"EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis"
Engin Kirda, ... -- NDSS 2011
"Automated Discovery of Parameter Pollution Vulnerabilities in Web Applications"
Engin Kirda, ... -- NDSS 2011
"PiOS: Detecting Privacy Leaks in iOS Applications"
Engin Kirda, ... -- NDSS 2011
"The Power of Procrastination: Detection and Mitigation of Execution-Stalling Malicious Code"
Engin Kirda, ... -- CCS 2011
"Insights into User Behavior in Dealing with Internet Attacks"
Kaan Onarlioglu, Engin Kirda, ... -- NDSS 2012
"PUBCRAWL: Protecting Users and Businesses from CRAWLers"
Engin Kirda, ... -- Usenix 2012
"A Practical, Targeted, and Stealthy Attack Against WPA Enterprise Authentication"
Aldo Cassola, William Robertson, Engin Kirda, Guevara Noubir, ... -- NDSS 2013
"Clickonomics: Determining the Effect of Anti-Piracy Measures for One-Click Hosting"
Tobias Lauinger, Kaan Onarlioglu, Engin Kirda, ... -- NDSS 2013
"PrivExec: Private Execution as an Operating System Service"
Kaan Onarlioglu, Collin Mulliner, William Robertson, Engin Kirda, ... -- Oakland 2013
"Security Analysis of Pseudo-Random Number Generators with Input: /dev/random is not Robust"
Daniel Wichs, ... -- CCS 2013
"You Are How You Click: Clickstream Analysis for Sybil Detection"
Christo Wilson, ... -- Usenix 2013
"Efficient Private File Retrieval by Combining ORAM and PIR"
Travis Mayberry, Erik-Oliver Blass, Agnes Hui Chan, ... -- NDSS 2014
"Hidden GEMs: Automated Discovery of Access Control Vulnerabilities in Graphical User Interfaces"
Collin Mulliner, William Robertson, Engin Kirda, ... -- Oakland 2014
"AutoCog: Measuring the Description-to-permission Fidelity in Android Applications"
Tiantian Zhu, ... -- CCS 2014
"Toward Robust Hidden Volumes using Write-Only Oblivious RAM"
Erik-Oliver Blass, Travis Mayberry, Guevara Noubir, Kaan Onarlioglu, ... -- CCS 2014
"A Look at Targeted Attacks Through the Lense of an NGO"
Engin Kirda, ... -- Usenix 2014
"Towards Detecting Anomalous User Behavior in Online Social Networks"
Alan Mislove, ... -- Usenix 2014
"Authenticating Privately over Public Hotspots"
Aldo Cassola, Guevara Noubir, ... -- CCS 2015
"ZigZag: Automatically Hardening Web Applications Against Client-side Validation Vulnerabilities"
Michael Weissbacher, William Robertson, Engin Kirda, ... -- Usenix 2015
"CrossFire: An Analysis of Firefox Extension-Reuse Vulnerabilities"
Ahmet Salih Buyukkayhan, Kaan Onarlioglu, William Robertson, Engin Kirda, ... -- NDSS 2016
"Inferring User Routes and Locations using Zero-Permission Mobile Sensors"
Sashank Narain, Triet Vo Huu, Kenneth Block, Guevara Noubir, ... -- Oakland 2016
"LAVA: Large-scale Automated Vulnerability Addition"
Engin Kirda, Andrea Mambretti, Wil Robertson, ... -- Oakland 2016
"TriggerScope: Towards Detecting Logic Bombs in Android Applications"
William Robertson, Engin Kirda, ... -- Oakland 2016
"Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem"
Taejoong Chung, David Choffnes, Alan Mislove, Christo Wilson, ... -- CCS 2016
"UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware"
Amin Kharaz, Sajjad Arshad, William Robertson, Engin Kirda, ... -- Usenix 2016
