"Anomaly Detection Using Call Stack Information"
Oleg M. Kolesnikov, Prahlad Fogla, Wenke Lee, ... -- Oakland 2003
"Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation"
Jun Li, Minho Sung, Jun Jim Xu, ... -- Oakland 2004
"Formalizing Sensitivity in Static Analysis for Intrusion Detection"
Wenke Lee, ... -- Oakland 2004
"Securing Publish-Subscribe Overlay Services with EventGuard"
Mudhakar Srivatsa, Ling Liu, ... -- CCS 2005
"Countering Targeted File Attacks Using LocationGuard"
Mudhakar Srivatsa, Ling Liu, ... -- Usenix 2005
"Modeling Botnet Propagation Using Time Zones"
David Dagon, Wenke Lee, ... -- NDSS 2006
"Misleading Worm Signature Generators Using Deliberate Noise Injection"
Roberto Perdisci, David Dagon, Wenke Lee, Prahlad Fogla, Monirul Sharif, ... -- Oakland 2006
"Evading Network Anomaly Detection Systems: Formal Reasoning and Practical Techniques"
Prahlad Fogla, Wenke Lee, ... -- CCS 2006
"Polymorphic Blending Attacks"
Prahlad Fogla, Monirul Sharif, Roberto Perdisci, Oleg M. Kolesnikov, Wenke Lee, ... -- Usenix 2006
"Extended abstract: Provable-Security Analysis of Authenticated Encryption in Kerberos"
Alexandra Boldyreva, Virendra Kumar, ... -- Oakland 2007
"Ordered Multisignatures and Identity-Based Sequential Aggregate Signatures, with Applications to Secure Routing"
Alexandra Boldyreva, Adam O'Neill, ... -- CCS 2007
"Filtering Spam with Behavioral Blacklisting"
Anirudh Ramachandran, Nick Feamster, Santosh Vempala, ... -- CCS 2007
"BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation"
Guofei Gu, Wenke Lee, ... -- Usenix 2007
"Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority"
David Dagon, Christopher Lee, Wenke Lee, ... -- NDSS 2008
"BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic"
Guofei Gu, Junjie Zhang, Wenke Lee, ... -- NDSS 2008
"Impeding Malware Analysis Using Conditional Code Obfuscation"
Monirul Sharif, Jonathon T. Giffin, Wenke Lee, ... -- NDSS 2008
"Preserving Caller Anonymity in Voice-over-IP Networks"
Ling Liu, ... -- Oakland 2008
"Lares: An Architecture for Secure Active Monitoring Using Virtualization"
Wenke Lee, Monirul Sharif, Martim Carbone, Bryan D. Payne, ... -- Oakland 2008
"Identity-based Encryption with Efficient Revocation"
Alexandra Boldyreva, Virendra Kumar, ... -- CCS 2008
"Increased DNS Forgery Resistance Through 0x20-Bit Encoding"
David Dagon, Manos Antonakakis, Wenke Lee, ... -- CCS 2008
"Ether: Malware Analysis via Hardware Virtualization Extensions"
Artem Dinaburg, Paul Royal, Monirul Sharif, Wenke Lee, ... -- CCS 2008
"BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection"
Wenke Lee, Guofei Gu, Junjie Zhang, ... -- Usenix 2008
"K-Tracer: A System for Extracting Kernel Malware Behavior"
Andrea Lanzi, Monirul Sharif, Wenke Lee, ... -- NDSS 2009
"Recursive DNS Architectures and Vulnerability Implications"
David Dagon, Manos Antonakakis, Xiapu Luo, Christopher Lee, Wenke Lee, ... -- NDSS 2009
"Automatic Reverse Engineering of Malware Emulators"
Jonathon T. Giffin, Wenke Lee, Monirul Sharif, Andrea Lanzi, ... -- Oakland 2009
"On cellular botnets: measuring the impact of malicious devices on a cellular network core"
Patrick Traynor, ... -- CCS 2009
"Secure in-VM monitoring using hardware virtualization"
Monirul Sharif, Wenke Lee, ... -- CCS 2009
"Mapping kernel objects to enable systematic integrity checking"
Martim Carbone, Long Lu, Wenke Lee, ... -- CCS 2009
"Robust signatures for kernel data structures"
Brendan Dolan-Gavitt, Abhinav Srivastava, Patrick Traynor, Jonathon T. Giffin, ... -- CCS 2009
"Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine"
