"User-Level Infrastructure for System Call Interposition: A Platform for Intrusion Detection and Confinement"
R. Sekar, ... -- NDSS 2000
"Data Mining Methods for Detection of New Malicious Executables"
Erez Zadok, ... -- Oakland 2001
"A Fast Automaton-Based Method for Detecting Anomalous Program Behaviors"
R. Sekar, Mugdha Bendre, D. Dhurjati, ... -- Oakland 2001
"Specification-based anomaly detection: a new approach for detecting network intrusions"
R. Sekar, A. Gupta, J. Frullo, T. Shanbhag, A. Tiwari, H. Yang, S. Zhou, ... -- CCS 2002
"Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits"
Sandeep Bhatkar, Daniel C. DuVarney, R. Sekar, ... -- Usenix 2003
"Avfs: An On-Access Anti-Virus File System"
Yevgeniy Miretskiy, Abhijith Das, Charles P. Wright, Erez Zadok, ... -- Usenix 2004
"DIRA: Automatic Detection, Identification and Repair of Control-Hijacking Attacks"
Alexey Smirnov, Tzi-cker Chiueh, ... -- NDSS 2005
"One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments"
Weiqing Sun, Zhenkai Liang, V. N. Venkatakrishnan, R. Sekar, ... -- NDSS 2005
"Fast and Automated Generation of Attack Signatures: A Basis for Building Self-Protecting Servers"
Zhenkai Liang, R. Sekar, ... -- CCS 2005
"Efficient Techniques for Comprehensive Protection from Memory Error Exploits"
Sandeep Bhatkar, R. Sekar, Daniel C. DuVarney, ... -- Usenix 2005
"Dataflow Anomaly Detection"
Sandeep Bhatkar, Abhishek Chaturvedi, R. Sekar, ... -- Oakland 2006
"Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks"
Wei Xu, Sandeep Bhatkar, R. Sekar, ... -- Usenix 2006
"On the Practicality of Private Information Retrieval"
Radu Sion, ... -- NDSS 2007
"RICH: Automatically Protecting Against Integer-Based Vulnerabilities"
Tzi-cker Chiueh, Rob Johnson, ... -- NDSS 2007
"Efficient Policy Analysis for Administrative Role Based Access"
Scott D. Stoller, C.R. Ramakrishnan, ... -- CCS 2007
"Usable PIR"
Peter Williams, Radu Sion, ... -- NDSS 2008
"Practical Proactive Integrity Preservation: A Basis for Malware Defense"
R. Sekar, Weiqing Sun, Gaurav Poothia, Tejas Karandikar, ... -- Oakland 2008
"Building Castles out of Mud: Practical Access Pattern Privacy and Correctness on Untrusted Storage"
Peter Williams, Radu Sion, ... -- CCS 2008
"Selective Versioning in a Secure Disk System"
Swaminathan Sundararaman, Gopalan Sivathanu, Erez Zadok, ... -- Usenix 2008
"An Efficient Black-box Technique for Defeating Web Application Attacks"
R. Sekar, ... -- NDSS 2009
"The Blind Stone Tablet: Outsourcing Durability to Untrusted Parties"
Peter Williams, Radu Sion, ... -- NDSS 2009
"Exploiting Unix File-System Races via Algorithmic Complexity Attacks"
Rob Johnson, Xiang Cai, Yuwei Gui, ... -- Oakland 2009
"Large-scale malware indexing using function-call graphs"
Tzi-cker Chiueh, ... -- CCS 2009
"Dispatcher: enabling active botnet infiltration using automatic protocol reverse-engineering"
Tzi-cker Chiueh, ... -- CCS 2009
"TxBox: Building Secure, Efficient Sandboxes with System Transactions"
Donald E. Porter, ... -- Oakland 2011
"Single Round Access Privacy on Outsourced Storage"
Peter Williams, Radu Sion, ... -- CCS 2012
"PrivateFS: A Parallel Oblivious File System"
Peter Williams, Radu Sion, ... -- CCS 2012
"Touching from a Distance: Website Fingerprinting Attacks and Defenses"
Xiang Cai, Xin Cheng Zhang, Brijesh Joshi, Rob Johnson, ... -- CCS 2012
"SoK: Eternal War in Memory"
Laszlo Szekeres, ... -- Oakland 2013
"Practical Control Flow Integrity & Randomization for Binary Executables"
