Johns Hopkins University

General Info

Rank: #30 Worldwide
#22 in US
Papers: 87
Number of Researchers: 65
APA
(average papers per authors):
1.3
Country: USA

Activity Map

Contributors

  • Matthew Green (27 papers)
  • Yinzhi Cao (14 papers)
  • Fabian Monrose (10 papers)
  • Ian Miers (9 papers)
  • Susan Hohenberger (9 papers)
  • Giuseppe Ateniese (7 papers)
  • Christina Garman (7 papers)
  • Scott E. Coull (5 papers)
  • Charles V. Wright (5 papers)
  • Aviel D. Rubin (5 papers)
  • Stephen Checkoway (5 papers)
  • Jonathan S. Shapiro (4 papers)
  • Adam Stubblefield (4 papers)
  • Lucas Ballard (4 papers)
  • Gabriel Kaptchuk (3 papers)
  • Song Li (3 papers)
  • Joshua Mason (3 papers)
  • Joseph A. Akinyele (3 papers)
  • Tushar Jois (2 papers)
  • Gerald Masson (2 papers)
  • Michael Rushanan (2 papers)
  • Reza Curtmola (2 papers)
  • Seny Kamara (2 papers)
  • Sam Small (2 papers)
  • Abhishek Jain (2 papers)
  • Gabrielle Beck (2 papers)
  • John Vanderburgh (2 papers)
  • Moheeb Abu Rajab (2 papers)
  • Shujiang Wu (2 papers)
  • Breno Medeiros (1 papers)
  • Michael T. Goodrich (1 papers)
  • Seny Kamaram (1 papers)
  • Jonathan Kirsch (1 papers)
  • Zhen Zhang (1 papers)
  • Bo Hui (1 papers)
  • Yuchen Yang (1 papers)
  • Haolin Yuan (1 papers)
  • Philippe Burlina (1 papers)
  • Zifeng Kang (1 papers)
  • Zhihao Bai (1 papers)
  • Hang Zhu (1 papers)
  • Kathryn Watkins (1 papers)
  • Jason Eisner (1 papers)
  • Sujata Garera (1 papers)
  • Randal Burns (1 papers)
  • Joseph Herring (1 papers)
  • Zachary N. J. Peterson (1 papers)
  • Jae Hyun Ahn (1 papers)
  • Matthew W. Pagano (1 papers)
  • Sean Kross (1 papers)
  • Arka Rai Choudhuri (1 papers)
  • Aviel Rubin (1 papers)
  • Yingwei Li (1 papers)
  • Zhengzhong Jin (1 papers)
  • Darren Davis (1 papers)
  • Eric Northup (1 papers)
  • Steve Bono (1 papers)
  • Andreas Terzis (1 papers)
  • Matthew Brocker (1 papers)
  • Maximilian Zinkus (1 papers)
  • Alishah Chator (1 papers)
  • Vladimir Braverman (1 papers)
  • Jianjia Yu (1 papers)
  • Mingqing Kang (1 papers)
  • Jianwei Hou (1 papers)

Papers

"TRICERT: A Distributed Certified E-Mail Scheme"

Giuseppe Ateniese, Breno Medeiros, Michael T. Goodrich, ... -- NDSS 2001

"A new approach to DNS security (DNSSEC)"

Giuseppe Ateniese, ... -- CCS 2001

"Access and Integrity Control in a Public-Access, High-Assurance Configuration Management System"

Jonathan S. Shapiro, John Vanderburgh, ... -- Usenix 2002

"Vulnerabilities in Synchronous IPC Designs"

Jonathan S. Shapiro, ... -- Oakland 2003

"Analysis of an Electronic Voting System"

Adam Stubblefield, Aviel D. Rubin, ... -- Oakland 2004

"Using Build-Integrated Static Checking to Preserve Correctness Invariants"

Jonathan S. Shapiro, ... -- CCS 2004

"On User Choice in Graphical Password Schemes"