Nick Feamster, Shuang Hao, Nadeem Syed, Alexander Gray, ... -- Usenix 2009
"Locating Prefix Hijackers using LOCK"
Jun Xu, Tongqing Qiu, ... -- Usenix 2009
"xBook: Redesigning Privacy Control in Social Networking Platforms"
Wenke Lee, Kapil Singh, ... -- Usenix 2009
"On the Incoherencies in Web Browser Access Control Policies"
Kapil Singh, Wenke Lee, ... -- Oakland 2010
"PinDr0p: using single-ended audio features to determine call provenance"
Vijay Balasubramaniyan, Aamir Poonawalla, Mustaque Ahamad, Michael T. Hunter, Patrick Traynor, ... -- CCS 2010
"BLADE: an attack-agnostic approach for preventing drive-by malware infections"
Long Lu, Wenke Lee, ... -- CCS 2010
"Platform-independent programs"
Richard Jay Lipton, ... -- CCS 2010
"Building a Dynamic Reputation System for DNS"
Manos Antonakakis, Roberto Perdisci, David Dagon, Wenke Lee, Nick Feamster, ... -- Usenix 2010
"Automatic Generation of Remediation Procedures for Malware Infections"
Jonathon T. Giffin, ... -- Usenix 2010
"Chipping Away at Censorship Firewalls with User-Generated Content"
Sam Burnett, Nick Feamster, Santosh Vempala, ... -- Usenix 2010
"Efficient Monitoring of Untrusted Kernel-Mode Execution"
Abhinav Srivastava, Jonathon T. Giffin, ... -- NDSS 2011
"No Loitering: Exploiting Lingering Vulnerabilities in Default COM Objects"
David Dewey, Patrick Traynor, ... -- NDSS 2011
"HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows"
Wenke Lee, ... -- NDSS 2011
"Virtuoso: Narrowing the Semantic Gap in Virtual Machine Introspection"
Brendan Dolan-Gavitt, Jonathon T. Giffin, Wenke Lee, ... -- Oakland 2011
"SURF: Detecting and Measuring Search Poisoning"
Long Lu, Wenke Lee, ... -- CCS 2011
"(sp)iPhone: Decoding Vibrations From Nearby Keyboards Using Mobile Phone Accelerometers"
Arunabh Verma, Henry Carter, Patrick Traynor, ... -- CCS 2011
"Detecting Malware Domains at the Upper DNS Hierarchy"
Manos Antonakakis, Wenke Lee, David Dagon, ... -- Usenix 2011
"Accountable Wiretapping -or- I know they can hear you now"
Patrick Traynor, ... -- NDSS 2012
"Static detection of C++ vtable escape vulnerabilities in binary code"
David Dewey, Jonathon T. Giffin, ... -- NDSS 2012
"Provable Security of S-BGP and other Path Vector Protocols: Model, Analysis and Extensions"
Alexandra Boldyreva, Robert Lychev, ... -- CCS 2012
"CHEX: Statically Vetting Android Apps for Component Hijacking Vulnerabilities"
Long Lu, Wenke Lee, ... -- CCS 2012
"From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware"
Manos Antonakakis, Yacin Nadji, Wenke Lee, David Dagon, ... -- Usenix 2012
"The Core of the Matter: Analyzing Malicious Traffic in Cellular Carriers"
Charles Lever, Brad Reaves, Patrick Traynor, Wenke Lee, ... -- NDSS 2013
"Intention and Origination: An Inside Look at Large-Scale Bot Queries"
Wenke Lee, ... -- NDSS 2013
"Tappan Zee (North) Bridge: Mining Memory Accesses for Introspection"
Brendan Dolan-Gavitt, Wenke Lee, ... -- CCS 2013
"Beheading Hydras: Performing Effective Botnet Takedowns"
Yacin Nadji, David Dagon, Wenke Lee, ... -- CCS 2013
"Secure Outsourced Garbled Circuit Evaluation for Mobile Devices"
Henry Carter, Patrick Traynor, ... -- Usenix 2013
"Jekyll on iOS: When Benign Apps Become Evil"
Tielei Wang, Kangjie Lu, Long Lu, Simon Pak Ho Chung, Wenke Lee, ... -- Usenix 2013
"ExecScent: Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates"
Terry Nelms, Roberto Perdisci, Mustaque Ahamad, ... -- Usenix 2013
"Take This Personally: Pollution Attacks on Personalized Services"
Xinyu Xing, Wei Meng, Dan Doozan, Nick Feamster, Wenke Lee, ... -- Usenix 2013