Laszlo Szekeres, ... -- Oakland 2013
"HIFS: History Independence for File Systems"
Sumeet Bajaj, Radu Sion, ... -- CCS 2013
"Control Flow Integrity for COTS Binaries"
Mingwei Zhang, R. Sekar, ... -- Usenix 2013
"From Zygote to Morula: Fortifying Weakened ASLR on Android"
Long Lu, ... -- Oakland 2014
"SoK: Introspections on Trust and the Semantic Gap"
Bhushan Jain, Mirza Basim Baig, Dongli Zhang, Donald E. Porter, Radu Sion, ... -- Oakland 2014
"Clubbing Seals: Exploring the Ecosystem of Third-party Security Seals"
Nick Nikiforakis, ... -- CCS 2014
"A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses"
Xiang Cai, Rishab Nithyanand, Rob Johnson, ... -- CCS 2014
"Targeted Threat Index: Characterizing and Quantifying Politically-Motivated Targeted Malware"
Phillipa Gill, ... -- Usenix 2014
"Effective Attacks and Provable Defenses for Website Fingerprinting"
Xiang Cai, Rishab Nithyanand, Rob Johnson, ... -- Usenix 2014
"Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting"
Long Lu, ... -- NDSS 2015
"Parking Sensors: Analyzing and Detecting Parked Domains"
Nick Nikiforakis, ... -- NDSS 2015
"Preventing Use-after-free with Dangling Pointers Nullification"
Long Lu, ... -- NDSS 2015
"Seven Months' Worth of Mistakes: A Longitudinal Study of Typosquatting Abuse"
Nick Nikiforakis, ... -- NDSS 2015
"Drops for Stuff: An Analysis of Reshipping Mule Scams"
Nick Nikiforakis, ... -- CCS 2015
"The Clock is Still Ticking: Timing Attacks in the Modern Web"
Nick Nikiforakis, ... -- CCS 2015
"Maneuvering Around Clouds: Bypassing Cloud-based Security Providers"
Nick Nikiforakis, ... -- CCS 2015
"WebCapsule: Towards a Lightweight Forensic Engine for Web Browsers"
Long Lu, ... -- CCS 2015
"It's Free for a Reason: Exploring the Ecosystem of Free Live Streaming Services"
Nick Nikiforakis, ... -- NDSS 2016
"Measuring and Mitigating AS-level Adversaries Against Tor"
Rishab Nithyanand, Oleksii Starov, Phillipa Gill, ... -- NDSS 2016
"Return to the Zombie Gadgets: Undermining Destructive Code Reads via Code Inference Attacks"
Hyungjoon Koo, Michalis Polychronakis, ... -- Oakland 2016
"Shreds: Fine-grained Execution Units with Private Memory"
Yaohui Chen, Sebassujeen Reymondjohnson, Zhichuang Sun, Long Lu, ... -- Oakland 2016
"Dial One for Scam: A Large-Scale Analysis of Technical Support Scams"
Najmeh Miramirkhani, Oleksii Starov, Nick Nikiforakis, ... -- NDSS 2017
"Norax: Enabling Execute-Only Memory for COTS Binaries on AArch64"
Yaohui Chen, Dongli Zhang, Rui Qiao, Long Lu, ... -- Oakland 2017
"Spotless Sandboxes: Evading Malware Analysis Systems using Wear-and-Tear Artifacts"
Najmeh Miramirkhani, Mahathi Priya Appini, Nick Nikiforakis, Michalis Polychronakis, ... -- Oakland 2017
"XHOUND: Quantifying the Fingerprintability of Browser Extensions"
Oleksii Starov, Nick Nikiforakis, ... -- Oakland 2017
"Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse"
Najmeh Miramirkhani, Nick Nikiforakis, ... -- CCS 2017
"Hindsight: Understanding the Evolution of UI Vulnerabilities in Mobile Browsers"
Meng Luo, Oleksii Starov, Nima Honarmand, Nick Nikiforakis, ... -- CCS 2017
"The Wolf of Name Street: Hijacking Domains Through Their Nameservers"
Timothy Barron, Nick Nikiforakis, ... -- CCS 2017
"Characterizing the Nature and Dynamics of Tor Exit Blocking"
Rishab Nithyanand, ... -- Usenix 2017
"SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data"
Md Nahid Hossain, Junao Wang, R. Sekar, Scott D. Stoller, ... -- Usenix 2017
"Decentralized Action Integrity for Trigger-Action IoT Platforms."
