"Accountable-subgroup multisignatures: extended abstract"
Silvio Micali, ... -- CCS 2001
"MULTOPS: A Data-Structure for Bandwidth Attack Detection"
Thomer M. Gil, Massimiliano Poletto, ... -- Usenix 2001
"Secure Data Deletion for Linux File Systems"
Steven Bauer, Nissanka B. Priyantha, ... -- Usenix 2001
"The Dos and Don'ts of Client Authentication on the Web"
Kevin Fu, Emil Sit, Kendra Smith, Nick Feamster, ... -- Usenix 2001
"Silicon physical random functions"
Blaise Gassend, Dwaine Clarke, Marten van Dijk, Srinivas Devadas, ... -- CCS 2002
"Tarzan: a peer-to-peer anonymizing network layer"
Robert Morris, ... -- CCS 2002
"Security in Plan 9"
Russ Cox, ... -- Usenix 2002
"Secure Execution via Program Shepherding"
Vladimir Kiriansky, Derek Bruening, Saman Amarasinghe, ... -- Usenix 2002
"Infranet: Circumventing Web Censorship and Surveillance"
Nick Feamster, Magdalena Balazinska, Greg Harfst, Hari Balakrishnan, David Karger, ... -- Usenix 2002
"Making Mix Nets Robust for Electronic Voting by Randomized Partial Checking"
Ronald L. Rivest, ... -- Usenix 2002
"The blocker tag: selective blocking of RFID tags for consumer privacy"
Ronald L. Rivest, ... -- CCS 2003
"SSL Splitting: Securely Serving Data from Untrusted Caches"
Chris Lesniewski-Laas, M. Frans Kaashoek, ... -- Usenix 2003
"The Perils of Unauthenticated Encryption: Kerberos Version 4"
Tom Yu, Sam Hartman, Kenneth Raeburn, ... -- NDSS 2004
"Fast Portscan Detection Using Sequential Hypothesis Testing"
Jaeyeon Jung, Arthur W. Berger, Hari Balakrishnan, ... -- Oakland 2004
"On-the-Fly Verification of Rateless Erasure Codes for Efficient Content Distribution"
Maxwell N. Krohn, ... -- Oakland 2004
"Private Inference Control"
David Woodruff, ... -- CCS 2004
"Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage"
Kevin Fu, Susan Hohenberger, ... -- NDSS 2005
"Towards Constant Bandwidth Overhead Integrity Checking of Untrusted Data"
Dwaine Clarke, Gookwon Edward Suh, Blaise Gassend, Ajay Sudan, Marten van Dijk, Srinivas Devadas, ... -- Oakland 2005
"Proxy Re-Signatures: New Definitions, Algorithms, Applications"
Susan Hohenberger, ... -- CCS 2005
"Inoculating SSH Against Address Harvesting"
Stuart Schechter, Jaeyeon Jung, Will Stockwell, Cynthia McLain, ... -- NDSS 2006
"Fourth-Factor Authentication: Somebody You Know"
Ronald L. Rivest, ... -- CCS 2006
"Evaluating SFI for a CISC Architecture"
Stephen McCamant, ... -- Usenix 2006
"Alpaca: Extensible Authorization for Distributed Services"
Christopher Lesniewski-Laas, Bryan Ford, Jacob Strauss, M. Frans Kaashoek, Robert Morris, ... -- CCS 2007
"Provably Secure Ciphertext Policy ABE"
Ling Cheung, Calvin Newport, ... -- CCS 2007
"Efficient and Robust TCP Stream Normalization"
Mythili Vutukuru, Hari Balakrishnan, ... -- Oakland 2008
"Noninterference for a Practical DIFC-Based Operating System"
Eran Tromer, ... -- Oakland 2009
"Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds"
Eran Tromer, ... -- CCS 2009
"Nemesis: Preventing Authentication and Access Control Vulnerabilities in Web Applications"
Nickolai Zeldovich, ... -- Usenix 2009
"VPriv: Protecting Privacy in Location-Based Vehicular Services"
Hari Balakrishnan, Raluca Ada Popa, ... -- Usenix 2009
"Modeling attacks on physical unclonable functions"
Srinivas Devadas, ... -- CCS 2010
"Making Linux Protection Mechanisms Egalitarian with UserFS"
Taesoo Kim, Nickolai Zeldovich, ... -- Usenix 2010
"Scantegrity II Municipal Election at Takoma Park: The First E2E Binding Governmental Election with Ballot Privacy"
Stefan Popoveniuc, Ronald L. Rivest, Emily Shen, ... -- Usenix 2010
"Automatic Error Finding in Access-Control Policies"
Vijay Ganesh, Martin Rinard, ... -- CCS 2011
"How to Tell if Your Cloud Files Are Vulnerable to Drive Crashes"
Ronald L. Rivest, ... -- CCS 2011
"Privacy and Accountability for Location-based Aggregate Statistics"
Raluca Ada Popa, Hari Balakrishnan, Frank Li, ... -- CCS 2011
"Secure In-Band Wireless Pairing"
Shyamnath Gollakota, Nabeel Ahmed, Nickolai Zeldovich, Dina Katabi, ... -- Usenix 2011
"The Case for Prefetching and Prevalidating TLS Server Certificates"
Emily Stark, ... -- NDSS 2012
"Hourglass Schemes: How to Prove that Cloud Files Are Encrypted"
Ronald L. Rivest, ... -- CCS 2012
"STEALTHMEM: System-Level Protection Against Cache-Based Side Channel Attacks in the Cloud"
Taesoo Kim, ... -- Usenix 2012
"Tracking Rootkit Footprints with a Practical Memory Analysis System"
Zhilei Xu, ... -- Usenix 2012
"Contextual Policy Enforcement in Android Applications with Permission Event Graphs"
Martin Rinard, ... -- NDSS 2013
"PUFs in Security Protocols: Attack Models and Security Evaluations"
Marten van Dijk, ... -- Oakland 2013
"An Ideal-Security Protocol for Order-Preserving Encoding"
Raluca Ada Popa, Frank Li, Nickolai Zeldovich, ... -- Oakland 2013
"Path ORAM: An Extremely Simple Oblivious RAM Protocol"
Christopher W. Fletcher, Ling Ren, Xiangyao Yu, Srinivas Devadas, ... -- CCS 2013
"Honeywords: Making Password-Cracking Detectable"
Ronald L. Rivest, ... -- CCS 2013
"From Zygote to Morula: Fortifying Weakened ASLR on Android"
Taesoo Kim, ... -- Oakland 2014
"Zerocash: Decentralized Anonymous Payments from Bitcoin"
Alessandro Chiesa, Madars Virza, ... -- Oakland 2014
"Information Leaks Without Memory Disclosures: Remote Side Channel Attacks on Diversified Code"
Eric Soderstrom, ... -- CCS 2014
"Taking Authenticated Range Queries to Arbitrary Dimensions"
Stavros Papadopoulos, ... -- CCS 2014
"Practical UC security with a global random oracle"
Abhishek Jain, ... -- CCS 2014
"VerSum: Verifiable Computations over Large Public Logs"
Jelle van den Hooff, M. Frans Kaashoek, Nickolai Zeldovich, ... -- CCS 2014
"Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture"
Alessandro Chiesa, Madars Virza, ... -- Usenix 2014
"Information Flow Analysis of Android Applications in DroidSafe"
Michael I. Gordon, Deokhwan Kim, Jeff Perkins, Martin Rinard, ... -- NDSS 2015
"Machine Learning Classification over Encrypted Data"
Raphael Bost, Raluca Ada Popa, Stephen Tu, Shafi Goldwasser, ... -- NDSS 2015
"Principled Sampling for Anomaly Detection"
Fan Long, Christopher Musco, Stelios Sidiroglou-Douskos, Martin Rinard, ... -- NDSS 2015
"Missing the Point(er): On the Effectiveness of Code Pointer Integrity"
Samuel Fingeret, Julian Gonzalez, Ulziibayar Otgonbaatar, Tiffany Tang, Howard Shrobe, Stelios Sidiroglou-Douskos, Martin Rinard, ... -- Oakland 2015
"Secure Sampling of Public Parameters for Succinct Zero Knowledge Proofs"
Madars Virza, ... -- Oakland 2015
"Control Jujutsu: On the Weaknesses of Fine-Grained Control Flow Integrity"
Fan Long, Ulziibayar Otgonbaatar, Howard Shrobe, Martin Rinard, Stelios Sidiroglou-Douskos, ... -- CCS 2015
"How to Use Bitcoin to Play Decentralized Poker"
Ranjit Kumaresan, ... -- CCS 2015
"Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services"
Albert Kwon, Mashael Al-Sabah, David Lazar, Srini Devadas, ... -- Usenix 2015
"Constants Count: Practical Improvements to Oblivious RAM"
Ling Ren, Christopher W. Fletcher, Albert Kwon, Srinivas Devadas, ... -- Usenix 2015
"pASSWORD tYPOS and How to Correct Them Securely"
Anish Athalye, ... -- Oakland 2016
"Efficient Batched Oblivious PRF with Applications to Private Set Intersection"
Ranjit Kumaresan, ... -- CCS 2016
"Improvements to Secure Computation with Penalties"
Ranjit Kumaresan, Vinod Vaikuntanathan, Prashant Nalini Vasudevan, ... -- CCS 2016
"Amortizing Secure Computation with Penalties"
Ranjit Kumaresan, ... -- CCS 2016
"Sanctum: Minimal Hardware Extensions for Strong Software Isolation"
Victor Costan, Ilia Lebedev, Srinivas Devadas, ... -- Usenix 2016
"Are We There Yet? On RPKI's Deployment and Security"
Yossi Gilad, ... -- NDSS 2017
"HOP: Hardware makes Obfuscation Practical"
Ling Ren, ... -- NDSS 2017
"Catena: Efficient Non-equivocation via Bitcoin"
Alin Tomescu, Srinivas Devadas, ... -- Oakland 2017
"A Formal Foundation for Secure Remote Execution of Enclaves"
Ilia Lebedev, Srinivas Devadas, ... -- CCS 2017
"Veil: Private Browsing Semantics Without Browser-side Assistance."
Frank Wang, Nickolai Zeldovich, ... -- NDSS 2018
"Implementing Conjunction Obfuscation under Entropic Ring LWE"
Kevin King, ... -- Oakland 2018
"Bandwidth-Hard Functions: Reductions and Lower Bounds"
Ling Ren, ... -- CCS 2018
"Secure Search via Sketching for Homomorphic Encryption"
Hayim Shaul, ... -- CCS 2018
"Practical Accountability of Secret Processes"
Jonathan Frankle, Sunoo Park, Daniel Shaar, Shafi Goldwasser, Daniel Weitzner, ... -- Usenix 2018
"GAZELLE: A Low Latency Framework for Secure Neural Network Inference"
Chiraag Juvekar, Vinod Vaikuntanathan, Anantha Chandrakasan, ... -- Usenix 2018
"Vault: Fast Bootstrapping for Cryptocurrencies"
Derek Leung, Adam Suhl, Yossi Gilad, Nickolai Zeldovich, ... -- NDSS 2019
"Simple High-Level Code For Cryptographic Arithmetic -- With Proofs, Without Compromises"
Andres Erbsen, Jade Philipoom, Jason Gross, Robert Sloan, Adam Chlipala, ... -- Oakland 2019
"Efficient Verifiable Secret Sharing with Share Recovery in BFT Protocols"
Alin Tomescu, ... -- CCS 2019
"Transparency Logs via Append-only Authenticated Dictionaries"
Alin Tomescu, Srinivas Devadas, ... -- CCS 2019
"EverParse: Verified Secure Zero-Copy Parsers for Authenticated Message Formats"
Tej Chajed, ... -- Usenix 2019
"Finding Safety in Numbers with Secure Allegation Escrows"
Venkat Arun, ... -- NDSS 2020
"Are We Susceptible to Rowhammer? An End-to-End Methodology for Cloud Providers"
Lillian Tsai, ... -- Oakland 2020
"EverCrypt: A Fast, Verified, Cross-Platform Crytographic Provider"
Joonwon Choi, ... -- Oakland 2020
"Humpty Dumpty: Controlling Word Meanings via Corpus Poisoning"
Tal Schuster, ... -- Oakland 2020
"Towards Scalable Threshold Cryptosystems"
Alin Tomescu, Srinivas Devadas, ... -- Oakland 2020
"The Ballot is Busted Before the Blockchain: A Security Analysis of Voatz, the First Internet Voting Application Used in U.S. Federal Elections"
Michael A. Specter, James Koppel, Daniel Weitzner, ... -- Usenix 2020
"Compact Certificates of Collective Knowledge"
Silvio Micali, Nickolai Zeldovich, ... -- Oakland 2021
"Electromagnetic Covert Channels Can Be Super Resilient"
Jun Huang, ... -- Oakland 2021
"High-Assurance Cryptography in the Spectre Era"
Kevin Liao, ... -- Oakland 2021
"Lightweight Techniques for Private Heavy Hitters"
Henry Corrigan-Gibbs, ... -- Oakland 2021
"SoK: Computer-Aided Cryptography"
Kevin Liao, ... -- Oakland 2021
"Preventing Dynamic Library Compromise on Node.js via RWX-Based Privilege Reduction"
Nikos Vasilakis, ... -- CCS 2021
"Securing Parallel-chain Protocols under Variable Mining Power"
Lei Yang, ... -- CCS 2021
"Supply-Chain Vulnerability Elimination via Active Learning and Regeneration"
Nikos Vasilakis, Shivam Handa, Alizee Schoen, Jiasi Shen, Martin Rinard, ... -- CCS 2021
"Private Blocklist Lookups with Checklist"
Henry Corrigan-Gibbs, ... -- Usenix 2021
"KeyForge: Non-Attributable Email from Forward-Forgeable Signatures"
Michael A. Specter, Sunoo Park, ... -- Usenix 2021
"Express: Lowering the Cost of Metadata-hiding Communication with Cryptographic Privacy"
Henry Corrigan-Gibbs, ... -- Usenix 2021
"Security Analysis of the Democracy Live Online Voting System"
Michael A. Specter, ... -- Usenix 2021
"Preventing Kernel Hacks with HAKCs"
Yianni Giannaris, Carolina Ortega, Howard Shrobe, ... -- NDSS 2022
"Private Nearest Neighbor Search with Sublinear Communication and Malicious Security"
Sacha Servan-Schreiber, Simon Langowski, Srinivas Devadas, ... -- Oakland 2022
"ShorTor: Improving Tor Network Latency via Multi-hop Overlay Routing"
Kyle Hogan, Sacha Servan-Schreiber, Zachary Newman, Srinivas Devadas, ... -- Oakland 2022
"Privacy Limitations of Interest-based Advertising on The Web: A Post-mortem Empirical Analysis of Google's FLoC"
Alex Berke, Dan Calacci, ... -- CCS 2022
"Aardvark: An Asynchronous Authenticated Dictionary with Applications to Account-based Cryptocurrencies"
Derek Leung, Nickolai Zeldovich, ... -- Usenix 2022
"Don't Mesh Around: Side-Channel Attacks and Mitigations on Mesh Interconnects"
Miles Dai, Miguel Gomez-Garcia, Mengjia Yan, ... -- Usenix 2022