"Gyrus: A Framework for User-Intent Monitoring of Text-based Networked Applications"
Yeongjin Jang, Simon Pak Ho Chung, Wenke Lee, ... -- NDSS 2014
"From Zygote to Morula: Fortifying Weakened ASLR on Android"
Byoungyoung Lee, Tielei Wang, Wenke Lee, ... -- Oakland 2014
"ClickMiner: Towards Forensic Reconstruction of User-Browser Interactions from Network Traces"
Terry Nelms, ... -- CCS 2014
"Structural Data De-anonymization: Quantification, Practice, and Implications"
Shouling Ji, Weiqing Li, Raheem Beyah, ... -- CCS 2014
"Your Online Interests - Pwned! A Pollution Attack Against Targeted Advertising"
Wei Meng, Xinyu Xing, Wenke Lee, ... -- CCS 2014
"Deniable Liaisons"
Abhinav Narain, Nick Feamster, ... -- CCS 2014
"A11y Attacks: Exploiting Accessibility in Operating Systems"
Yeongjin Jang, Chengyu Song, Simon Pak Ho Chung, Tielei Wang, Wenke Lee, ... -- CCS 2014
"Mimesis Aegis: A Mimicry Privacy Shield, A System's Approach to Data Privacy on Public Cloud"
Billy Lau, Simon Pak Ho Chung, Chengyu Song, Yeongjin Jang, Wenke Lee, Alexandra Boldyreva, ... -- Usenix 2014
"On the Feasibility of Large-Scale Infections of iOS Devices"
Tielei Wang, Yeongjin Jang, Yizheng Chen, Simon Pak Ho Chung, Billy Lau, Wenke Lee, ... -- Usenix 2014
"Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting"
Kangjie Lu, Cong Zheng, Wenke Lee, ... -- NDSS 2015
"Exploiting and Protecting Dynamic Code Generation"
Chengyu Song, Tielei Wang, Wenke Lee, ... -- NDSS 2015
"On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge"
Shouling Ji, Weiqing Li, Raheem Beyah, ... -- NDSS 2015
"Phoneypot: Data-driven Understanding of Telephony Threats"
Bharat Srinivasan, Mustaque Ahamad, ... -- NDSS 2015
"Preventing Use-after-free with Dangling Pointers Nullification"
Byoungyoung Lee, Chengyu Song, Yeongjin Jang, Tielei Wang, Taesoo Kim, Wenke Lee, ... -- NDSS 2015
"VTint: Defending Virtual Function Tables' Integrity"
Chengyu Song, ... -- NDSS 2015
"How Secure and Quick is QUIC? Provable Security and Performance Analyses"
Alexandra Boldyreva, ... -- Oakland 2015
"Cracking App Isolation on Apple: Unauthorized Cross-App Resource Access on MAC OS X and iOS"
Xiaojing Liao, ... -- CCS 2015
"ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks"
Kangjie Lu, Chengyu Song, Byoungyoung Lee, Simon Pak Ho Chung, Taesoo Kim, Wenke Lee, ... -- CCS 2015
"UCognito: Private Browsing without Tears"
Meng Xu, Yeongjin Jang, Xinyu Xing, Taesoo Kim, Wenke Lee, ... -- CCS 2015
"Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations"
Yeongjin Jang, Taesoo Kim, ... -- CCS 2015
"Type Casting Verification: Stopping an Emerging Attack Vector"
Byoungyoung Lee, Chengyu Song, Taesoo Kim, Wenke Lee, ... -- Usenix 2015
"SecGraph: A Uniform and Open-source Evaluation System for Graph Data Anonymization and De-anonymization"
Shouling Ji, Weiqing Li, Raheem Beyah, ... -- Usenix 2015
"Boxed Out: Blocking Cellular Interconnect Bypass Fraud at the Network Edge"
Ethan Shernan, Henry Carter, ... -- Usenix 2015
"SUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps"
Kangjie Lu, ... -- Usenix 2015
"WebWitness: Investigating, Categorizing, and Mitigating Malware Download Paths"
Terry Nelms, Roberto Perdisci, Manos Antonakakis, Mustaque Ahamad, ... -- Usenix 2015
"The Price of Free: Privacy Leakage in Personalized Mobile In-Apps Ads"
Wei Meng, Ren Ding, Simon Pak Ho Chung, Steven Han, Wenke Lee, ... -- NDSS 2016
"VTrust: Regaining Trust on Virtual Calls"
Chengyu Song, ... -- NDSS 2016
"Who's in Control of Your Control System? Device Fingerprinting for Cyber-Physical Systems"
David Formby, Preethi Srinivasan, Andrew Leonard, Jonathan Rogers, Raheem Beyah, ... -- NDSS 2016
