"A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities"
David Wagner, Jeffrey S. Foster, Eric Brewer, Alexander Aiken, ... -- NDSS 2000
"Security of Encrypted rlogin Connections Created With Kerberos IV"
Kirsten Hildrum, ... -- NDSS 2000
"Practical Techniques for Searches on Encrypted Data"
Dawn Song, David Wagner, Adrian Perrig, ... -- Oakland 2000
"Efficient Authentication and Signing of Multicast Streams over Lossy Channels"
Adrian Perrig, J. Doug Tygar, Dawn Song, ... -- Oakland 2000
"Simple and Fault-Tolerant Key Agreement for Dynamic Collaborative Groups"
Adrian Perrig, ... -- CCS 2000
"Deja' Vu - A User Study: Using Images for Authentication"
Rachna Dhamija, Adrian Perrig, ... -- Usenix 2000
"Efficient and Secure Source Authentication for Multicast"
Adrian Perrig, Dawn Song, J. Doug Tygar, ... -- NDSS 2001
"Intrusion Detection via Static Analysis"
David Wagner, ... -- Oakland 2001
"ELK, a New Protocol for Efficient Large-Group Key Distribution"
Adrian Perrig, Dawn Song, J. Doug Tygar, ... -- Oakland 2001
"The BiBa one-time signature and broadcast authentication protocol"
Adrian Perrig, ... -- CCS 2001
"Practical forward secure group signature schemes"
Dawn Song, ... -- CCS 2001
"Detecting Format String Vulnerabilities with Type Qualifiers"
Umesh Shankar, Kunal Talwar, Jeffrey S. Foster, David Wagner, ... -- Usenix 2001
"Timing Analysis of Keystrokes and Timing Attacks on SSH"
Dawn Song, David Wagner, Xuqing Tian, ... -- Usenix 2001
"Active Certificates: A Framework for Delegation"
Nikita Borisov, Eric Brewer, ... -- NDSS 2002
"Collaborative Filtering with Privacy"
John Canny, ... -- Oakland 2002
"Expander Graphs for Digital Stream Authentication and Robust Overlay Networks"
Dawn Song, J. Doug Tygar, ... -- Oakland 2002
"MOPS: an infrastructure for examining security properties of software"
Hao Chen, David Wagner, ... -- CCS 2002
"Mimicry attacks on host-based intrusion detection systems"
David Wagner, Paolo Soto, ... -- CCS 2002
"How to Own the Internet in Your Spare Time"
Nicholas Weaver, ... -- Usenix 2002
"Setuid Demystified"
Hao Chen, David Wagner, ... -- Usenix 2002
"Active Mapping: Resisting NIDS Evasion Without Altering Traffic"
Umesh Shankar, ... -- Oakland 2003
"Scrash: A System for Generating Secure Crash Information"
Pete Broadwell, Matt Harren, Naveen Sastry, ... -- Usenix 2003
"Distillation Codes and Applications to DoS Resistant Multicast Authentication"
Chris Karlof, Naveen Sastry, Yaping Li, J. Doug Tygar, ... -- NDSS 2004
"Model Checking One Million Lines of C Code"
Hao Chen, David Wagner, ... -- NDSS 2004
"Cryptanalysis of a Provably Secure CRT-RSA Algorithm"
David Wagner, ... -- CCS 2004
"Privacy and Security in Library RFID: Issues, Practices, and Architectures"
David Molnar, David Wagner, ... -- CCS 2004
"Using Build-Integrated Static Checking to Preserve Correctness Invariants"
Hao Chen, ... -- CCS 2004
"Side Effects Are Not Sufficient to Authenticate Software"
Umesh Shankar, Monica Chew, J. Doug Tygar, ... -- Usenix 2004
"Finding User/Kernel Pointer Bugs with Type Inference"
Rob Johnson, David Wagner, ... -- Usenix 2004
"Privacy-Preserving Friends Troubleshooting Network"
Nikita Borisov, ... -- NDSS 2005
