"Practical Experiences with ATM Encryption"
Gregory T. Byrd, ... -- NDSS 2001
"Information-Theoretic Measures for Anomaly Detection"
Wenke Lee, Dong Xiang, ... -- Oakland 2001
"Constructing attack scenarios through correlation of intrusion alerts"
Peng Ning, Yun Cui, Douglas S. Reeves, ... -- CCS 2002
"Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks"
Donggang Liu, Peng Ning, ... -- NDSS 2003
"Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays"
Xinyuan Wang, Douglas S. Reeves, ... -- CCS 2003
"Establishing pairwise keys in distributed sensor networks"
Donggang Liu, Peng Ning, ... -- CCS 2003
"Learning attack strategies from intrusion alerts"
Peng Ning, Dingbang Xu, ... -- CCS 2003
"Efficient self-healing group key distribution with revocation capability"
Donggang Liu, Peng Ning, Kun Sun, ... -- CCS 2003
"Building Attack Scenarios through Integration of Complementary Alert Correlation Method"
Peng Ning, Dingbang Xu, Christopher G. Healey, Robert St. Amant, ... -- NDSS 2004
"An Interleaved Hop-by-Hop Authentication Scheme for Filtering False Data Injection in Sensor Networks"
Peng Ning, ... -- Oakland 2004
"Prevent Attribute Information Leakage in Automated Trust Negotiation"
Keith Irwin, Ting Yu, ... -- CCS 2005
"Automatic Diagnosis and Response to Memory Corruption Vulnerabilities?"
Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris Bookholt, ... -- CCS 2005
"Non-Control-Data Attacks Are Realistic Threats"
Jun Xu, Emre Can Sezer, ... -- Usenix 2005
"On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques"
Pai Peng, Peng Ning, Douglas S. Reeves, ... -- Oakland 2006
"Packet Vaccine: Black-box Exploit Detection and Signature Generation"
Chongkyung Kil, ... -- CCS 2006
"TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks"
Kun Sun, Peng Ning, An Liu, Yuzheng Zhou, ... -- CCS 2006
"On the Modeling and Analysis of Obligations"
Keith Irwin, Ting Yu, ... -- CCS 2006
"MemSherlock: An Automated Debugger for Unknown Memory Corruption Vulnerabilities"
Emre Can Sezer, Peng Ning, Chongkyung Kil, ... -- CCS 2007
"False data injection attacks against state estimation in electric power grids"
Yao Liu, Peng Ning, ... -- CCS 2009
"Secure open source collaboration: an empirical study of linus' law"
Andrew Meneely, Laurie Williams, ... -- CCS 2009
"Countering kernel rootkits with lightweight hook protection"
Zhi Wang, Xuxian Jiang, Peng Ning, ... -- CCS 2009
"Mapping kernel objects to enable systematic integrity checking"
Xuxian Jiang, ... -- CCS 2009
"Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures"
Yao Liu, Peng Ning, Huaiyu Dai, ... -- Oakland 2010
"HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity"
Zhi Wang, Xuxian Jiang, ... -- Oakland 2010
"HyperSentry: enabling stealthy in-context measurement of hypervisor integrity"
Ahmed Azab, Peng Ning, Zhi Wang, Xuxian Jiang, ... -- CCS 2010
"SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures"
Xuxian Jiang, ... -- NDSS 2011
"Process Out-Grafting: An Efficient Out-of-VM Approach for Fine-Grained Process Execution Monitoring"
Deepa Srinivasan, Zhi Wang, Xuxian Jiang, ... -- CCS 2011
"SICE: A Hardware-Level Strongly Isolated Computing Environment for x86 Multi-core Platforms"
Ahmed Azab, Peng Ning, ... -- CCS 2011
"Systematic Detection of Capability Leaks in Stock Android Smartphones"
Michael Grace, Yajin Zhou, Zhi Wang, Xuxian Jiang, ... -- NDSS 2012
"Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets"
Yajin Zhou, Zhi Wang, Wu Zhou, Xuxian Jiang, ... -- NDSS 2012
"[SoK] Dissecting Android Malware: Characterization and Evolution"
Yajin Zhou, Xuxian Jiang, ... -- Oakland 2012
"Detecting Passive Content Leaks and Pollution in Android Applications"
Yajin Zhou, Xuxian Jiang, ... -- NDSS 2013
"Taming Hosted Hypervisors with (Mostly) Deprivileged Execution"
Chiachih Wu, Xuxian Jiang, ... -- NDSS 2013
"Ally Friendly Jamming: How to Jam Your Enemy and Maintain Your Own Wireless Connectivity at the Same Time"
Wenbo Shen, Peng Ning, Xiaofan He, Huaiyu Dai, ... -- Oakland 2013
"AppIntent: Analyzing Sensitive Data Transmission in Android for Privacy Leakage Detection"
Peng Ning, ... -- CCS 2013
"Preventing Accidental Data Disclosure in Modern Operating Systems"
Adwait Nadkarni, William Enck, ... -- CCS 2013
"Vetting Undesirable Behaviors in Android Apps with Permission Use Analysis"
Peng Ning, ... -- CCS 2013
"The Impact of Vendor Customizations on Android Security"