"OpenSGX: An Open Platform for SGX Research"
Prerit Jain, Soham Desai, Ming-Wei Shih, Taesoo Kim, ... -- NDSS 2016
"How to Make ASLR Win the Clone Wars: Runtime Re-Randomization"
Kangjie Lu, Wenke Lee, ... -- NDSS 2016
"Enforcing Kernel Security Invariants with Data Flow Integrity"
Chengyu Song, Byoungyoung Lee, Kangjie Lu, William R. Harris, Taesoo Kim, Wenke Lee, ... -- NDSS 2016
"FLEXDROID: Enforcing In-App Privilege Separation in Android"
Taesoo Kim, ... -- NDSS 2016
"Domain-Z: 28 Registrations Later"
Chaz Lever, Yacin Nadji, David Dagon, Manos Antonakakis, ... -- Oakland 2016
"HDFI: Hardware-Assisted Data-Fow Isolation"
Chengyu Song, Monjur Alam, Insu Yun, Byoungyoung Lee, Taesoo Kim, Wenke Lee, ... -- Oakland 2016
"Seeking Nonsense, Looking for Trouble: Efficient Promotional-Infection Detection through Semantic Inconsistency Search"
Xiaojing Liao, Raheem Beyah, ... -- Oakland 2016
"Staying Secure and Unprepared: Understanding and Mitigating the Security Risks of Apple ZeroConf"
Xiaojing Liao, ... -- Oakland 2016
"Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence"
Xiaojing Liao, Raheem Beyah, ... -- CCS 2016
"SmartWalk: Enhancing Social Network Security via Adaptive Random Walks"
Shouling Ji, ... -- CCS 2016
"Breaking Kernel Address Space Layout Randomization with Intel TSX"
Yeongjin Jang, Sangho Lee, Taesoo Kim, ... -- CCS 2016
"Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository as a Malicious Service"
Xiaojing Liao, Raheem Beyah, ... -- CCS 2016
"UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages"
Kangjie Lu, Chengyu Song, Taesoo Kim, Wenke Lee, ... -- CCS 2016
"Λ○λ: Functional Lattice Cryptography"
Eric Crockett, ... -- CCS 2016
"Towards Measuring and Mitigating Social Engineering Malware Download Attacks"
Terry Nelms, Roberto Perdisci, Manos Antonakakis, Mustaque Ahamad, ... -- Usenix 2016
"APISan: Sanitizing API Usages through Semantic Cross-checking"
Insu Yun, Changwoo Min, Xujie Si, Yeongjin Jang, Taesoo Kim, Mayur Naik, ... -- Usenix 2016
"Dynamic Differential Location Privacy with Personalized Error Bounds"
Lei Yu, Ling Liu, Calton Pu, ... -- NDSS 2017
"SGX-Shield: Enabling Address Space Layout Randomization for SGX Programs"
Ming-Wei Shih, Taesoo Kim, ... -- NDSS 2017
"T-SGX: Eradicating Controlled-Channel Attacks Against Enclave Programs"
Ming-Wei Shih, Sangho Lee, Taesoo Kim, ... -- NDSS 2017
"Internet-scale Probing of CPS: Inference, Characterization and Orchestration Analysis"
Mustaque Ahamad, ... -- NDSS 2017
"Unleashing Use-Before-Initialization Vulnerabilities in the Linux Kernel Using Targeted Stack Spraying"
Kangjie Lu, Wenke Lee, ... -- NDSS 2017
"A Lustrum of Malware Network Communication: Evolution and Insights"
Chaz Lever, Manos Antonakakis, ... -- Oakland 2017
"Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop"
Chenxiong Qian, Simon Pak Ho Chung, Wenke Lee, ... -- Oakland 2017
"Protecting Bare-metal Embedded Systems with Privilege Overlays"
Khaled Saab, ... -- Oakland 2017
"Under the Shadow of Sunshine: Understanding and Detecting Bulletproof Hosting on Legitimate Service Provider Networks"
Xiaojing Liao, Raheem Beyah, ... -- Oakland 2017
"Checking Open-Source License Violation and 1-day Security Risk at Large Scale"
Ruian Duan, Ashish Bijlani, Meng Xu, Taesoo Kim, Wenke Lee, ... -- CCS 2017
"Designing New Operating Primitives to Improve Fuzzing Performance"
Wen Xu, Sanidhya Kashyap, Changwoo Min, Taesoo Kim, ... -- CCS 2017
"FlashGuard: Leveraging Intrinsic Flash Properties to Defend Against Encryption Ransomware"
Jian Huang, Moinuddin K. Qureshi, ... -- CCS 2017
"Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse"
Panagiotis Kintis, Charles Lever, Yizheng Chen, Rosa Romero-Gomez, Manos Antonakakis, ... -- CCS 2017
"Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection"
Le Song, ... -- CCS 2017
"Practical Attacks Against Graph-based Clustering"
Yizheng Chen, Yacin Nadji, Athanasios Kountouras, Manos Antonakakis, ... -- CCS 2017
"RAIN: Refinable Attack Investigation with On-demand Inter-Process Information Flow Tracking"
Yang Ji, Sangho Lee, Evan Downing, Weiren Wang, Mattia Fazzini, Taesoo Kim, Alessandro Orso, Wenke Lee, ... -- CCS 2017
"Efficient Protection of Path-Sensitive Control Security"
Ren Ding, Chenxiong Qian, Bill Harris, Taesoo Kim, Wenke Lee, ... -- Usenix 2017
"PlatPal: Detecting Malicious Documents with Platform Diversity"
Meng Xu, Taesoo Kim, ... -- Usenix 2017
"Hacking in Darkness: Return-oriented Programming against Secure Enclaves"
Yeongjin Jang, Taesoo Kim, ... -- Usenix 2017
"Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing"
Sangho Lee, Ming-Wei Shih, Prasun Gera, Taesoo Kim, Hyesoon Kim, ... -- Usenix 2017
"Seeing Through The Same Lens: Introspecting Guest Address Space At Native Speed"
Wen Xu, ... -- Usenix 2017
"Understanding the Mirai Botnet"
Manos Antonakakis, Chaz Lever, ... -- Usenix 2017
"See No Evil, Hear No Evil, Feel No Evil, Print No Evil? Malicious Fill Patterns Detection in Additive Manufacturing"
Christian Bayens, Raheem Beyah, ... -- Usenix 2017
"rtCaptcha: A Real-Time CAPTCHA Based Liveness Detection System."
Erkam Uzun, Simon Pak Ho Chung, Irfan Essa, Wenke Lee, ... -- NDSS 2018
"Broken Fingers: On the Usage of the Fingerprint API in Android."
Simon Pak Ho Chung, Wenke Lee, ... -- NDSS 2018
"Towards Measuring the Effectiveness of Telephony Blacklists."
Sharbani Pandit, Mustaque Ahamad, ... -- NDSS 2018
"Tipped Off by Your Memory Allocator: Device-Wide User Activity Sequencing from Android Memory Images."
Brendan Saltaformaggio, ... -- NDSS 2018
"Game of Missuggestions: Semantic Analysis of Search-Autocomplete Manipulations."
Raheem Beyah, ... -- NDSS 2018
"Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels"
Meng Xu, Chenxiong Qian, Taesoo Kim, ... -- Oakland 2018
"Utility-aware synthesis of differentially private and attack-resilient location traces"
Mehmet Emre Gursoy, Ling Liu, Stacey Truex, Lei Yu, Wenqi Wei, ... -- CCS 2018
"ClickShield: Are You Hiding Something? Towards Eradicating Clickjacking on Android"
Simon Pak Ho Chung, Wenke Lee, ... -- CCS 2018
"Enforcing Unique Code Target Property for Control-Flow Integrity"
Hong Hu, Chenxiong Qian, Carter Yagemann, Simon Pak Ho Chung, Bill Harris, Taesoo Kim, Wenke Lee, ... -- CCS 2018
"Improved Non-Interactive Zero Knowledge with Applications to Post-Quantum Signatures"
Vladimir Kolesnikov, ... -- CCS 2018
"Rampart: Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks"
Chenxiong Qian, Wenke Lee, ... -- Usenix 2018
"One&Done: A Single-Decryption EM-Based Attack on OpenSSL's Constant-Time Blinded RSA"
Monjur Alam, Haider Adnan Khan, Moumita Dey, Nishith Sinha, Robert Callan, Alenka Zajic, Milos Prvulovic, ... -- Usenix 2018
"QSYM : A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing"
Insu Yun, Sangho Lee, Meng Xu, Taesoo Kim, ... -- Usenix 2018
"Enabling Refinable Cross-Host Attack Investigation with Efficient Data Flow Tagging and Tracking"
Yang Ji, Sangho Lee, Mattia Fazzini, Joey Allen, Evan Downing, Taesoo Kim, Alessandro Orso, Wenke Lee, ... -- Usenix 2018
"Automating Patching of Vulnerable Open-Source Software Versions in Application Binaries"