"Caught Red Handed: Tracing Information Flows Between Ad Exchanges Using Retargeted Ads"
Muhammad Ahmad Bashir, Sajjad Arshad, William Robertson, Christo Wilson, ... -- Usenix 2016
"Thou Shalt Not Depend on Me: Analysing the Use of Outdated JavaScript Libraries on the Web"
Tobias Lauinger, Abdelberi Chaabane, Sajjad Arshad, William Robertson, Christo Wilson, Engin Kirda, ... -- NDSS 2017
"FBS-Radar: Uncovering Fake Base Stations at Scale in the Wild"
Christo Wilson, ... -- NDSS 2017
"CRLite: A Scalable System for Pushing All TLS Revocations to All Browsers"
James Larisch, David Choffnes, Alan Mislove, Christo Wilson, ... -- Oakland 2017
"SymCerts: Practical Symbolic Execution For Exposing Noncompliance in X.509 Certificate Validation Implementations"
Cristina Nita-Rotaru, ... -- Oakland 2017
"Full accounting for verifiable outsourcing"
Abhi Shelat, ... -- CCS 2017
"Rise of the HaCRS: Augmenting Autonomous Cyber Reasoning Systems with Human Assistance"
Michael Weissbacher, ... -- CCS 2017
"Scaling ORAM for Secure Computation"
Jack Doerner, Abhi Shelat, ... -- CCS 2017
"Identifier Binding Attacks and Defenses in Software-Defined Networks"
Cristina Nita-Rotaru, ... -- Usenix 2017
"Game of Registrars: An Empirical Analysis of Post-Expiration Domain Name Takeovers"
Tobias Lauinger, Ahmet Salih Buyukkayhan, Wil Robertson, ... -- Usenix 2017
"A Longitudinal, End-to-End View of the DNSSEC Ecosystem"
Taejoong Chung, David Choffnes, Alan Mislove, Christo Wilson, ... -- Usenix 2017
"Automated Attack Discovery in TCP Congestion Control Using a Model-guided Approach."
David Choffnes, Alan Mislove, Cristina Nita-Rotaru, ... -- NDSS 2018
"Bug Fixes, Improvements, ... and Privacy Leaks - A Longitudinal Study of PII Leaks Across Android App Versions."
Jingjing Ren, Daniel J. Dubois, David Choffnes, ... -- NDSS 2018
"InstaGuard: Instantly Deployable Hot-patches for Vulnerable System Programs on Android."
Yaohui Chen, Long Lu, ... -- NDSS 2018
"Investigating Ad Transparency Mechanisms in Social Media: A Case Study of Facebooks Explanations."
Giridhari Venkatadri, Alan Mislove, ... -- NDSS 2018
"Compiler-assisted Code Randomization"
Yaohui Chen, Long Lu, ... -- Oakland 2018
"Doubly-efficient zkSNARKs without trusted setup"
Abhi Shelat, ... -- Oakland 2018
"Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning"
Matthew Jagielski, Alina Oprea, Cristina Nita-Rotaru, ... -- Oakland 2018
"Privacy Risks with Facebook's PII-based Targeting: Auditing a Data Broker's Advertising Interface"
Giridhari Venkatadri, Yabing Liu, Alan Mislove, ... -- Oakland 2018
"Secure Two-party Threshold ECDSA from ECDSA Assumptions"
Jack Doerner, Yashvanth Kondi, Eysa Lee, Abhi shelat, ... -- Oakland 2018
"Surveylance: Automatically Detecting Online Survey Scams"
William Robertson, Engin Kirda, ... -- Oakland 2018
"PrinTracker: Fingerprinting 3D Printers using Commodity Scanners"
Yanzhi Wang, ... -- CCS 2018
"Cross-App Poisoning in Software-Defined Networking"
Cristina Nita-Rotaru, ... -- CCS 2018
"A better method to analyze blockchain consistency"
Lucianna Kiffer, Abhi Shelat, Rajmohan Rajaraman, ... -- CCS 2018
"Web's Sixth Sense: A Study of Scripts Accessing Smartphone Sensors"
Amogh Pradeep, ... -- CCS 2018
