"Using Model Checking to Analyze Network Vulnerabilities"
Paul Ammann, ... -- Oakland 2000
"Kronos: A Scalable Group Re-Keying Approach for Secure Multicast"
Sanjeev Setia, Samir Koussih, Sushil Jajodia, ... -- Oakland 2000
"Performance of Public Key-Enabled Kerberos Authentication in Large Networks"
Daniel A. Menasce, ... -- Oakland 2001
"Policy algebras for access control: the propositional case"
Duminda Wijesekera, Sushil Jajodia, ... -- CCS 2001
"The performance of public key-enabled kerberos authentication in mobile computing applications"
Daniel A. Menasce, ... -- CCS 2001
"Policy algebras for access control the predicate case"
Duminda Wijesekera, Sushil Jajodia, ... -- CCS 2002
"Scalable, graph-based network vulnerability analysis"
Paul Ammann, Duminda Wijesekera, Saket Kaushik, ... -- CCS 2002
"LEAP: efficient security mechanisms for large-scale distributed sensor networks"
Sencun Zhu, Sanjeev Setia, Sushil Jajodia, ... -- CCS 2003
"Balancing confidentiality and efficiency in untrusted relational DBMSs"
Sushil Jajodia, ... -- CCS 2003
"Safety in Automated Trust Negotiation"
William H. Winsborough, ... -- Oakland 2004
"Securing OLAP Data Cubes Against Privacy Breaches"
Lingyu Wang, Sushil Jajodia, Duminda Wijesekera, ... -- Oakland 2004
"An Interleaved Hop-by-Hop Authentication Scheme for Filtering False Data Injection in Sensor Networks"
Sencun Zhu, Sanjeev Setia, Sushil Jajodia, ... -- Oakland 2004
"Tracking Anonymous Peer-to-Peer VoIP Calls on the Internet"
Xinyuan Wang, Shiping Chen, Sushil Jajodia, ... -- CCS 2005
"Providing Witness Anonymity in Peer-to-Peer Systems"
Bo Zhu, Sanjeev Setia, Sushil Jajodia, ... -- CCS 2006
"Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems"
Xinyuan Wang, Sushil Jajodia, ... -- Oakland 2007
"Stealthy Malware Detection Through VMM-Based 'Out-of-the-Box' Semantic View Reconstruction"
Xuxian Jiang, Xinyuan Wang, ... -- CCS 2007
"Information Disclosure under Realistic Assumptions: Privacy versus Optimality"
Lei Zhang, Sushil Jajodia, Alexander Brodsky, ... -- CCS 2007
"Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution"
Xuxian Jiang, ... -- NDSS 2008
"Casting out Demons: Sanitizing Training Data for Anomaly Sensors"
Angelos Stavrou, ... -- Oakland 2008
"Assessing Query Privileges via Safe and Efficient Permission Composition"
Sushil Jajodia, ... -- CCS 2008
"SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes"
Kun Sun, Jiang Wang, Fengwei Zhang, Angelos Stavrou, ... -- NDSS 2012
"Chrome Extensions: Threat Analysis and Countermeasures"
Songqing Chen, ... -- NDSS 2012
"Priceless: The Role of Payments in Abuse-advertised Goods"
Damon McCoy, Hitesh Dharmdasani, ... -- CCS 2012
"Manufacturing Compromise: The Emergence of Exploit-as-a-Service"
Damon McCoy, ... -- CCS 2012
"Vigilare: Toward Snoop-based Kernel Integrity Monitor"
Brent Byunghoon Kang, ... -- CCS 2012
"PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs"
Damon McCoy, ... -- Usenix 2012
"Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse"
Damon McCoy, ... -- Usenix 2013
"Scambaiter: Understanding Targeted Nigerian Scams on Craigslist"
Jackie Jones, Damon McCoy, ... -- NDSS 2014
"Botcoin: Monetizing Stolen Cycles"
Hitesh Dharmdasani, Damon McCoy, ... -- NDSS 2014
"Doppelganger Finder: Taking Stylometry To The Underground"
Damon McCoy, ... -- Oakland 2014
"Dialing Back Abuse on Phone Verified Accounts"
Damon McCoy, ... -- CCS 2014
"Characterizing Large-Scale Click Fraud in ZeroAccess"
Damon McCoy, ... -- CCS 2014
"Ad Injection at Scale: Assessing Deceptive Advertisement Modifications"
Damon McCoy, ... -- Oakland 2015
"Using Hardware Features for Increased Debugging Transparency"
Fengwei Zhang, Angelos Stavrou, ... -- Oakland 2015
"When a Tree Falls: Using Diversity in Ensemble Classifiers to Identify Evasion in Malware Detectors"
Charles Smutz, Angelos Stavrou, ... -- NDSS 2016
"You've Got Vulnerability: Exploring Effective Vulnerability Notifications"
Mohammad Karami, ... -- Usenix 2016
"TumbleBit: An Untrusted Bitcoin-Compatible Anonymous Payment Hub"
Foteini Baldimtsi, ... -- NDSS 2017
"To Catch a Ratter: Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild"
Mohammad Rezaeirad, ... -- Oakland 2017
"Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation"
Samuel Ranellucci, ... -- CCS 2017
"Global-Scale Secure Multiparty Computation"
Samuel Ranellucci, ... -- CCS 2017
"Vulnerable Implicit Service: A Revisit"
Lingguang Lei, Kun Sun, ... -- CCS 2017
"Secure Computation with Differentially Private Access Patterns"
Sahar Mazloom, S. Dov Gordon, ... -- CCS 2018
"Schrödinger's RAT: Profiling the Stakeholders in the Remote Access Trojan Ecosystem"
Mohammad Rezaeirad, ... -- Usenix 2018
"End-Users Get Maneuvered: Empirical Analysis of Redirection Hijacking in Content Delivery Networks"
Angelos Stavrou, ... -- Usenix 2018
"Multisketches: Practical Secure Sketches Using Off-the-Shelf Biometric Matching Algorithms"
Tanmoy Chowdhury, Emanuela Marasco, ... -- CCS 2019
"Stormy: Statistics in Tor by Measuring Securely"
S. Dov Gordon, ... -- CCS 2019
"Two-party Private Set Intersection with an Untrusted Third Party."