Ruian Duan, Ashish Bijlani, Yang Ji, Omar Alrawi, Moses Ike, Brendan Saltaformaggio, Wenke Lee, ... -- NDSS 2019
"RFDIDS: Radio Frequency-based Distributed Intrusion Detection System for the Power Grid"
Tohid Shekari, Christian Bayens, Morris Cohen, Lukas Graber, Raheem Beyah, ... -- NDSS 2019
"Differentially Private Model Publishing For Deep Learning"
Lei Yu, Ling Liu, Calton Pu, Mehmet Emre Gursoy, Stacey Truex, ... -- Oakland 2019
"Dominance as a New Trusted Computing Primitive for the Internet of Things"
Meng Xu, ... -- Oakland 2019
"Fuzzing File Systems via Two-Dimensional Input Space Exploration"
Wen Xu, Sanidhya Kashyap, Po-Ning Tseng, Taesoo Kim, ... -- Oakland 2019
"Iodine: Fast Dynamic Taint Tracking Using Rollback-free Optimistic Hybrid Analysis"
David Devecsery, ... -- Oakland 2019
"SoK: Security Evaluation of Home-Based IoT Deployment"
Omar Alrawi, Chaz Lever, Manos Antonakakis, ... -- Oakland 2019
"SoK: The Challenges, Pitfalls, and Perils of Using Hardware Performance Counters for Security"
Manos Antonakakis, ... -- Oakland 2019
"Where Does It Go? Refining Indirect-Call Targets with Multi-Layer Type Analysis"
Hong Hu, ... -- CCS 2019
"The Betrayal At Cloud City: An Empirical Analysis Of Cloud-Based Mobile Backends"
Omar Alrawi, Ruian Duan, Ranjita Pai Kasturi, Brendan Saltaformaggio, ... -- Usenix 2019
"Reading the Tea leaves: A Comparative Analysis of Threat Intelligence"
Paul Pearce, ... -- Usenix 2019
"RAZOR: A Framework for Post-deployment Software Debloating"
Chenxiong Qian, Hong Hu, Mansour Alharthi, Pak Ho Chung, Taesoo Kim, Wenke Lee, ... -- Usenix 2019
"Fuzzification : Anti-Fuzzing Techniques"
Jinho Jung, Hong Hu, David Solodukhin, Daniel Pagan, Taesoo Kim, ... -- Usenix 2019
"MOPT: Optimized Mutation Scheduling for Fuzzers"
Raheem Beyah, ... -- Usenix 2019
"DESENSITIZATION: Privacy-Aware and Attack-Preserving Crash Report"
Ren Ding, Hong Hu, Wen Xu, Taesoo Kim, ... -- NDSS 2020
"Fuzzing JavaScript Engines with Aspect-preserving Mutation"
Soyeon Park, Wen Xu, Insu Yun, Daehee Jang, Taesoo Kim, ... -- Oakland 2020
"Krace: Data Race Fuzzing for Kernel File Systems"
Meng Xu, Sanidhya Kashyap, Hanqing Zhao, Taesoo Kim, ... -- Oakland 2020
"TARDIS: Rolling Back The Clock On CMS-Targeting Cyber Attacks"
Ranjita Pai Kasturi, Yiting Sun, Ruian Duan, Omar Alrawi, Ehsan Asdar, Victor Zhu, Brendan Saltaformaggio, ... -- Oakland 2020
"Text Captcha Is Dead? A Large Scale Deployment and Empirical Study"
Raheem Beyah, ... -- CCS 2020
"SQUIRREL: Testing Database Management Systems with Language Validity and Coverage Feedback"
Yongheng Chen, Hong Hu, Wenke Lee, ... -- CCS 2020
"FREEDOM: Engineering a State-of-the-Art DOM Fuzzer"
Wen Xu, Soyeon Park, Taesoo Kim, ... -- CCS 2020
"Slimium: Debloating the Chromium Browser with Feature Subsetting"
Chenxiong Qian, HyungJoon Koo, ChangSeok Oh, Taesoo Kim, Wenke Lee, ... -- CCS 2020
"A 2.1 KHz Zero-Knowledge Processor with BubbleRAM"
David Heath, Vladimir Kolesnikov, ... -- CCS 2020
"Mnemosyne: An Effective and Efficient Postmortem Watering Hole Attack Investigation System"
Joey Allen, Zheng Yang, Matthew Landen, Raghav Bhat, Harsh Grover, Andrew Chang, Wenke Lee, ... -- CCS 2020
"Phantom of the ADAS: Securing Advanced Driver-Assistance Systems from Split-Second Phantom Attacks"
Yisroel Mirsky, ... -- CCS 2020
"Shim Shimmeny: Evaluating the Security and Privacy Contributions of Link Shimming in the Modern Web"
Frank Li, ... -- Usenix 2020
"DELF: Safeguarding deletion correctness in Online Social Networks"
Paul Pearce, ... -- Usenix 2020
"Automatic Techniques to Systematically Discover New Heap Exploitation Primitives"
