"TRICERT: A Distributed Certified E-Mail Scheme"
Giuseppe Ateniese, Breno Medeiros, Michael T. Goodrich, ... -- NDSS 2001
"A new approach to DNS security (DNSSEC)"
Giuseppe Ateniese, ... -- CCS 2001
"Access and Integrity Control in a Public-Access, High-Assurance Configuration Management System"
Jonathan S. Shapiro, John Vanderburgh, ... -- Usenix 2002
"Vulnerabilities in Synchronous IPC Designs"
Jonathan S. Shapiro, ... -- Oakland 2003
"Analysis of an Electronic Voting System"
Adam Stubblefield, Aviel D. Rubin, ... -- Oakland 2004
"Using Build-Integrated Static Checking to Preserve Correctness Invariants"
Jonathan S. Shapiro, ... -- CCS 2004
"On User Choice in Graphical Password Schemes"
Darren Davis, Fabian Monrose, ... -- Usenix 2004
"Design of the EROS Trusted Window System"
Jonathan S. Shapiro, John Vanderburgh, Eric Northup, ... -- Usenix 2004
"Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage"
Giuseppe Ateniese, Matthew Green, ... -- NDSS 2005
"Untraceable RFID Tags via Insubvertible Encryption"
Giuseppe Ateniese, ... -- CCS 2005
"Proxy Re-Signatures: New Definitions, Algorithms, Applications"
Giuseppe Ateniese, ... -- CCS 2005
"Security Analysis of a Cryptographically-Enabled RFID Device"
Steve Bono, Matthew Green, Adam Stubblefield, Aviel D. Rubin, ... -- Usenix 2005
"On the Effectiveness of Distributed Worm Monitoring"
Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis, ... -- Usenix 2005
"Key Regression: Enabling Efficient Key Distribution for Secure Distributed Storage"
Seny Kamaram, ... -- NDSS 2006
"Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions"
Reza Curtmola, Seny Kamara, ... -- CCS 2006
"A Natural Language Approach to Automated Cryptanalysis of Two-time Pads"
Joshua Mason, Kathryn Watkins, Jason Eisner, Adam Stubblefield, ... -- CCS 2006
"Biometric Authentication Revisited: Understanding the Impact of Wolves in Sheep's Clothing"
Lucas Ballard, Fabian Monrose, ... -- Usenix 2006
"Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces"
Scott E. Coull, Charles V. Wright, Fabian Monrose, ... -- NDSS 2007
"Secret Handshakes with Dynamic and Fuzzy Matching"
Giuseppe Ateniese, Jonathan Kirsch, ... -- NDSS 2007
"Chosen-Ciphertext Secure Proxy Re-Encryption"
Susan Hohenberger, ... -- CCS 2007
"An Independent Audit Framework for Software Dependent Voting Systems"
Sujata Garera, Aviel D. Rubin, ... -- CCS 2007
"Provable Data Possession at Untrusted Stores"
Giuseppe Ateniese, Randal Burns, Reza Curtmola, Joseph Herring, Zachary N. J. Peterson, ... -- CCS 2007
"Language Identification of Encrypted VoIP Traffic: Alejandra y Roberto or Alice and Bob?"