Darren Davis, Fabian Monrose, ... -- Usenix 2004

"Design of the EROS Trusted Window System"

Jonathan S. Shapiro, John Vanderburgh, Eric Northup, ... -- Usenix 2004

"Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage"

Giuseppe Ateniese, Matthew Green, ... -- NDSS 2005

"Untraceable RFID Tags via Insubvertible Encryption"

Giuseppe Ateniese, ... -- CCS 2005

"Proxy Re-Signatures: New Definitions, Algorithms, Applications"

Giuseppe Ateniese, ... -- CCS 2005

"Security Analysis of a Cryptographically-Enabled RFID Device"

Steve Bono, Matthew Green, Adam Stubblefield, Aviel D. Rubin, ... -- Usenix 2005

"On the Effectiveness of Distributed Worm Monitoring"

Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis, ... -- Usenix 2005

"Key Regression: Enabling Efficient Key Distribution for Secure Distributed Storage"

Seny Kamaram, ... -- NDSS 2006

"Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions"

Reza Curtmola, Seny Kamara, ... -- CCS 2006

"A Natural Language Approach to Automated Cryptanalysis of Two-time Pads"

Joshua Mason, Kathryn Watkins, Jason Eisner, Adam Stubblefield, ... -- CCS 2006

"Biometric Authentication Revisited: Understanding the Impact of Wolves in Sheep's Clothing"

Lucas Ballard, Fabian Monrose, ... -- Usenix 2006

"Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces"

Scott E. Coull, Charles V. Wright, Fabian Monrose, ... -- NDSS 2007

"Secret Handshakes with Dynamic and Fuzzy Matching"

Giuseppe Ateniese, Jonathan Kirsch, ... -- NDSS 2007

"Chosen-Ciphertext Secure Proxy Re-Encryption"

Susan Hohenberger, ... -- CCS 2007

"An Independent Audit Framework for Software Dependent Voting Systems"

Sujata Garera, Aviel D. Rubin, ... -- CCS 2007

"Provable Data Possession at Untrusted Stores"

Giuseppe Ateniese, Randal Burns, Reza Curtmola, Joseph Herring, Zachary N. J. Peterson, ... -- CCS 2007

"Language Identification of Encrypted VoIP Traffic: Alejandra y Roberto or Alice and Bob?"

Charles V. Wright, Lucas Ballard, Fabian Monrose, Gerald Masson, ... -- Usenix 2007

"On Web Browsing Privacy in Anonymized NetFlows"

Scott E. Coull, Charles V. Wright, Fabian Monrose, ... -- Usenix 2007

"Taming the Devil: Techniques for Evaluating Anonymized Network Data"

Scott E. Coull, Charles V. Wright, Fabian Monrose, ... -- NDSS 2008

"Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations"

Lucas Ballard, Fabian Monrose, Scott E. Coull, Charles V. Wright, Gerald Masson, ... -- Oakland 2008

"All Your iFRAMEs Point to Us"

Fabian Monrose, Moheeb Abu Rajab, ... -- Usenix 2008

"The Practical Subtleties of Biometric Key Generation"

Seny Kamara, Lucas Ballard, ... -- Usenix 2008

"To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads"

Joshua Mason, Adam Stubblefield, Fabian Monrose, Sam Small, ... -- Usenix 2008

"Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis"

Scott E. Coull, ... -- NDSS 2009

"English shellcode"

Joshua Mason, Sam Small, ... -- CCS 2009

"Synchronized aggregate signatures: new definitions, constructions and applications"

Jae Hyun Ahn, Matthew Green, Susan Hohenberger, ... -- CCS 2010

"Outsourcing the Decryption of ABE Ciphertexts"

Matthew Green, Susan Hohenberger, ... -- Usenix 2011

"Machine-Generated Algorithms, Proofs and Software for the Batch Verification of Digital Signature Schemes"

Joseph A. Akinyele, Matthew Green, Susan Hohenberger, Matthew W. Pagano, ... -- CCS 2012

"Zerocoin: Anonymous Distributed E-Cash from Bitcoin"

Ian Miers, Christina Garman, Matthew Green, Aviel D. Rubin, ... -- Oakland 2013

"Using SMT Solvers to Automate Design Tasks for Encryption and Signature Schemes"

Joseph A. Akinyele, Matthew Green, Susan Hohenberger, ... -- CCS 2013

"Decentralized Anonymous Credentials"

Christina Garman, Matthew Green, Ian Miers, ... -- NDSS 2014

"Zerocash: Decentralized Anonymous Payments from Bitcoin"

Christina Garman, Matthew Green, Ian Miers, ... -- Oakland 2014

"SoK: Security and Privacy in Implantable Medical Devices and Body Area Networks"

Michael Rushanan, Aviel D. Rubin, ... -- Oakland 2014

"On The Security of Mobile Cockpit Information Systems"

Stephen Checkoway, ... -- CCS 2014

"On the Practical Exploitability of Dual EC in TLS Implementations"

Stephen Checkoway, Matthew Green, ... -- Usenix 2014

"iSeeYou: Disabling the MacBook Webcam Indicator LED"

Matthew Brocker, Stephen Checkoway, ... -- Usenix 2014

"Security Analysis of a Full-Body Scanner"

Stephen Checkoway, ... -- Usenix 2014

"Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM"

Stephen Checkoway, ... -- Usenix 2014

"Forward Secure Asynchronous Messaging from Puncturable Encryption"

Matthew Green, Ian Miers, ... -- Oakland 2015

"Secure Sampling of Public Parameters for Succinct Zero Knowledge Proofs"

Matthew Green, ... -- Oakland 2015

"Automating Fast and Secure Translations from Type-I to Type-III Pairing Schemes"

Joseph A. Akinyele, Christina Garman, Susan Hohenberger, ... -- CCS 2015

"Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice"

Matthew Green, ... -- CCS 2015

"Attacks Only Get Better: Password Recovery Attacks Against RC4 in TLS"

Christina Garman, ... -- Usenix 2015

"Downgrade Resilience in Key-Exchange Protocols"

Matthew Green, ... -- Oakland 2016

"How I Learned to be Secure: a Census-Representative Survey of Security Advice Sources and Behavior"

Sean Kross, ... -- CCS 2016

"A Systematic Analysis of the Juniper Dual EC Incident"

Christina Garman, Matthew Green, ... -- CCS 2016

"AdScale: Scalable Private Advertising with Practical Trusted Third Parties"

Matthew Green, Ian Miers, ... -- CCS 2016

"Retrospective Decryption and Other Attacks on Apple iMessage"

Christina Garman, Matthew Green, Gabriel Kaptchuk, Ian Miers, Michael Rushanan, ... -- Usenix 2016

"IO-DSSE: Scaling Dynamic Searchable Encryption to Millions of Indexes By Improving Locality"

Ian Miers, ... -- NDSS 2017

"Bolt: Anonymous Payment Channels for Decentralized Currencies"

Matthew Green, Ian Miers, ... -- CCS 2017

"Fairness in an Unfair World: Fair Multiparty Computation from public Bulletin Boards"

Arka Rai Choudhuri, Matthew Green, Abhishek Jain, Gabriel Kaptchuk, Ian Miers, ... -- CCS 2017

"Verified Correctness and Security of mbedTLS HMAC-DRBG"

Matthew Green, ... -- CCS 2017

"Practical state recovery attacks against legacy RNG implementations"

Matthew Green, ... -- CCS 2018

"Towards a Secure Zero-rating Framework with Three Parties"

Yinzhi Cao, ... -- Usenix 2018

"FlowCog: Context-aware Semantics Extraction and Analysis of Information Flow Leaks in Android Apps"

Yinzhi Cao, ... -- Usenix 2018

"Giving State to the Stateless: Augmenting Trustworthy Computation with Ledgers"