Amir Rahmati, ... -- NDSS 2018
"A Large-scale Analysis of Content Modification by Open HTTP Proxies."
Michalis Polychronakis, ... -- NDSS 2018
"Apps, Trackers, Privacy, and Regulators: A Global Study of the Mobile Tracking Ecosystem."
Abbas Razaghpanah, ... -- NDSS 2018
"Compiler-assisted Code Randomization"
Hyungjoon Koo, Michalis Polychronakis, ... -- Oakland 2018
"Fp-Scanner: The Privacy Implications of Browser Fingerprint Inconsistencies"
Pierre Laperdrix, ... -- Usenix 2018
"ATtention Spanned: Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem"
Amir Rahmati, ... -- Usenix 2018
"Dependence-Preserving Data Compaction for Scalable Forensic Analysis"
Md Nahid Hossain, Junao Wang, R. Sekar, Scott D. Stoller, ... -- Usenix 2018
"Master of Web Puppets: Abusing Web Browsers for Persistent and Stealthy Computation"
Michalis Polychronakis, ... -- NDSS 2019
"Time Does Not Heal All Wounds: A Longitudinal Analysis of Security-Mechanism Support in Mobile Browsers"
Meng Luo, Pierre Laperdrix, Nima Honarmand, Nick Nikiforakis, ... -- NDSS 2019
"rORAM: Efficient Range ORAM with O(log2 N) Locality"
Anrin Chakraborti, Radu Sion, ... -- NDSS 2019
"ConcurORAM: High-Throughput Stateless Parallel Multi-Client ORAM"
Anrin Chakraborti, Radu Sion, ... -- NDSS 2019
"HOLMES: Real-time APT Detection through Correlation of Suspicious Information Flows"
R. Sekar, ... -- Oakland 2019
"SoK: The Challenges, Pitfalls, and Perils of Using Hardware Performance Counters for Security"
Michalis Polychronakis, ... -- Oakland 2019
"PeX: A Permission Check Analysis Framework for Linux Kernel"
Dongyoon Lee, ... -- Usenix 2019
"Everyone is Different: Client-side Diversification for Defending Against Extension Fingerprinting"
Oleksii Starov, Nick Nikiforakis, ... -- Usenix 2019
"Less is More: Quantifying the Security Benefits of Debloating Web Applications"
Babak Amin Azad, Pierre Laperdrix, Nick Nikiforakis, ... -- Usenix 2019
"Complex Security Policy? A Longitudinal Analysis of Deployed Content Security Policies"
Timothy Barron, Nick Nikiforakis, ... -- NDSS 2020
"An Analysis of Pre-installed Android Software"
Abbas Razaghpanah, ... -- Oakland 2020
"Combating Dependence Explosion in Forensic Analysis Using Alternative Tag Propagation Semantics"
Md Nahid Hossain, Sanaz Sheikhi, R. Sekar, ... -- Oakland 2020
"ICLab: A Global, Longitudinal Internet Censorship Measurement Platform"
Shinyoung Cho, Nguyen Phong Hoang, Abbas Razaghpanah, Phillipa Gill, ... -- Oakland 2020
"Meddling Middlemen: Empirical Analysis of the Risks of Data-Saving Mobile Browsers"
Brian Kondracki, Nick Nikiforakis, ... -- Oakland 2020
"xMP: Selective Memory Protection for Kernel and User Space"