Charles V. Wright, Lucas Ballard, Fabian Monrose, Gerald Masson, ... -- Usenix 2007
"On Web Browsing Privacy in Anonymized NetFlows"
Scott E. Coull, Charles V. Wright, Fabian Monrose, ... -- Usenix 2007
"Taming the Devil: Techniques for Evaluating Anonymized Network Data"
Scott E. Coull, Charles V. Wright, Fabian Monrose, ... -- NDSS 2008
"Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations"
Lucas Ballard, Fabian Monrose, Scott E. Coull, Charles V. Wright, Gerald Masson, ... -- Oakland 2008
"All Your iFRAMEs Point to Us"
Fabian Monrose, Moheeb Abu Rajab, ... -- Usenix 2008
"The Practical Subtleties of Biometric Key Generation"
Seny Kamara, Lucas Ballard, ... -- Usenix 2008
"To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads"
Joshua Mason, Adam Stubblefield, Fabian Monrose, Sam Small, ... -- Usenix 2008
"Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis"
Scott E. Coull, ... -- NDSS 2009
"English shellcode"
Joshua Mason, Sam Small, ... -- CCS 2009
"Synchronized aggregate signatures: new definitions, constructions and applications"
Jae Hyun Ahn, Matthew Green, Susan Hohenberger, ... -- CCS 2010
"Outsourcing the Decryption of ABE Ciphertexts"
Matthew Green, Susan Hohenberger, ... -- Usenix 2011
"Machine-Generated Algorithms, Proofs and Software for the Batch Verification of Digital Signature Schemes"
Joseph A. Akinyele, Matthew Green, Susan Hohenberger, Matthew W. Pagano, ... -- CCS 2012
"Zerocoin: Anonymous Distributed E-Cash from Bitcoin"
Ian Miers, Christina Garman, Matthew Green, Aviel D. Rubin, ... -- Oakland 2013
"Using SMT Solvers to Automate Design Tasks for Encryption and Signature Schemes"
Joseph A. Akinyele, Matthew Green, Susan Hohenberger, ... -- CCS 2013
"Decentralized Anonymous Credentials"
Christina Garman, Matthew Green, Ian Miers, ... -- NDSS 2014
"Zerocash: Decentralized Anonymous Payments from Bitcoin"
Christina Garman, Matthew Green, Ian Miers, ... -- Oakland 2014
"SoK: Security and Privacy in Implantable Medical Devices and Body Area Networks"
Michael Rushanan, Aviel D. Rubin, ... -- Oakland 2014
"On The Security of Mobile Cockpit Information Systems"
Stephen Checkoway, ... -- CCS 2014
"On the Practical Exploitability of Dual EC in TLS Implementations"
Stephen Checkoway, Matthew Green, ... -- Usenix 2014
"iSeeYou: Disabling the MacBook Webcam Indicator LED"
Matthew Brocker, Stephen Checkoway, ... -- Usenix 2014
"Security Analysis of a Full-Body Scanner"
Stephen Checkoway, ... -- Usenix 2014
"Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM"
Stephen Checkoway, ... -- Usenix 2014
"Forward Secure Asynchronous Messaging from Puncturable Encryption"
Matthew Green, Ian Miers, ... -- Oakland 2015
"Secure Sampling of Public Parameters for Succinct Zero Knowledge Proofs"
Matthew Green, ... -- Oakland 2015
"Automating Fast and Secure Translations from Type-I to Type-III Pairing Schemes"
Joseph A. Akinyele, Christina Garman, Susan Hohenberger, ... -- CCS 2015
"Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice"
Matthew Green, ... -- CCS 2015
"Attacks Only Get Better: Password Recovery Attacks Against RC4 in TLS"
Christina Garman, ... -- Usenix 2015
"Downgrade Resilience in Key-Exchange Protocols"
Matthew Green, ... -- Oakland 2016
"How I Learned to be Secure: a Census-Representative Survey of Security Advice Sources and Behavior"
Sean Kross, ... -- CCS 2016
"A Systematic Analysis of the Juniper Dual EC Incident"
Christina Garman, Matthew Green, ... -- CCS 2016
"AdScale: Scalable Private Advertising with Practical Trusted Third Parties"
Matthew Green, Ian Miers, ... -- CCS 2016
"Retrospective Decryption and Other Attacks on Apple iMessage"
Christina Garman, Matthew Green, Gabriel Kaptchuk, Ian Miers, Michael Rushanan, ... -- Usenix 2016
"IO-DSSE: Scaling Dynamic Searchable Encryption to Millions of Indexes By Improving Locality"