Gabriel Kaptchuk, Matthew Green, ... -- NDSS 2019

"Are These Pairing Elements Correct? Automated Verification and Applications"

Susan Hohenberger, ... -- CCS 2019

"Rendered Private: Making GLSL Execution Uniform to Prevent WebGL-based Browser Fingerprinting"

Shujiang Wu, Song Li, Yinzhi Cao, ... -- Usenix 2019

"TKPERM: Cross-platform Permission Knowledge Transfer to Detect Overprivileged Third-party Applications"

Zhen Zhang, Yinzhi Cao, ... -- NDSS 2020

"TextExerciser: Feedback-driven Text Input Exercising for Android Applications"

Yinzhi Cao, ... -- Oakland 2020

"ZEXE: Enabling Decentralized Private Computation"

Matthew Green, ... -- Oakland 2020

"PPE Circuits: Formal Definition to Software Automation"

Susan Hohenberger, ... -- CCS 2020

"Enhancing State-of-the-art Classifiers with API Semantics to Detect Evolved Android Malware"

Yinzhi Cao, ... -- CCS 2020

"Automating the Development of Chosen Ciphertext Attacks"

Gabrielle Beck, Maximilian Zinkus, Matthew Green, ... -- Usenix 2020

"BlockSci: Design and applications of a blockchain analysis platform"

Alishah Chator, ... -- Usenix 2020

"An Ever-evolving Game: Evaluation of Real-world Attacks and Defenses in Ethereum Ecosystem"

Yinzhi Cao, ... -- Usenix 2020

"DOVE: A Data-Oblivious Virtual Environment"

Tushar Jois, ... -- NDSS 2021

"Practical Blind Membership Inference Attack via Differential Comparisons"

Bo Hui, Yuchen Yang, Haolin Yuan, Philippe Burlina, Yinzhi Cao, ... -- NDSS 2021

"Runtime Recovery of Web Applications under Zero-Day ReDoS Attacks"

Zhihao Bai, Hang Zhu, Yinzhi Cao, ... -- Oakland 2021

"Fuzzy Message Detection"

Gabrielle Beck, Matthew Green, ... -- CCS 2021

"Meteor: Cryptographically Secure Steganography for RealisticDistributions"

Tushar Jois, Matthew Green, Aviel Rubin, ... -- CCS 2021

"PPE Circuits for Rational Polynomials"

Susan Hohenberger, ... -- CCS 2021

"KeyForge: Non-Attributable Email from Forward-Forgeable Signatures"

Matthew Green, ... -- Usenix 2021

"Jaqen: A High-Performance Switch-Native Approach for Detecting and Mitigating Volumetric DDoS Attacks with Programmable Switches"

Vladimir Braverman, ... -- Usenix 2021

"Probe the Proto: Measuring Client-Side Prototype Pollution Vulnerabilities of One Million Real-world Websites"

Zifeng Kang, Song Li, Yinzhi Cao, ... -- NDSS 2022

"Harnessing Perceptual Adversarial Patches for Crowd Counting"

Yingwei Li, ... -- CCS 2022

"Succinct Zero Knowledge for Floating Point Computations"

Abhishek Jain, Zhengzhong Jin, ... -- CCS 2022

"Rendering Contention Channel Made Practical in Web Browsers"

Shujiang Wu, Jianjia Yu, Yinzhi Cao, ... -- Usenix 2022

"Mining Node.js Vulnerabilities via Object Dependence Graph and Query"

Song Li, Mingqing Kang, Jianwei Hou, Yinzhi Cao, ... -- Usenix 2022

"Backporting Security Patches of Web Applications: A Prototype Design and Implementation on Injection Vulnerability Patches"

Yinzhi Cao, ... -- Usenix 2022

"Identity Confusion in WebView-based Mobile App-in-app Ecosystems"

Yinzhi Cao, ... -- Usenix 2022