"A Practically Implementable and Tractable Delegation Logic"
Ninghui Li, ... -- Oakland 2000
"Publius: A Robust, Tamper-Evident, Censorship-Resistant Web Publishing System"
Marc Waldman, ... -- Usenix 2000
"Tangler: a censorship-resistant publishing system based on document entanglements"
Marc Waldman, David Mazieres, ... -- CCS 2001
"The faithfulness of abstract protocol analysis: message authentication"
Lenore D. Zuck, ... -- CCS 2001
"Tarzan: a peer-to-peer anonymizing network layer"
Michael J. Freedman, ... -- CCS 2002
"Proxy Cryptography Revisited"
Anca Ivan, Yevgeniy Dodis, ... -- NDSS 2003
"Proactive Two-party Signatures for User Authentication"
Antonio Nicolosi, Maxwell Krohn, Yevgeniy Dodis, David Mazieres, ... -- NDSS 2003
"On-the-Fly Verification of Rateless Erasure Codes for Efficient Content Distribution"
Michael J. Freedman, David Mazieres, ... -- Oakland 2004
"Versatile Padding Schemes for Joint Signature and Encryption"
Yevgeniy Dodis, Michael J. Freedman, Shabsi Walfish, ... -- CCS 2004
"ID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption"
Nelly Fazio, Yevgeniy Dodis, ... -- CCS 2004
"Privacy and Contextual Integrity: Framework and Applications"
Helen Nissenbaum, ... -- Oakland 2006
"Stateful Public-Key Cryptosystems: How to Encrypt with One 160-bit Exponentiation"
Victor Shoup, ... -- CCS 2006
"Robust Receipt-Free Election System with Ballot Secrecy and Verifiability"
Sherman S.M. Chow, ... -- NDSS 2008
"The Blind Stone Tablet: Outsourcing Durability to Untrusted Parties"
Dennis Shasha, ... -- NDSS 2009
"Two-Party Computation Model for Privacy-Preserving Queries over Distributed Databases"
Sherman S.M. Chow, Jie-Han Lee, Lakshminarayanan Subramanian, ... -- NDSS 2009
"Improving privacy and security in multi-authority attribute-based encryption"
Sherman S.M. Chow, ... -- CCS 2009
"Anonymous credentials on a standard java card"
Victor Shoup, ... -- CCS 2009
"Adnostic: Privacy Preserving Targeted Advertising"
Vincent Toubiana, Helen Nissenbaum, Solon Barocas, ... -- NDSS 2010
"Practical leakage-resilient identity-based encryption from simple assumptions"
Sherman S.M. Chow, Yevgeniy Dodis, ... -- CCS 2010
"PaperSpeckle: Microscopic fingerprinting of paper"
Ashlesh Sharma, Lakshminarayanan Subramanian, ... -- CCS 2011
"Publicly Verifiable Delegation of Large Polynomials and Matrix Computations, with Applications"
Dario Fiore, ... -- CCS 2012
"Security Analysis of Pseudo-Random Number Generators with Input: /dev/random is not Robust"
Yevgeniy Dodis, ... -- CCS 2013
"FPDetective: Dusting the Web for Fingerprinters"
Seda Gurses, ... -- CCS 2013
"Efficient RAM and control flow in verifiable outsourced computation"
Riad S. Wahby, Michael Walfish, ... -- NDSS 2015
"Integrated Circuit (IC) Decamouflaging: Reverse Engineering Camouflaged ICs within Minutes (Not Years)"
Siddharth Garg, ... -- NDSS 2015
"LAVA: Large-scale Automated Vulnerability Addition"
Brendan Dolan-Gavitt, ... -- Oakland 2016
"Verifiable ASICs"
Riad S. Wahby, Max Howald, Siddharth Garg, Michael Walfish, ... -- Oakland 2016
"On omitting commits and committing omissions: preventing git metadata tampering that (re)introduces software vulnerabilities"
Santiago Torres-Arias, Justin Cappos, ... -- Usenix 2016
"Investigating Commercial Pay-Per-Install and the Distribution of Unwanted Software"
Damon McCoy, ... -- Usenix 2016
"Defending against malicious peripherals with Cinch"
Sebastian Angel, Max Howald, Michael Spilo, Zhen Sun, Michael Walfish, ... -- Usenix 2016
"You've Got Vulnerability: Exploring Effective Vulnerability Notifications"
Damon McCoy, ... -- Usenix 2016
"Internet-scale Probing of CPS: Inference, Characterization and Orchestration Analysis"
Nasir Memon, ... -- NDSS 2017
"To Catch a Ratter: Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild"
Damon McCoy, ... -- Oakland 2017
"Under the Shadow of Sunshine: Understanding and Detecting Bulletproof Hosting on Legitimate Service Provider Networks"
Damon McCoy, ... -- Oakland 2017
"Detecting Structurally Anomalous Logins Within Enterprise Networks"
Hossein Siadati, Nasir Memon, ... -- CCS 2017
"Full accounting for verifiable outsourcing"
Ye Ji, Michael Walfish, Thomas Wies, ... -- CCS 2017
"Implementing BP-Obfuscation Using Graph-Induced Encoding"
Victor Shoup, Noah Stephens-Davidowitz, ... -- CCS 2017
"Provably-Secure Logic Locking: From Theory To Practice"
Muhammad Yasin, Abhrajit Sengupta, Mohammed Thari Nabeel, Mohammed Ashraf, Ozgur Sinanoglu, ... -- CCS 2017
"CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds"
Justin Cappos, ... -- Usenix 2017
"Smoke Screener or Straight Shooter: Detecting Elite Sybil Attacks in User-Review Social Networks."
Keith Ross, ... -- NDSS 2018
"Doubly-efficient zkSNARKs without trusted setup"
Ioanna Tzialla, Michael Walfish, ... -- Oakland 2018
"PIR with Compressed Queries and Amortized Query Processing"
Sebastian Angel, ... -- Oakland 2018
"The Spyware Used in Intimate Partner Violence"
Periwinkle Doerfler, Damon McCoy, ... -- Oakland 2018
"Tracking Ransomware End-to-end"
Maxwell Matthaios Aliapoulios, Damon McCoy, ... -- Oakland 2018
"Detecting User Experience Issues of the Tor Browser In The Wild"
Kevin Gallagher, Brendan Dolan-Gavitt, Damon McCoy, Nasir Memon, ... -- CCS 2018
"Schrödinger's RAT: Profiling the Stakeholders in the Remote Access Trojan Ecosystem"
Damon McCoy, ... -- Usenix 2018
"ICSREF: A Framework for Automated Reverse Engineering of Industrial Control Systems Binaries"
Anastasis Keliris, ... -- NDSS 2019
"Clinical Computer Security for Victims of Intimate Partner Violence"
Damon McCoy, ... -- Usenix 2019
"Reading the Tea leaves: A Comparative Analysis of Threat Intelligence"
Damon McCoy, ... -- Usenix 2019
"Platforms in Everything: Analyzing Ground-Truth Data on the Anatomy and Economics of Bullet-Proof Hosting"
Damon McCoy, ... -- Usenix 2019
"in-toto: providing farm-to-table security properties for bits and bytes"
Santiago Torres-Arias, Justin Cappos, ... -- Usenix 2019
"A Security Analysis of the Facebook Ad Library"
Laura Edelson, Tobias Lauinger, Damon McCoy, ... -- Oakland 2020
"Are Anonymity-Seekers Just Like Everybody Else? An Analysis of Contributions to Wikipedia from Tor"
Chau Tran, Rachel Greenstadt, ... -- Oakland 2020
"Automatic Uncovering of Hidden Behaviors from Input Validation in Mobile Apps"
Brendan Dolan-Gavitt, ... -- Oakland 2020
"The Many Kinds of Creepware Used for Interpersonal Attacks"
Damon McCoy, ... -- Oakland 2020
"The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums"
Rachel Greenstadt, Damon McCoy, ... -- Usenix 2020
"SoK: Hate, Harassment, and the Changing Landscape of Online Abuse"
Damon McCoy, ... -- Oakland 2021
"Modular Design of Secure Group Messaging Protocols and the Security of MLS"
Yevgeniy Dodis, ... -- CCS 2021
"Cerebro: A Platform for Multi-Party Cryptographic Collaborative Learning"
Aurojit Panda, ... -- Usenix 2021
"Swiped: Analyzing Ground-truth Data of a Marketplace for Stolen Debit and Credit Cards"
Maxwell Matthaios Aliapoulios, Cameron Ballard, Rasika Bhalerao, Tobias Lauinger, Damon McCoy, ... -- Usenix 2021
"Transparency Dictionaries with Succinct Proofs of Correct Operation"
Ioanna Tzialla, ... -- NDSS 2022
"IRQDebloat: Reducing Driver Attack Surface in Embedded Devices"
Zhenghao Hu, Brendan Dolan-Gavitt, ... -- Oakland 2022
"RedShift: Transparent SNARKs from List Polynomial Commitments"
Assimakis A. Kattis, ... -- CCS 2022
"VeRSA: Verifiable Registries with Efficient Client Audits from RSA Authenticated Dictionaries"
Andrew Zitek, Joseph Bonneau, ... -- CCS 2022
"Cart-ology: Intercepting Targeted Advertising via Ad Network Identity Entanglement"
Damon McCoy, ... -- CCS 2022
"An Audit of Facebook's Political Ad Policy Enforcement"
Laura Edelson, Damon McCoy, Tobias Lauinger, ... -- Usenix 2022
"Zero-Knowledge Middleboxes"
Paul Grubbs, Arasu Arun, Ye Zhang, Joseph Bonneau, Michael Walfish, ... -- Usenix 2022
"Drifuzz: Harvesting Bugs in Device Drivers from Golden Seeds"
Zekun Shen, Ritik Roongta, Brendan Dolan-Gavitt, ... -- Usenix 2022