Phi Hung Le, Samuel Ranellucci, S. Dov Gordon, ... -- CCS 2019
"The CrossPath Attack: Disrupting the SDN Control Channel via Shared Links"
Kun Sun, ... -- Usenix 2019
"Adversarial Classification Under Differential Privacy"
Jonathan Katz, ... -- NDSS 2020
"When Match Fields Do Not Need to Match: Buffered Packets Hijacking in SDN"
Jiahao Cao, Kun Sun, ... -- NDSS 2020
"SPECCFI: Mitigating Spectre Attacks Using CFI Imformed Speculation"
Khaled Khasawneh, ... -- Oakland 2020
"When the Differences in Frequency Domain are Compensated: Understanding and Defeating Modulated Replay Attacks on Automatic Speech Recognition"
Shu Wang, Xu He, Kun Sun, ... -- CCS 2020
"Off-Path TCP Exploits of the Mixed IPID Assignment"
Kun Sun, ... -- CCS 2020
"Cache-in-the-Middle (CITM) Attacks : Manipulating Sensitive Data in Isolated Execution Environments"
Jie Wang, Kun Sun, ... -- CCS 2020
"Secure parallel computation on national scale volumes of data"
Sahar Mazloom, Phi Hung Le, S. Dov Gordon, ... -- Usenix 2020
"Locating the Security Patches for Disclosed OSS Vulnerabilities with Vulnerability-Commit Correlation Ranking"
Kun Sun, ... -- CCS 2021
"SyncAttack: Double-spending in Bitcoin Without Mining Power"
Songqing Chen, ... -- CCS 2021
"Warmonger: Inflicting Denial-of-Service via Serverless Functions in the Cloud"
Mingkui Wei, ... -- CCS 2021
"Compressed Oblivious Encoding for Homomorphically Encrypted Search"
S. Dov Gordon, ... -- CCS 2021
"A Hard Label Black-box Adversarial Attack Against Graph Neural Networks"
Kun Sun, ... -- CCS 2021
"Domain Shadowing: Leveraging Content Delivery Networks for Robust Blocking-Resistant Communications"
Mingkui Wei, ... -- Usenix 2021
"Repttack: Exploiting Cloud Schedulers to Guide Co-Location Attacks"
Behnam Omidi, Khaled N. Khasawneh, ... -- NDSS 2022
"PMTUD is not Panacea: Revisiting IP Fragmentation Attacks against TCP"
Kun Sun, ... -- NDSS 2022
"AccEar: Accelerometer Acoustic Eavesdropping with Unconstrained Vocabulary"
Panneer Selvam Santhalingam, Parth Pathak, ... -- Oakland 2022
"Why Crypto-detectors Fail: A Systematic Evaluation of Cryptographic Misuse Detection Techniques"
Kevin Moran, ... -- Oakland 2022
"Batching, Aggregation, and Zero-Knowledge Proofs in Bilinear Accumulators"
Ioanna Karantaidou, Foteini Baldimtsi, ... -- CCS 2022
"Eluding Secure Aggregation in Federated Learning via Model Inconsistency"
Giuseppe Ateniese, ... -- CCS 2022
"Leakage Inversion: Towards Quantifying Privacy in Searchable Encryption"
Evgenios M. Kornaropoulos, Nathaniel Moyer, ... -- CCS 2022
"Narrator: Secure and Practical State Continuity for Trusted Execution in the Cloud"
Xiaokuan Zhang, ... -- CCS 2022
"Ready Raider One: Exploring the Misuse of Cloud Gaming Services"
Kun Sun, ... -- CCS 2022
"Exploring the Unchartered Space of Container Registry Typosquatting"
Kun Sun, ... -- Usenix 2022
"RapidPatch: Firmware Hotpatching for Real-Time Embedded Devices"
Kun Sun, ... -- Usenix 2022
"Off-Path Network Traffic Manipulation via Revitalized ICMP Redirect Attacks"
Kun Sun, ... -- Usenix 2022