Lei Wu, Michael Grace, Yajin Zhou, Chiachih Wu, Xuxian Jiang, ... -- CCS 2013
"MetaSymploit: Day-One Defense against Script-based Attacks with Security-Enhanced Symbolic Analysis"
Ruowen Wang, Peng Ning, Tao Xie, Quan Chen, ... -- Usenix 2013
"WHYPER: Towards Automating Risk Assessment of Mobile Applications"
Rahul Pandita, Xusheng Xiao, Wei Yang, William Enck, Tao Xie, ... -- Usenix 2013
"AirBag: Boosting Smartphone Resistance to Malware Infection"
Chiachih Wu, Yajin Zhou, Kunal Patel, Xuxian Jiang, ... -- NDSS 2014
"ARMlock: Hardware-based Fault Isolation for ARM"
Yajin Zhou, ... -- CCS 2014
"Hypervision Across Worlds: Real-time Kernel Protection from the ARM TrustZone Secure World"
Peng Ning, Quan Chen, Wenbo Shen, ... -- CCS 2014
"ASM: A Programmable Interface for Extending Android Security"
Adwait Nadkarni, William Enck, ... -- Usenix 2014
"EASEAndroid: Automatic Policy Analysis and Refinement for Security Enhanced Android via Large-Scale Semi-Supervised Learning"
Ruowen Wang, William Enck, Douglas S. Reeves, Peng Ning, ... -- Usenix 2015
"Cloak of Visibility: Detecting When Machines Browse a Different Web"
Alexandros Kapravelos, ... -- Oakland 2016
"SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles"
Luke Deshotels, William Enck, ... -- CCS 2016
"Practical DIFC Enforcement on Android"
Adwait Nadkarni, Benjamin Andow, William Enck, ... -- Usenix 2016
"TumbleBit: An Untrusted Bitcoin-Compatible Anonymous Payment Hub"
Alessandra Scafuro, ... -- NDSS 2017
"Sonar: Detecting SS7 Redirection Attacks With Audio-Based Distance Bounding"
Bradley Reaves, ... -- Oakland 2018
"Mystique: Uncovering Information Leakage from Browser Extensions"
Quan Chen, Alexandros Kapravelos, ... -- CCS 2018
"How Bad Can It Git? Characterizing Secret Leakage in Public GitHub Repositories"
Michael Meli, Matthew McNiece, Bradley Reaves, ... -- NDSS 2019
"PolicyLint: Investigating Internal Privacy Policy Contradictions on Google Play"
Benjamin Andow, Samin Yaseer Mahmud, Justin Whitaker, William Enck, Bradley Reaves, ... -- Usenix 2019
"Everyone is Different: Client-side Diversification for Defending Against Extension Fingerprinting"
Alexandros Kapravelos, ... -- Usenix 2019
"Kobold: Evaluating Decentralized Access Control for Remote NSXPC Methods on iOS"
Luke Deshotels, Jordan Beichler, William Enck, ... -- Oakland 2020
"You’ve Changed: Detecting Malicious Browser Extensions through their Update Deltas"
Nikolaos Pantelaios, Alexandros Kapravelos, ... -- CCS 2020
"Who's Calling? Characterizing Robocalls through Audio and Metadata Analysis"
Sathvik Prasad, Elijah Bouma-Sims, Athishay Kiran Mylappan, Bradley Reaves, ... -- Usenix 2020
"Actions Speak Louder than Words: Entity-Sensitive Privacy Policy and Data Flow Analysis with PoliCheck"
Samin Yaseer Mahmud, Justin Whitaker, William Enck, Bradley Reaves, ... -- Usenix 2020
"Cardpliance: PCI DSS Compliance of Android Applications"
Samin Yaseer Mahmud, Akhil Acharya, William Enck, Bradley Reaves, ... -- Usenix 2020
"Hey Alexa, is this Skill Safe?: Taking a Closer Look at the Alexa Skill Ecosystem"
Sheel Jayesh Shah, Anupam Das, William Enck, ... -- NDSS 2021
"Favocado: Fuzzing Binding Code of JavaScript Engines Using Semantically Correct Test Cases"
Kyle Martin, Alexandros Kapravelos, ... -- NDSS 2021
"CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing"
Shaown Sarker, Alexandros Kapravelos, ... -- Oakland 2021
"Detecting Filter List Evasion with Event-Loop-Turn Granularity JavaScript Signatures"
Quan Chen, Alexandros Kapravelos, ... -- Oakland 2021
"On the Anonymity Guarantees of Anonymous Proof-of-Stake Protocols"
Varun Madathil, Alessandra Scafuro, ... -- Oakland 2021
"Fingerprinting in Style: Detecting Browser Extensions via Injected Style Sheets"
Quan Chen, Alexandros Kapravelos, ... -- Usenix 2021
"PolyScope: Multi-Policy Access Control Analysis to Compute Authorized Attack Operations in Android Systems"
William Enck, ... -- Usenix 2021
"FReD: Identifying File Re-Delegation in Android System Services"
Sigmund Albert Gorski III, Seaver Thorn, William Enck, ... -- Usenix 2022
"ALASTOR: Reconstructing the Provenance of Serverless Intrusions"
Isaac Polinsky, William Enck, ... -- Usenix 2022
"Private Signaling"
Varun Madathil, Alessandra Scafuro, ... -- Usenix 2022
"Characterizing the Security of Github CI Workflows"
Igibek Koishybayev, Aleksandr Nahapetyan, Bradley Reaves, Alexandros Kapravelos, ... -- Usenix 2022