alexander La Cour, Edward Suh, Khurram Afridi, ... -- CCS 2021
"Generalized Proof of Liabilities"
Yan Ji, ... -- CCS 2021
"Adapting Security Warnings to Counter Online Disinformation"
J. Nathan Matias, ... -- Usenix 2021
"You Autocomplete Me: Poisoning Vulnerabilities in Neural Code Completion"
Congzheng Song, ... -- Usenix 2021
"Searching Encrypted Data with Size-Locked Indexes"
Armin Namavari, ... -- Usenix 2021
"SoK: Authentication in Augmented and Virtual Reality"
Bijeeta Pal, ... -- Oakland 2022
"VeRSA: Verifiable Registries with Efficient Client Audits from RSA Authenticated Dictionaries"
Nirvan Tyagi, ... -- CCS 2022
"Increasing Adversarial Uncertainty to Scale Private Similarity Testing"
Yiqing Hua, Armin Namavari, Kaishuo Cheng, Mor Naaman, Thomas Ristenpart, ... -- Usenix 2022
"Orca: Blocklisting in Sender-Anonymous Messaging"
Nirvan Tyagi, Julia Len, ... -- Usenix 2022
"Might I Get Pwned: A Second Generation Compromised Credential Checking Service"
Bijeeta Pal, Marina Sanusi Bohuk, ... -- Usenix 2022
"Gossamer: Securely Measuring Password-based Logins"
Marina Sanusi Bohuk, ... -- Usenix 2022