Seyedhamed Ghavamnia, Michalis Polychronakis, ... -- Oakland 2020
"You’ve Changed: Detecting Malicious Browser Extensions through their Update Deltas"
Nick Nikiforakis, ... -- CCS 2020
"Horizontal Privilege Escalation in Trusted Applications"
Darius Suciu, Radu Sion, ... -- Usenix 2020
"Temporal System Call Specialization for Attack Surface Reduction"
Seyedhamed Ghavamnia, Tapti Palit, Shachee Mishra, Michalis Polychronakis, ... -- Usenix 2020
"To Err.Is Human: Characterizing the Threat of Unintended URLs in Social Media"
Brian Kondracki, Nick Nikiforakis, ... -- NDSS 2021
"Understanding the Growth and Security Considerations of ECS"
Michalis Polychronakis, ... -- NDSS 2021
"DynPTA: Combining Static and Dynamic Analysis for Practical Selective Data Protection"
Tapti Palit, Jarin Firose Moon, Michalis Polychronakis, ... -- Oakland 2021
"Good Bot, Bad Bot: Characterizing Automated Browsing Activity"
Xigao Li, Babak Amin Azad, Amir Rahmati, Nick Nikiforakis, ... -- Oakland 2021
"Using Selective Memoization to Defeat Regular Expression Denial of Service (ReDoS)"
Dongyoon Lee, ... -- Oakland 2021
"Catching Transparent Phish: Analyzing and Detecting MITM Phishing Toolkits"
Brian Kondracki, Babak Amin Azad, Nick Nikiforakis, ... -- CCS 2021
"PEARL: Plausibly Deniable Flash Translation Layer using WOM coding"
Chen Chen, Anrin Chakraborti, Radu Sion, ... -- Usenix 2021
"Fingerprinting in Style: Detecting Browser Extensions via Injected Style Sheets"
Nick Nikiforakis, ... -- Usenix 2021
"How Great is the Great Firewall? Measuring China's DNS Censorship"
Nguyen Phong Hoang, Michalis Polychronakis, ... -- Usenix 2021
"The Droid is in the Details: Environment-aware Evasion of Android Sandboxes"
Brian Kondracki, Babak Amin Azad, Najmeh Miramirkhani, Nick Nikiforakis, ... -- NDSS 2022
"Domains Do Change Their Spots: Quantifying Potential Abuse of Residual Trust"
Johnny So, Najmeh Miramirkhani, Michael Ferdman, Nick Nikiforakis, ... -- Oakland 2022
"C2C: Fine-grained Configuration-driven System Call Filtering"
Seyedhamed Ghavamnia, Michalis Polychronakis, ... -- CCS 2022
"Escaping the Confines of Time: Continuous Browser Extension Fingerprinting Through Ephemeral Modifications"
Nick Nikiforakis, ... -- CCS 2022
"HyperDbg: Reinventing Hardware-Assisted Debugging"
Soroush Meghdadizanjani, ... -- CCS 2022
"The Dangers of Human Touch: Fingerprinting Browser Extensions through User Actions"
Nick Nikiforakis, ... -- Usenix 2022
"Transferring Adversarial Robustness Through Robust Representation Matching"
Pratik Vaishnavi, Amir Rahmati, ... -- Usenix 2022
"Uninvited Guests: Analyzing the Identity and Behavior of Certificate Transparency Bots"
Brian Kondracki, Johnny So, Nick Nikiforakis, ... -- Usenix 2022