Ian Miers, ... -- NDSS 2017
"Bolt: Anonymous Payment Channels for Decentralized Currencies"
Matthew Green, Ian Miers, ... -- CCS 2017
"Fairness in an Unfair World: Fair Multiparty Computation from public Bulletin Boards"
Arka Rai Choudhuri, Matthew Green, Abhishek Jain, Gabriel Kaptchuk, Ian Miers, ... -- CCS 2017
"Verified Correctness and Security of mbedTLS HMAC-DRBG"
Matthew Green, ... -- CCS 2017
"Practical state recovery attacks against legacy RNG implementations"
Matthew Green, ... -- CCS 2018
"Towards a Secure Zero-rating Framework with Three Parties"
Yinzhi Cao, ... -- Usenix 2018
"FlowCog: Context-aware Semantics Extraction and Analysis of Information Flow Leaks in Android Apps"
Yinzhi Cao, ... -- Usenix 2018
"Giving State to the Stateless: Augmenting Trustworthy Computation with Ledgers"
Gabriel Kaptchuk, Matthew Green, ... -- NDSS 2019
"Are These Pairing Elements Correct? Automated Verification and Applications"
Susan Hohenberger, ... -- CCS 2019
"Rendered Private: Making GLSL Execution Uniform to Prevent WebGL-based Browser Fingerprinting"
Shujiang Wu, Song Li, Yinzhi Cao, ... -- Usenix 2019
"TKPERM: Cross-platform Permission Knowledge Transfer to Detect Overprivileged Third-party Applications"
Zhen Zhang, Yinzhi Cao, ... -- NDSS 2020
"TextExerciser: Feedback-driven Text Input Exercising for Android Applications"
Yinzhi Cao, ... -- Oakland 2020
"ZEXE: Enabling Decentralized Private Computation"
Matthew Green, ... -- Oakland 2020
"PPE Circuits: Formal Definition to Software Automation"
Susan Hohenberger, ... -- CCS 2020
"Enhancing State-of-the-art Classifiers with API Semantics to Detect Evolved Android Malware"
Yinzhi Cao, ... -- CCS 2020
"Automating the Development of Chosen Ciphertext Attacks"
Gabrielle Beck, Maximilian Zinkus, Matthew Green, ... -- Usenix 2020
"BlockSci: Design and applications of a blockchain analysis platform"
Alishah Chator, ... -- Usenix 2020
"An Ever-evolving Game: Evaluation of Real-world Attacks and Defenses in Ethereum Ecosystem"
Yinzhi Cao, ... -- Usenix 2020
"DOVE: A Data-Oblivious Virtual Environment"
Tushar Jois, ... -- NDSS 2021
"Practical Blind Membership Inference Attack via Differential Comparisons"
Bo Hui, Yuchen Yang, Haolin Yuan, Philippe Burlina, Yinzhi Cao, ... -- NDSS 2021
"Runtime Recovery of Web Applications under Zero-Day ReDoS Attacks"
Zhihao Bai, Hang Zhu, Yinzhi Cao, ... -- Oakland 2021
"Fuzzy Message Detection"
Gabrielle Beck, Matthew Green, ... -- CCS 2021
"Meteor: Cryptographically Secure Steganography for RealisticDistributions"
Tushar Jois, Matthew Green, Aviel Rubin, ... -- CCS 2021
"PPE Circuits for Rational Polynomials"
Susan Hohenberger, ... -- CCS 2021
"KeyForge: Non-Attributable Email from Forward-Forgeable Signatures"
Matthew Green, ... -- Usenix 2021
"Jaqen: A High-Performance Switch-Native Approach for Detecting and Mitigating Volumetric DDoS Attacks with Programmable Switches"
Vladimir Braverman, ... -- Usenix 2021
"Probe the Proto: Measuring Client-Side Prototype Pollution Vulnerabilities of One Million Real-world Websites"
Zifeng Kang, Song Li, Yinzhi Cao, ... -- NDSS 2022
"Harnessing Perceptual Adversarial Patches for Crowd Counting"
Yingwei Li, ... -- CCS 2022
"Succinct Zero Knowledge for Floating Point Computations"
Abhishek Jain, Zhengzhong Jin, ... -- CCS 2022
"Rendering Contention Channel Made Practical in Web Browsers"
Shujiang Wu, Jianjia Yu, Yinzhi Cao, ... -- Usenix 2022
"Mining Node.js Vulnerabilities via Object Dependence Graph and Query"
Song Li, Mingqing Kang, Jianwei Hou, Yinzhi Cao, ... -- Usenix 2022
"Backporting Security Patches of Web Applications: A Prototype Design and Implementation on Injection Vulnerability Patches"
Yinzhi Cao, ... -- Usenix 2022
"Identity Confusion in WebView-based Mobile App-in-app Ecosystems"
Yinzhi Cao, ... -- Usenix 2022