"An Empirical Study of Web Resource Manipulation in Real-world Mobile Applications"
Long Lu, ... -- Usenix 2018
"A First Look into the Facebook Advertising Ecosystem"
Alan Mislove, ... -- NDSS 2019
"Quantity vs. Quality: Evaluating User Interest Profiles Using Ad Preference Managers"
Muhammad Ahmad Bashir, Christo Wilson, ... -- NDSS 2019
"Blind Certificate Authorities"
Abhi Shelat, ... -- Oakland 2019
"Dominance as a New Trusted Computing Primitive for the Internet of Things"
Zhichuang Sun, ... -- Oakland 2019
"Security of GPS/INS based On-road Location Tracking Systems"
Sashank Narain, Aanjhan Ranganathan, Guevara Noubir, ... -- Oakland 2019
"Threshold ECDSA from ECDSA Assumptions"
Jack Doerner, Yashvanth Kondi, Eysa Lee, Abhi shelat, ... -- Oakland 2019
"Securely Sampling Biased Coins with Applications to Differential Privacy"
Jeffrey Champion, Abhi Shelat, Jonathan Ullman, ... -- CCS 2019
"You Are Who You Appear to Be: A Longitudinal Study of Domain Impersonation in TLS Certificates"
Alan Mislove, ... -- CCS 2019
"A Billion Open Interfaces for Eve and Mallory: MitM, DoS, and Tracking Attacks on iOS and macOS Through Apple Wireless Direct Link"
Sashank Narain, Guevara Noubir, ... -- Usenix 2019
"Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks"
Matthew Jagielski, Alina Oprea, Cristina Nita-Rotaru, ... -- Usenix 2019
"Wireless Attacks on Aircraft Instrument Landing Systems"
Harshad Sathaye, Domien Schepers, Aanjhan Ranganathan, Guevara Noubir, ... -- Usenix 2019
"Reading the Tea leaves: A Comparative Analysis of Threat Intelligence"
Matthew Dunn, ... -- Usenix 2019
"FlowPrint: Semi-Supervised Mobile-App Fingerprinting on Encrypted Network Traffic"
Jingjing Ren, Daniel J. Dubois, David Choffnes, ... -- NDSS 2020
"HotFuzz: Discovering Algorithmic Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing"
Andrea Mambretti, Sajjad Arshad, Michael Weissbacher, William Robertson, Engin Kirda, ... -- NDSS 2020
"Even Black Cats Cannot Stay Hidden in the Dark: Full-band De-anonymization of Bluetooth Classic Devices"
Guevara Noubir, ... -- Oakland 2020
"FlyClient: Super-Light Clients for Cryptocurrencies"
Lucianna Kiffer, ... -- Oakland 2020
"OAT: Attesting Operation Integrity of Embedded Devices"
Zhichuang Sun, Bo Feng, Long Lu, ... -- Oakland 2020
"SAVIOR: Towards Bug-Driven Hybrid Testing"
Yaohui Chen, Long Lu, ... -- Oakland 2020
"Cached and Confused: Web Cache Deception in the Wild"
Sajjad Arshad, Engin Kirda, William Robertson, ... -- Usenix 2020
"P2IM: Scalable and Hardware-independent Firmware Testing via Automatic Peripheral Interface Modeling"
Bo Feng, Alejandro Mera, Long Lu, ... -- Usenix 2020
"High Accuracy and High Fidelity Extraction of Neural Networks"
Matthew Jagielski, ... -- Usenix 2020
"More than a Fair Share: Network Data Remanence Attacks against Secret Sharing-based Schemes"
Daniel Kostecki, Anthony Peterson, Cristina Nita-Rotaru, ... -- NDSS 2021
"KUBO: Precise and Scalable Detection of User-triggerable Undefined Behavior Bugs in OS Kernel"
Changming Liu, Long Lu, ... -- NDSS 2021
"DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis"
Alejandro Mera, Bo Feng, Long Lu, Engin Kirda, ... -- Oakland 2021