Insu Yun, Taesoo Kim, ... -- Usenix 2020
"C$^2$SR: Cybercrime Scene Reconstruction for Post-mortem Forensic Analysis"
Jinho Jung, Roberto Perdisci, ... -- NDSS 2021
"Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages"
Ruian Duan, Omar Alrawi, Ranjita Pai Kasturi, Ryan Elder, Brendan Saltaformaggio, Wenke Lee, ... -- NDSS 2021
"Understanding the Growth and Security Considerations of ECS"
Athanasios Kountouras, Panagiotis Kintis, Athanasios Avgetidis, Thomas Papastergiou, Charles Lever, Manos Antonakakis, ... -- NDSS 2021
"WINNIE : Fuzzing Windows Applications with Harness Synthesis and Fast Cloning"
Jinho Jung, Stephen Tong, Jungwon Lim, Yonghwi Jin, Taesoo Kim, ... -- NDSS 2021
"ARBITRAR : User-Guided API Misuse Detection"
Binghong Chen, Le Song, ... -- Oakland 2021
"One Engine to Fuzz 'em All: Generic Language Processor Testing with Semantic Validation"
Yongheng Chen, Wenke Lee, ... -- Oakland 2021
"Zero Knowledge for Everything and Everyone: Fast ZK Processor with Cached ORAM for ANSI C Programs"
David Heath, Yibin Yang, David Devecsery, Vladimir Kolesnikov, ... -- Oakland 2021
"C3PO: Large-Scale Study Of Covert Monitoring of C&C Servers via Over-Permissioned Protocol Infiltration"
Jonathan Fuller, Ranjita Pai Kasturi, Amit Sikder, Haichuan Xu, Berat Arik, Vivek Verma, Ehsan Asdar, Brendan Saltaformaggio, ... -- CCS 2021
"Cert-RNN: Towards Certifying the Robustness of Recurrent Neural Networks"
Raheem Beyah, ... -- CCS 2021
"Hardware Support to Improve Fuzzing Performance and Precision"
Ren Ding, Yonghae Kim, Fan Sang, Wen Xu, Gururaj Saileshwar, Taesoo Kim, ... -- CCS 2021
"MaMIoT: Manipulation of Energy Market Leveraging High Wattage IoT Botnets"
Tohid Shekari, Celine Irvene, Raheem Beyah, ... -- CCS 2021
"Automated Bug Hunting With Data-Driven Symbolic Root Cause Analysis"
Carter Yagemann, Simon Pak Ho Chung, Brendan Saltaformaggio, Wenke Lee, ... -- CCS 2021
"HardsHeap: A Universal and Extensible Framework for Evaluating Secure Allocators"
Taesoo Kim, ... -- CCS 2021
"Validating the Integrity of Audit Logs Against Execution Repartitioning Attacks"
Carter Yagemann, Simon Pak Ho Chung, Wenke Lee, ... -- CCS 2021
"An Inside Look into the Practice of Malware Analysis"
Miuyin Yong Wong, Matthew Landen, Manos Antonakakis, Douglas M. Blough, Mustaque Ahamad, ... -- CCS 2021
"One Hot Garbling"
David Heath, Vladimir Kolesnikov, ... -- CCS 2021
"Don't Forget the Stuffing! Revisiting the Security Impact of Typo-Tolerant Password"
Sena Sahin, Frank Li, ... -- CCS 2021
"Fuzzy Labeled Private Set Intersection with Applications to Private Real-Time Biometric Search"
Erkam Uzun, Simon Pak Ho Chung, Vladimir Kolesnikov, Alexandra Boldyreva, Wenke Lee, ... -- Usenix 2021
"MIRAGE: Mitigating Conflict-Based Cache Attacks with a Practical Fully-Associative Design"
Gururaj Saileshwar, Moinuddin K. Qureshi, ... -- Usenix 2021
"ARCUS: Symbolic Root Cause Analysis of Exploits in Production Systems"
Carter Yagemann, Simon Pak Ho Chung, Brendan Saltaformaggio, Wenke Lee, ... -- Usenix 2021
"Preventing Use-After-Free Attacks with Fast Forward Allocation"
Insu Yun, Daehee Jang, JungWon Lim, Taesoo Kim, ... -- Usenix 2021
"Leakage of Dataset Properties in Multi-Party Machine Learning"
Wanrong Zhang, ... -- Usenix 2021
"UNIFUZZ: A Holistic and Pragmatic Metrics-Driven Platform for Evaluating Fuzzers"
Sizhuang Liang, Raheem Beyah, ... -- Usenix 2021
"Abusing Hidden Properties to Attack the Node.js Ecosystem"
Feng Xiao, Guangliang Yang, Wenke Lee, ... -- Usenix 2021
"DeepReflect: Discovering Malicious Functionality through Binary Reconstruction"