"Keyboard Acoustic Emanations Revisited"
Li Zhuang, Feng Zhou, J. Doug Tygar, ... -- CCS 2005
"Cryptographic Voting Protocols: A Systems Perspective"
Chris Karlof, Naveen Sastry, David Wagner, ... -- Usenix 2005
"Robust TCP Stream Reassembly in the Presence of Adversaries"
Vern Paxson, ... -- Usenix 2005
"OPUS: Online Patches and Updates for Security"
Gautam Altekar, Ilya Bagrak, Paul Burstein, Andrew Schultz, ... -- Usenix 2005
"Fixing Races for Fun and Profit: How to Abuse atime"
Nikita Borisov, Rob Johnson, Naveen Sastry, David Wagner, ... -- Usenix 2005
"Protocol-Independent Adaptive Replay of Application Dialog"
Weidong Cui, Randy Katz, ... -- NDSS 2006
"Induced Churn as Shelter from Routing-Table Poisoning"
Tyson Condie, Varun Kacholia, Sriram Sank, Joseph M. Hellerstein, ... -- NDSS 2006
"Toward Automated Information-Flow Integrity Verification for Security-Critical Applications"
Umesh Shankar, ... -- NDSS 2006
"Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage -or- How to Store Ballots on a Voting Machine (Extended Abstract)"
David Molnar, Naveen Sastry, David Wagner, ... -- Oakland 2006
"Doppelganger: Better Browser Privacy Without the Bother"
Umesh Shankar, Chris Karlof, ... -- CCS 2006
"Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting"
Scott Shenker, ... -- Usenix 2006
"Designing Voting Machines for Verification"
Naveen Sastry, David Wagner, ... -- Usenix 2006
"Generic Application-Level Protocol Analyzer and its Language"
Pallavi Joshi, ... -- NDSS 2007
"Cryptanalysis of a Cognitive Authentication Scheme"
David Wagner, ... -- Oakland 2007
"Dynamic pharming attacks and the locked same-origin policies for web browsers"
Chris Karlof, J. Doug Tygar, David Wagner, ... -- CCS 2007
"Panorama: Capturing System-wide Information Flow for Malware Detection and Analysis"
Dawn Song, ... -- CCS 2007
"Polyglot: Automatic Extraction of Protocol Format using Dynamic Binary Analysis"
Dawn Song, ... -- CCS 2007
"Provable Data Possession at Untrusted Stores"
Dawn Song, ... -- CCS 2007
"Discoverer: Automatic Protocol Reverse Engineering from Network Traces"
Jayanthkumar Kannan, ... -- Usenix 2007
"Automated Whitebox Fuzz Testing"
David Molnar, ... -- NDSS 2008
"Limits of Learning-based Signature Generation with Adversaries"
Dawn Song, ... -- NDSS 2008
"Analysis-Resistant Malware"
John Bethencourt, Dawn Song, ... -- NDSS 2008
"Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications"
Dawn Song, ... -- Oakland 2008
"Revocation Games in Ephemeral Networks"
Mark Felegyhazi, ... -- CCS 2008
"Tupni: Automatic Reverse Engineering of Input Formats"
Karl Chen, ... -- CCS 2008
"Verifiable functional purity in Java"
Matthew Finifter, Adrian Mettler, Naveen Sastry, David Wagner, ... -- CCS 2008
"Document Structure Integrity: A Robust Basis for Cross-site Scripting Defense"
Prateek Saxena, Dawn Song, ... -- NDSS 2009
"Conditioned-safe Ceremonies and a User Study of an Application to Web Authentication"
Chris Karlof, J. Doug Tygar, David Wagner, ... -- NDSS 2009
"Secure Content Sniffing for Web Browsers, or How to Stop Papers from Reviewing Themselves"
Dawn Song, Adam Barth, ... -- Oakland 2009
"On voting machine design for verification and testability"
Cynthia Sturton, Susmit Jha, