"A Protocol for Anonymous Communication Over the Internet"
Clay Shields, ... -- CCS 2000
"StackGhost: Hardware Facilitated Stack Protection"
Mike Frantzen, Mike Shuey, ... -- Usenix 2001
"FormatGuard: Automatic Protection From printf Format String Vulnerabilities"
Mike Frantzen, ... -- Usenix 2001
"Efficient Multicast Packet Authentication Using Signature Amortization"
Jung-Min Park, ... -- Oakland 2002
"Detecting Service Violations and DoS Attacks"
Ashan Habib, Mohamed Hefeeda, Bharat Bhargava, ... -- NDSS 2003
"Establishing the Genuinity of Remote Computer Systems"
Rick Kennell, Leah H. Jamieson, ... -- Usenix 2003
"Safety in Automated Trust Negotiation"
Ninghui Li, ... -- Oakland 2004
"On Mutually-Exclusive Roles and Separation of Duty"
Ninghui Li, Ziad Bizri, Mahesh V. Tripunitara, ... -- CCS 2004
"Comparing the Expressive Power of Access Control Models"
Mahesh V. Tripunitara, Ninghui Li, ... -- CCS 2004
"IP Covert Timing Channels: An Initial Exploration"
Serdar Cabuk, ... -- CCS 2004
"Collapsar: A VM-Based Architecture for Network Attack Detention Center"
Xuxian Jiang, Dongyan Xu, ... -- Usenix 2004
"Efficient Intrusion Detection using Automaton Inlining"
Rajeev Gopalakrishna, Eugene H. Spafford, Jan Vitek, ... -- Oakland 2005
"On Safety in Discretionary Access Control"
Ninghui Li, Mahesh V. Tripunitara, ... -- Oakland 2005
"Automated Trust Negotiation Using Cryptographic Credentials"
Jiangtao Li, Ninghui Li, ... -- CCS 2005
"Secure Collaboration in Mediator-Free Environments"
Mohamed Shehab, Elisa Bertino, Arif Ghafoor, ... -- CCS 2005
"Dynamic and Efficient Key Management for Access Hierarchies"
Mikhail Atallah, Keith Frikken, Marina Blanton, ... -- CCS 2005
"Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities"
Xuxian Jiang, ... -- NDSS 2006
"Trust Negotiation with Hidden Credentials, Hidden Policies, and Policy Cycles"
Keith Frikken, Jiangtao Li, Mikhail Atallah, ... -- NDSS 2006
"Beyond Separation of Duty: An Algebra for Specifying High-level Security Policies"
Ninghui Li, Qihua Wang, ... -- CCS 2006
"Resiliency Policies in Access Control"
Ninghui Li, Qihua Wang, ... -- CCS 2006
"A Scalable Approach to Attack Graph Generation"
Xinming Ou, ... -- CCS 2006
"An Architecture for Specification-Based Detection of Semantic Integrity Violations in Kernel Dynamic Data"
AAron Walters, ... -- Usenix 2006
"Secret Handshakes with Dynamic and Fuzzy Matching"
Marina Blanton, ... -- NDSS 2007
"Usable Mandatory Integrity Protection for Operating Systems"
Ninghui Li, Ziqing Mao, Hong Chen, ... -- Oakland 2007
"Stealthy Malware Detection Through VMM-Based 'Out-of-the-Box' Semantic View Reconstruction"
Dongyan Xu, ... -- CCS 2007
"On the Accuracy of Decentralized Virtual Coordinate Systems in Adversarial Networks"
David Zage, Cristina Nita-Rotaru, ... -- CCS 2007
"PRECIP: Towards Practical and Retrofittable Confidential Information Protection"
Ninghui Li, ... -- NDSS 2008
"Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution"
Zhiqiang Lin, Dongyan Xu, Xiangyu Zhang, ... -- NDSS 2008
"Analyzing and Comparing the Protection Quality of Security Enhanced Operating Systems"
Hong Chen, Ninghui Li, Ziqing Mao, ... -- NDSS 2009
"IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution"
Zhiqiang Lin, ... -- NDSS 2009
"Pretty-Bad-Proxy: An Overlooked Adversary in Browsers' HTTPS Deployments"
Ziqing Mao, ... -- Oakland 2009
"Automatic Reverse Engineering of Data Structures from Binary Execution"
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu, ... -- NDSS 2010
"SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures"
Zhiqiang Lin, Junghwan Rhee, Xiangyu Zhang, Dongyan Xu, ... -- NDSS 2011
"Process Out-Grafting: An Efficient Out-of-VM Approach for Fine-Grained Process Execution Monitoring"
Dongyan Xu, ... -- CCS 2011
"Discovering Semantic Data of Interest from Un-mappable Memory with Confidence"
Chao Wu, Xiangyu Zhang, Dongyan Xu, ... -- NDSS 2012
"Gatling: Automatic Attack Discovery in Large-Scale Distributed Systems"
Hyojeong Lee, Jeff Seibert, Charles Killian, Cristina Nita-Rotaru, ... -- NDSS 2012
"Using Probabilistic Generative Models for Ranking Risks of Android Apps"
Hao Peng, Chris Gates, Bhaskar Sarma, Ninghui Li, Yuan Qi, Rahul Potharaju, Cristina Nita-Rotaru, ... -- CCS 2012
"Minimizing Private Data Disclosures in the Smart Grid"
Weining Yang, Ninghui Li, Yuan Qi, Wahbeh Qardaji, ... -- CCS 2012
"High Accuracy Attack Provenance via Binary-Based Execution Partition"
Kyu Hyung Lee, Xiangyu Zhang, Dongyan Xu, ... -- NDSS 2013
"Obfuscation Resilient Binary Code Reuse through Trace-oriented Programming"
Xiangyu Zhang, Dongyan Xu, ... -- CCS 2013
"Membership Privacy: A Unifying Framework For Privacy Definitions"
Ninghui Li, Wahbeh Qardaji, Dong Su, Yi Wu, Weining Yang, ... -- CCS 2013
"LogGC: Garbage Collecting Audit Log"
Kyu Hyung Lee, Xiangyu Zhang, Dongyan Xu, ... -- CCS 2013
"A Study of Probabilistic Password Models"
Jerry Ma, Weining Yang, Min Luo, Ninghui Li, ... -- Oakland 2014
"DSCRETE: Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse"
Brendan Saltaformaggio, Zhongshu Gu, Xiangyu Zhang, Dongyan Xu, ... -- Usenix 2014
"X-Force: Force-Executing Binary Programs for Security Applications"
Fei Peng, Zhui Deng, Xiangyu Zhang, Dongyan Xu, ... -- Usenix 2014
"P2C: Understanding Output Data Files via On-the-Fly Transformation from Producer to Consumer Executions"
Yonghwi Kwon, Fei Peng, Dohyeong Kim, Kyungtae Kim, Xiangyu Zhang, Dongyan Xu, ... -- NDSS 2015
"How Secure and Quick is QUIC? Provable Security and Performance Analyses"
Samuel Jero, Cristina Nita-Rotaru, ... -- Oakland 2015
"Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits"
Omar Chowdhury, ... -- CCS 2015
"GUITAR: Piecing Together Android App GUIs from Memory Images"
Brendan Saltaformaggio, Rohit Bhatia, Zhongshu Gu, Xiangyu Zhang, Dongyan Xu, ... -- CCS 2015
"iRiS: Vetting Private API Abuse in iOS Applications"
Zhui Deng, Brendan Saltaformaggio, Xiangyu Zhang, Dongyan Xu, ... -- CCS 2015
"AUTOREB: Automatically Understanding the Review-to-Behavior Fidelity in Android Applications"
Lei Cen, ... -- CCS 2015
"VCR: App-Agnostic Recovery of Photographic Evidence from Android Device Memory Images"
Brendan Saltaformaggio, Rohit Bhatia, Zhongshu Gu, Xiangyu Zhang, Dongyan Xu, ... -- CCS 2015
"Control-Flow Bending: On the Effectiveness of Control-Flow Integrity"
Mathias Payer, ... -- Usenix 2015
"SUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps"
Jianjun Huang, Xiangyu Zhang, ... -- Usenix 2015
"VTrust: Regaining Trust on Virtual Calls"
Scott A. Carr, Mathias Payer, ... -- NDSS 2016
"ProTracer: Towards Practical Provenance Tracing by Alternating Between Logging and Tainting"
Shiqing Ma, Xiangyu Zhang, Dongyan Xu, ... -- NDSS 2016
"Enforcing Least Privilege Memory Views for Multithreaded Applications"
Terry Ching-Hsiang Hsu, Mathias Payer, ... -- CCS 2016
"An Empirical Study of Mnemonic Sentence-based Password Generation Strategies"
Weining Yang, Ninghui Li, Omar Chowdhury, Aiping Xiong, Robert W. Proctor, ... -- CCS 2016
"TypeSanitizer: Practical Type Confusion Detection"
Jeon Yuseok, Hui Peng, Mathias Payer, ... -- CCS 2016
"On the Security and Usability of Segment-based Visual Cryptographic Authentication Protocols"
Tianhao Wang, Huangyi Ge, Omar Chowdhury, Hemanta K. Maij, Ninghui Li, ... -- CCS 2016
"Screen after Previous Screens: Spatial-Temporal Recreation of Android App Displays from Memory Images"
Brendan Saltaformaggio, Rohit Bhatia, Xiangyu Zhang, Dongyan Xu, ... -- Usenix 2016
"P2P Mixing and Unlinkable Bitcoin Transactions"
Pedro Moreno-Sanchez, Aniket Kate, ... -- NDSS 2017
"SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks"
Pedro Moreno-Sanchez, Aniket Kate, ... -- NDSS 2017
"SGX-Shield: Enabling Address Space Layout Randomization for SGX Programs"
Byoungyoung Lee, ... -- NDSS 2017
"An Evil Copy: How the Loader Betrays You"
Mathias Payer, ... -- NDSS 2017
"Self Destructing Exploit Executions via Input Perturbation"
Yonghwi Kwon, Brendan Saltaformaggio, I Luk Kim, Xiangyu Zhang, Dongyan Xu, ... -- NDSS 2017
"Protecting Bare-metal Embedded Systems with Privilege Overlays"
Abraham A Clements, Naif Saleh Almakhdhub, Prashast Srivastava, Jinkyu Koo, Saurabh Bagchi, Mathias Payer, ... -- Oakland 2017
"SymCerts: Practical Symbolic Execution For Exposing Noncompliance in X.509 Certificate Validation Implementations"
Sze Yiu Chau, Endadul Hoque, Huangyi Ge, Aniket Kate, Ninghui Li, ... -- Oakland 2017
"Concurrency and Privacy with Payment-Channel Networks"
Pedro Moreno-Sanchez, Aniket Kate, ... -- CCS 2017
"Gomora: Efficient Type Safety for C++"
Yuseok Jeon, Priyam Biswas, Scott A. Carr, Byoungyoung Lee, Mathias Payer, ... -- CCS 2017
"Practical Graphs for Optimal Side-Channel Resistant Memory-Hard Functions"
Jeremiah Blocki, Ben Harsha, ... -- CCS 2017
"Where the Wild Warnings Are: Root Causes of Chrome HTTPS Certificate Errors"
Radhika Bhargava, ... -- CCS 2017
"Venerable Variadic Vulnerabilities Vanquished"
Priyam Biswas, Scott A. Carr, Mathias Payer, ... -- Usenix 2017
"Identifier Binding Attacks and Defenses in Software-Defined Networks"
Samuel Jero, ... -- Usenix 2017
"Optimizing Locally Differentially Private Protocols"
Tianhao Wang, Jeremiah Blocki, Ninghui Li, ... -- Usenix 2017
"MPI: Multiple Perspective Attack Investigation with Semantic Aware Execution Partitioning"
Shiqing Ma, Fei Wang, Xiangyu Zhang, Dongyan Xu, ... -- Usenix 2017
"Automated Attack Discovery in TCP Congestion Control Using a Model-guided Approach."
Samuel Jero, ... -- NDSS 2018
"LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE."
Syed Rafiul Hussain, Shagufta Mehnaz, Elisa Bertino, ... -- NDSS 2018
"Trojaning Attack on Neural Networks."
Yingqi Liu, Shiqing Ma, Yousra Aafer, Wen-Chuan Lee, Weihang Wang, Xiangyu Zhang, ... -- NDSS 2018
"Securing Real-Time Microcontroller Systems through Customized Memory View Switching."
Taegyu Kim, Hongjun Choi, Byoungyoung Lee, Xiangyu Zhang, Dongyan Xu, ... -- NDSS 2018
"Tipped Off by Your Memory Allocator: Device-Wide User Activity Sequencing from Android Memory Images."
Rohit Bhatia, Xiangyu Zhang, Dongyan Xu, ... -- NDSS 2018
"CFIXX: Object Type Integrity for C++."
Nathan Burow, Derrick McKee, Scott A. Carr, Mathias Payer, ... -- NDSS 2018
"Enhancing Memory Error Detection for Large-Scale Applications and Fuzz Testing."
Byoungyoung Lee, ... -- NDSS 2018
"OBLIVIATE: A Data Oblivious Filesystem for Intel SGX."
Adil Ahmad, Kyungtae Kim, Muhammad Ihsanulhaq Sarfaraz, Byoungyoung Lee, ... -- NDSS 2018
"MCI : Modeling-based Causality Inference in Audit Logging for Attack Investigation."
Yonghwi Kwon, Fei Wang, Weihang Wang, Wen-Chuan Lee, Shiqing Ma, Xiangyu Zhang, Dongyan Xu, ... -- NDSS 2018
"AceDroid: Normalizing Diverse Android Access Control Checks for Inconsistency Detection."
Yousra Aafer, Jianjun Huang, Yi Sun, Xiangyu Zhang, Ninghui Li, ... -- NDSS 2018
"Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions."
Pedro Moreno-Sanchez, Aniket Kate, ... -- NDSS 2018
"Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency --- Choose Two"
Debajyoti Das, Aniket Kate, ... -- Oakland 2018
"Locally Differentially Private Frequent Itemset Mining"
Tianhao Wang, Ninghui Li, ... -- Oakland 2018
"On the Economics of Offline Password Cracking"
Jeremiah Blocki, Benjamin Harsha, Samson Zhou, ... -- Oakland 2018
"T-Fuzz: fuzzing by program transformation"
Hui Peng, Mathias Payer, ... -- Oakland 2018
"Block Oriented Programming: Automating Data-Only Attacks"
Kyriakos Ispoglou, Bader AlBassam, Mathias Payer, ... -- CCS 2018
"CALM: Consistent Adaptive Local Marginal for Marginal Release under Local Differential Privacy"
Tianhao Wang, Ninghui Li, ... -- CCS 2018
"Detecting Attacks Against Robotic Vehicles: A Control Invariant Approach"
Hongjun Choi, Wen-Chuan Lee, Yousra Aafer, Fan Fei, Zhan Tu, Xiangyu Zhang, Dongyan Xu, Xinyan Deng, ... -- CCS 2018
"Milkomeda: Safeguarding the Mobile GPU Interface Using WebGL's Security Checks"
Mathias Payer, ... -- CCS 2018
"Bandwidth-Hard Functions: Reductions and Lower Bounds"
Jeremiah Blocki, Samson Zhou, ... -- CCS 2018
"Precise Android API Protection Mapping Derivation and Reasoning"
Yousra Aafer, Guanhong Tao, Xiangyu Zhang, Ninghui Li, ... -- CCS 2018
"ACES: Automatic Compartments for Embedded Systems"
Abraham A. Clements, Naif Saleh Almakhdhub, Saurabh Bagchi, Mathias Payer, ... -- Usenix 2018
"Privacy-preserving Multi-hop Locks for Blockchain Scalability and Interoperability"
Pedro Moreno Sanchez, Aniket Kate, ... -- NDSS 2019
"NIC: Detecting Adversarial Samples with Neural Network Invariant Checking"
Shiqing Ma, Yingqi Liu, Guanhong Tao, Wen-Chuan Lee, Xiangyu Zhang, ... -- NDSS 2019
"Analyzing Semantic Correctness using Symbolic Execution: A Case Study on PKCS#1 v1.5 Signature Verification"
Sze Yiu Chau, Aniket Kate, Ninghui Li, ... -- NDSS 2019
"Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information"
Syed Rafiul Hussain, Ninghui Li, Elisa Bertino, ... -- NDSS 2019
"OBFSCURO: A Commodity Obfuscation Engine on Intel SGX"
Adil Ahmad, Byoungyoung Lee, ... -- NDSS 2019
"ProFuzzer: On-the-fly Input Type Probing for Better Zero-day Vulnerability Discovery"
Wei You, Shiqing Ma, Xiangyu Zhang, ... -- Oakland 2019
"Razzer: Finding Kernel Race Bugs through Fuzzing"
Kyungtae Kim, Basavesh Shivakumar, Byoungyoung Lee, ... -- Oakland 2019
"SoK: Shining Light on Shadow Stacks"
Nathan Burow, Xingping Zhang, ... -- Oakland 2019
"5GReasoner: A Property-Directed Security and Privacy Analysis Framework for 5G Cellular Network Protocol"
Syed Rafiul Hussain, Imtiaz Karim, Elisa Bertino, ... -- CCS 2019
"ABS: Scanning Neural Networks for Back-doors by Artificial Brain Stimulation"
Yingqi Liu, Wen-Chuan Lee, Guanhong Tao, Shiqing Ma, Yousra Aafer, Xiangyu Zhang, ... -- CCS 2019
"HoneyBadgerMPC and AsynchroMix: Practical Asynchronous MPC and its Application to Anonymous Communication"
Donghang Lu, Aniket Kate, ... -- CCS 2019
"uXOM: Efficient eXecute-Only Memory on ARM Cortex-M"
Byoungyoung Lee, ... -- Usenix 2019
"RVFuzzer: Finding Input Validation Bugs in Robotic Vehicles through Control-Guided Testing"
Taegyu Kim, Fan Fei, Zhan Tu, Gregory Walkup, Xiangyu Zhang, Xinyan Deng, Dongyan Xu, ... -- Usenix 2019
"Pythia: Remote Oracles for the Masses"
Shin-Yeh Tsai, Yiying Zhang, ... -- Usenix 2019
"PeX: A Permission Check Analysis Framework for Linux Kernel"
Changhee Jung, ... -- Usenix 2019
"Custos: Practical Tamper-Evident Auditing of Operating Systems Using Trusted Execution"
Dave Jing Tian, ... -- NDSS 2020
"Finding Safety in Numbers with Secure Allegation Escrows"
Aniket Kate, ... -- NDSS 2020
"HFL: Hybrid Fuzzing on the Linux Kernel"
Kyungtae Kim, ... -- NDSS 2020
"Locally Differentially Private Frequency Estimation with Consistency"
Tianhao Wang, Zitao Li, Ninghui Li, ... -- NDSS 2020
"UISCOPE: Accurate, Instrumentation-free, and Visible Attack Investigation for GUI Applications"
Xiangyu Zhang, ... -- NDSS 2020
"uRAI: Securing Embedded Systems with Return Address Integrity"
Naif Saleh Almakhdhub, Saurabh Bagchi, ... -- NDSS 2020
"PMP: Cost-effective Forced Execution with Probabilistic Memory Pre-planning"
Wei You, Zhuo Zhang, Yousra Aafer, Fei Peng, Yu Shi, Carson Harmon, Xiangyu Zhang, ... -- Oakland 2020
"RetroWrite: Statically Instrumenting COTS Binaries for Fuzzing and Sanitization"
Sushant Dinesh, Nathan Burow, Dongyan Xu, ... -- Oakland 2020
"SoK: Understanding the Prevailing Security Vulnerabilities in TrustZone-assisted TEE Systems"
Pedro Fonseca, ... -- Oakland 2020
"Towards Effective Differential Privacy Communication for Users' Data Sharing Decision and Comprehension"
Tianhao Wang, Ninghui Li, ... -- Oakland 2020
"Cyber-Physical Inconsistency Vulnerability Identification for Safety Checks in Robotic Vehicles"
Hongjun Choi, Sayali Kate, Xiangyu Zhang, Dongyan Xu, ... -- CCS 2020
"Verifiable Timed Signatures Made Practical"
Adithya Bhat, Aniket Kate, ... -- CCS 2020
"TRUSTORE: Side-Channel Resistant Storage for SGX using Intel Hybrid CPU-FPGA"
Adil Ahmad, ... -- CCS 2020
"Logging to the Danger Zone: Race Condition Attacks and Defenses on System Audit Frameworks"
Dave Jing Tian, ... -- CCS 2020
"Composite Backdoor Attack for Deep Neural Network by Mixing Existing Benign Features"
Yingqi Liu, Xiangyu Zhang, ... -- CCS 2020
"BlackMirror: Preventing Wallhacks in 3D Online FPS Games"
Adil Ahmad, ... -- CCS 2020
"BigMAC: Fine-Grained Policy Analysis of Android Firmware"
Dave Jing Tian, ... -- Usenix 2020
"Achieving Keyless CDNs with Conclaves"
Christina Garman, ... -- Usenix 2020
"From Control Model to Program: Investigating Robotic Aerial Vehicle Accidents with MAYDAY"
Taegyu Kim, Altay Ozen, Fan Fei, Zhan Tu, Xiangyu Zhang, Xinyan Deng, Dave Jing Tian, Dongyan Xu, ... -- Usenix 2020
"HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation"
Saurabh Bagchi, ... -- Usenix 2020
"USBFuzz: A Framework for Fuzzing USB Drivers by Device Emulation"
Hui Peng, ... -- Usenix 2020
"Deceptive Deletions for Protecting Withdrawn Posts on Social Media Platforms"
S Chandra Mouli, Bruno Ribeiro, Aniket Kate, ... -- NDSS 2021
"Evading Voltage-Based Intrusion Detection on Automotive CAN"
Rohit Bhatia, Khaled Serag, Z. Berkay Celik, Dongyan Xu, ... -- NDSS 2021
"ALchemist: Fusing Application and Audit Logs for Precise Attack Provenance without Instrumentation"
Le Yu, Zhuo Zhang, Guanhong Tao, Xiangyu Zhang, and Dongyan Xu, ... -- NDSS 2021
"CHANCEL: Efficient Multi-client Isolation Under Adversarial Programs"
Adil Ahmad, Pedro Fonseca, ... -- NDSS 2021
"NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces"
Yapeng Ye, Zhuo Zhang, Fei Wang, Xiangyu Zhang, Dongyan Xu, ... -- NDSS 2021
"On the Insecurity of SMS One-Time Password Messages against Local Attackers in Modern Mobile Devices"
Zeyu Lei, Yuhong Nan, Antonio Bianchi, ... -- NDSS 2021
"PGFUZZ: Policy-Guided Fuzzing for Robotic Vehicles"
Hyungsub Kim, Muslum Ozgur Ozmen, Antonio Bianchi, Z. Berkay Celik, Dongyan Xu, ... -- NDSS 2021
"ARBITRAR : User-Guided API Misuse Detection"
Aravind Machiry, ... -- Oakland 2021
"DIANE: Identifying Fuzzing Triggers in Apps to Generate Under-constrained Inputs for IoT Devices"
Antonio Bianchi, ... -- Oakland 2021
"High-Assurance Cryptography in the Spectre Era"
Swarn Priya, ... -- Oakland 2021
"High-Frequency Trading on Decentralized On-Chain Exchanges"
Duc V Le, ... -- Oakland 2021
"OSPREY: Recovery of Variable and Data Structure via Probabilistic Analysis for Stripped Binary"
Zhuo Zhang, Yapeng Ye, Guanhong Tao, Wen-chuan Lee, Xiangyu Zhang, ... -- Oakland 2021
"STOCHFUZZ: Sound and Cost-effective Fuzzing of Stripped Binaries by Incremental and Stochastic Rewriting"
Zhuo Zhang, Guanhong Tao, Xuwei Liu, Xiangyu Zhang, ... -- Oakland 2021
"Using Selective Memoization to Defeat Regular Expression Denial of Service (ReDoS)"
James Davis, ... -- Oakland 2021
"RandPiper -- Reconfiguration-Friendly Random Beacons with Quadratic Communication"
Adithya Bhat, Zhongtang Luo, Aniket Kate, ... -- CCS 2021
"Continuous Release of Data Streams under both Centralized and Local Differential Privacy"
Tianhao Wang, Ninghui Li, ... -- CCS 2021
"When Machine Unlearning Jeopardizes Privacy"
Tianhao Wang, ... -- CCS 2021
"Can We Use Arbitrary Objects to Attack LiDAR Perception in Autonomous Driving?"
Lu Su, ... -- CCS 2021
"DroneKey: A Drone-Aided Group-Key Generation Scheme for Large-Scale IoT Networks"
Tao Li, ... -- CCS 2021
"OpenSquare: Decentralized Repeated Modular Squaring Service"
Adithya Bhat, Tiantian Gong, Aniket Kate, ... -- CCS 2021
"Noncompliance as Deviant Behavior: An Automated Black-box Noncompliance Checker for 4G LTE Cellular Devices"
Imtiaz Karim, Elisa Bertino, ... -- CCS 2021
"PASAN: Detecting Peripheral Access Concurrency Bugs within Bare-Metal Embedded Applications"
Taegyu Kim, Jizhou Chen, Kyungtae Kim, Dongyan Xu, Dave (Jing) Tian, ... -- Usenix 2021
"M2MON: Building an MMIO-based Security Reference Monitor for Unmanned Vehicles"
Arslan Khan, Hyungsub Kim, Dongyan Xu, Antonio Bianchi, Dave (Jing) Tian, ... -- Usenix 2021
"LIGHTBLUE: Automatic Profile-Aware Debloating of Bluetooth Stacks"
Jianliang Wu, Ruoyu Wu, Dongyan Xu, Dave (Jing) Tian, Antonio Bianchi, ... -- Usenix 2021
"PrivSyn: Differentially Private Data Synthesis"
Tianhao Wang, Ninghui Li, Jean Honorio, ... -- Usenix 2021
"SHARD: Fine-Grained Kernel Specialization with Context-Aware Hardening"
Muhammad Abubakar, Adil Ahmad, Pedro Fonseca, Dongyan Xu, ... -- Usenix 2021
"PolyScope: Multi-Policy Access Control Analysis to Compute Authorized Attack Operations in Android Systems"
Ninghui Li, ... -- Usenix 2021
"Android SmartTVs Vulnerability Discovery via Log-Guided Fuzzing"
Yi Sun, Yu Shi, Xiangyu Zhang, ... -- Usenix 2021
"ATLAS: A Sequence-based Learning Approach for Attack Investigation"
Abdulellah Alsaheel, Yuhong Nan, Le Yu, Gregory Walkup, Z. Berkay Celik, Xiangyu Zhang, Dongyan Xu, ... -- Usenix 2021
"Blitz: Secure Multi-Hop Payments Without Two-Phase Commits"
Aniket Kate, ... -- Usenix 2021
"Understanding Malicious Cross-library Data Harvesting on Android"
Yuhong Nan, ... -- Usenix 2021
"Exposing New Vulnerabilities of Error Handling Mechanism in CAN"
Khaled Serag, Rohit Bhatia, Z. Berkay Celik, Dongyan Xu, ... -- Usenix 2021
"Preventing Kernel Hacks with HAKCs"
Derrick McKee, ... -- NDSS 2022
"RVPLAYER: Robotic Vehicle Forensics by Replay with What-if Reasoning"
Hongjun Choi, Zhiyuan Cheng, Xiangyu Zhang, ... -- NDSS 2022
"hbACSS: How to Robustly Share Many Secrets"
Aniket Kate, ... -- NDSS 2022
"MIRROR: Model Inversion for Deep LearningNetwork with High Fidelity"
Shengwei An, Guanhong Tao, Qiuling Xu, Yingqi Liu, Guangyu Shen, Xiangyu Zhang, ... -- NDSS 2022
"Automated Attack Synthesis by Extracting Finite State Machines from Protocol Specification Documents"
Maria Pacheco Gonzales, Dan Goldwasser, ... -- Oakland 2022
"Formal Model-Driven Discovery of Bluetooth Protocol Design Vulnerabilities"
Jianliang Wu, Ruoyu Wu, Dongyan Xu, Dave Tian, Antonio Bianchi, ... -- Oakland 2022
"FuzzUSB: Hybrid Stateful Fuzzing of USB Gadget Stacks"
Kyungtae Kim, Taegyu Kim, Ertza Warraich, Antonio Bianchi, Dave Tian, ... -- Oakland 2022
"Goshawk: Hunting Memory Corruptions via Structure-Aware and Object-Centric Memory Operation Synopsis"
Elisa Bertino, ... -- Oakland 2022
"HardLog: Practical Tamper-Proof System Auditing Using a Novel Audit Device"
Adil Ahmad, ... -- Oakland 2022
"Model Orthogonalization: Class Distance Hardening in Neural Networks for Better Security"
Guanhong Tao, Yingqi Liu, Guangyu Shen, Qiuling Xu, Shengwei An, Zhuo Zhang, Xiangyu Zhang, ... -- Oakland 2022
"PGPATCH: Policy-Guided Logic Bug Patching for Robotic Vehicles"
Hyungsub Kim, Muslum Ozgur Ozmen, Z. Berkay Celik, Antonio Bianchi, Dongyan Xu, ... -- Oakland 2022
"PICCOLO: Exposing Complex Backdoors in NLP Transformer Models"
Yingqi Liu, Guangyu Shen, Guanhong Tao, Shengwei An, Xiangyu Zhang, ... -- Oakland 2022
"TASHAROK: Using Mechanism Design for Enhancing Security Resource Allocation in Interdependent Systems"
Mustafa Abdallah, Timothy Cason, Shreyas Sundaram, Saurabh Bagchi, ... -- Oakland 2022
"C2C: Fine-grained Configuration-driven System Call Filtering"
Tapti Palit, ... -- CCS 2022
"Discovering IoT Physical Channel Vulnerabilities"
Muslum Ozgur Ozmen, Z. Berkay Celik, Xiangyu Zhang, ... -- CCS 2022
"Leakage Inversion: Towards Quantifying Privacy in Searchable Encryption"
Alexandros Psomas, ... -- CCS 2022
"Physical Hijacking Attacks against Object Trackers"
Raymond Muller, Z. Berkay Celik, ... -- CCS 2022
"Poirot: Probabilistically Recommending Protections for the Android Framework"
Zhuo Zhang, ... -- CCS 2022
"Sigstore: Software Signing for Everybody"
Santiago Torres-Arias, ... -- CCS 2022
"ProFactory: Improving IoT Security via Formalized Protocol Customization"
Fei Wang, Jianliang Wu, Yuhong Nan, Xiangyu Zhang, Dongyan Xu, ... -- Usenix 2022
"Empirical Understanding of Deletion Privacy: Experiences, Expectations, and Measures"
Mohsen Minaei, Aniket Kate, ... -- Usenix 2022
"Behind the Tube: Exploitative Monetization of Content on YouTube"
Arjun Arunasalam, Muslum Ozgur Ozmen, Z. Berkay Celik, ... -- Usenix 2022
"SARA: Secure Android Remote Authorization"
Abdullah Imran, Habiba Farrukh, Muhammad Ibrahim, Z. Berkay Celik, Antonio Bianchi, ... -- Usenix 2022
"Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification Models"
Ninghui Li, Elisa Bertino, ... -- Usenix 2022
"Characterizing the Security of Github CI Workflows"
Siddharth Muralee, Aravind Machiry, ... -- Usenix 2022
"DnD: A Cross-Architecture Deep Neural Network Decompiler"
Ruoyu Wu, Dave (Jing) Tian, Antonio Bianchi, Dongyan Xu, ... -- Usenix 2022