"Diogenes: Lightweight Scalable RSA Modulus Generation with a Dishonest Majority"
Megan Chen, abhi shelat, ... -- Oakland 2021
"Keep the Dirt: Tainted TreeKEM, Adaptively and Actively Secure Continuous Group Key Agreement"
Chethan Kamath, ... -- Oakland 2021
"Linking Bluetooth LE & Classic and Implications for Privacy-Preserving Bluetooth-Based Protocols"
Norbert Ludant, Tien D. Vo-Huu, Guevara Noubir, ... -- Oakland 2021
"Manipulation Attacks in Local Differential Privacy"
Albert Cheu, Jonathan Ullman, ... -- Oakland 2021
"Proactive Threshold Wallets with Offline Devices"
Yashvanth Kondi, ... -- Oakland 2021
"Subpopulation Data Poisoning Attacks"
Matthew Jagielski, Giorgio Severi, Niklas Pousette Harger, Alina Oprea, ... -- CCS 2021
"HTTP Request Smuggling with Differential Fuzzing"
Bahruz Jabiyev, Steven Sprecher, Engin Kirda, ... -- CCS 2021
"PTAuth: Temporal Memory Safety via Robust Points-to Authentication"
Reza Mirzazade Farkhani, Mansour Ahmadi, Long Lu, ... -- Usenix 2021
"Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers"
Giorgio Severi, Alina Oprea, ... -- Usenix 2021
"Deep-Dup: An Adversarial Weight Duplication Attack Framework to Crush Deep Neural Network in Multi-Tenant FPGA"
Yukui Luo, Xiaolin Xu, ... -- Usenix 2021
"Mind Your Weight(s): A Large-scale Study on Insufficient Machine Learning Model Protection in Mobile Apps"
Zhichuang Sun, Ruimin Sun, Long Lu, Alan Mislove, ... -- Usenix 2021
"Finding Bugs Using Your Own Code: Detecting Functionally-similar yet Inconsistent Code"
Mansour Ahmadi, Reza Mirzazade Farkhani, Ryan Williams, Long Lu, ... -- Usenix 2021
"Extracting Training Data from Large Language Models"
Matthew Jagielski, Alina Oprea, ... -- Usenix 2021
"Dirty Road Can Attack: Security of Deep Learning based Automated Lane Centering under Physical-World Attack"
Xue Lin, ... -- Usenix 2021
"D-Box: DMA-enabled compartmentalization for embedded applications"
Alejandro Mera, Yi Hui Chen, Ruimin Sun, Engin Kirda, Long Lu, ... -- NDSS 2022
"SemperFi: Anti-spoofing GPS Receiver for UAVs"
Harshad Sathaye, Gerald LaMountain, Pau Closas, Aanjhan Ranganathan, ... -- NDSS 2022
"V-Range: Enabling Secure Ranging in 5G Wireless Networks"
Aanjhan Ranganathan, ... -- NDSS 2022
"Automated Attack Synthesis by Extracting Finite State Machines from Protocol Specification Documents"
Max von Hippel, Ben Weintraub, Cristina Nita-Rotaru, ... -- Oakland 2022
"ShorTor: Improving Tor Network Latency via Multi-hop Overlay Routing"
Ben Weintraub, Cristina Nita-Rotaru, ... -- Oakland 2022
"Hammurabi: A Framework for Pluggable, Logic-Based X.509 Certificate Validation Policies"
Alan Mislove, Christo Wilson, ... -- CCS 2022
"Order-Disorder: Imitation Adversarial Attacks for Black-box Neural Ranking Models"
Kaisong Song, ... -- CCS 2022
"Web Cache Deception Escalates!"
Engin Kirda, ... -- Usenix 2022
"An Experimental Study of GPS Spoofing and Takeover Attacks on UAVs"
Harshad Sathaye, Aanjhan Ranganathan, ... -- Usenix 2022
"FRAMESHIFTER: Security Implications of HTTP/2-to-HTTP/1 Conversion Anomalies"
Bahruz Jabiyev, Steven Sprecher, Anthony Gavazzi, Tommaso Innocenti, Engin Kirda, ... -- Usenix 2022