Evan Downing, Yisroel Mirsky, Kyuhong Park, Wenke Lee, ... -- Usenix 2021
"The Circle Of Life: A Large-Scale Study of The IoT Malware Lifecycle"
Omar Alrawi, Charles Lever, Kevin Valakuzhy, Manos Antonakakis, ... -- Usenix 2021
"Forecasting Malware Capabilities From Cyber Attack Memory Images"
Omar Alrawi, Moses Ike, Matthew Pruett, Ranjita Pai Kasturi, Srimanta Barua, Taleb Hirani, Brennan Hill, Brendan Saltaformaggio, ... -- Usenix 2021
"Deep Entity Classification: Abusive Account Detection for Online Social Networks"
Frank Li, Paul Pearce, ... -- Usenix 2021
"MPInspector: A Systematic and Automatic Approach for Evaluating the Security of IoT Messaging Protocols"
Binbin Zhao, Raheem Beyah, ... -- Usenix 2021
"What's in a Name? Exploring CA Certificate Control"
Manos Antonakakis, ... -- Usenix 2021
"Hiding My Real Self! Protecting 3D Printer Intellectual Property Against Optical Side-Channel Attacks"
Sizhuang Liang, Raheem Beyah, ... -- NDSS 2022
"EMS: History-Driven Mutation for Coverage-based Fuzzing"
Binbin Zhao, Raheem Beyah, ... -- NDSS 2022
"SoK: Social Cybersecurity"
Yuxi Wu, W. Keith Edwards, Sauvik Das, ... -- Oakland 2022
"SpecHammer: Combining Spectre and Rowhammer for New Speculative Attacks"
Daniel Genkin, ... -- Oakland 2022
"Spook.js: Attacking Chrome Strict Site Isolation via Speculative Execution"
Jason Kim, Daniel Genkin, ... -- Oakland 2022
"Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings"
Raheem Beyah, ... -- Oakland 2022
"DriveFuzz: Discovering Autonomous Driving Bugs through Driving Quality-Guided Fuzzing"
Seulbae Kim, ... -- CCS 2022
"Exposing the Rat in the Tunnel: Using Traffic Analysis for Tor-based Malware Detection"
Omar Alrawi, ... -- CCS 2022
"HammerScope: Observing DRAM Power Consumption Using Rowhammer"
Kevin Sam Tharayil, Daniel Genkin, Angelos D. Keromytis, ... -- CCS 2022
"Understanding and Mitigating Remote Code Execution Vulnerabilities in Cross-platform Ecosystem"
Feng Xiao, Zheng Yang, Joey Allen, Grant Williams, Wenke Lee, ... -- CCS 2022
"When Frodo Flips: End-to-End Key Recovery on FrodoKEM via Rowhammer"
Daniel Genkin, ... -- CCS 2022
"Cart-ology: Intercepting Targeted Advertising via Ad Network Identity Entanglement"
ChangSeok Oh, Paul Pearce, ... -- CCS 2022
""How Do You Not Lose Friends?": Synthesizing a Design Space of Social Controls for Securing Shared Digital Resources Via Participatory Design Jams"
Eyitemi Moju-Igbene, Hanan Abdi, Alan Lu, Sauvik Das, ... -- Usenix 2022
"PrivGuard: Privacy Regulation Compliance Made Easier"
Usmann Khan, ... -- Usenix 2022
"Spoki: Unveiling a New Wave of Scanners through a Reactive Network Telescope"
Alberto Dainotti, ... -- Usenix 2022
"Mistrust Plugins You Must: A Large-Scale Study Of Malicious Plugins In WordPress Marketplaces"
Ranjita Pai Kasturi, Jonathan Fuller, Yiting Sun, Omar Chabklo, Andres Rodriguez, Jeman Park, Brendan Saltaformaggio, ... -- Usenix 2022
"Hiding in Plain Sight? On the Efficacy of Power Side Channel-Based Control Flow Monitoring"
Saman Zonouz, ... -- Usenix 2022
"Lend Me Your Ear: Passive Remote Physical Side Channels on PCs"
Daniel Genkin, ... -- Usenix 2022
"Building an Open, Robust, and Stable Voting-Based Domain Top List"
Qinge Xie, Frank Li, ... -- Usenix 2022
"Many Roads Lead To Rome: How Packet Headers Influence DNS Censorship Measurement"
Abhishek Bhaskar, Paul Pearce, ... -- Usenix 2022
"In-Kernel Control-Flow Integrity on Commodity OSes using ARM Pointer Authentication"
Taesoo Kim, ... -- Usenix 2022
"MaDIoT 2.0: Modern High-Wattage IoT Botnet Attacks and Defenses"
Tohid Shekari, Raheem Beyah, ... -- Usenix 2022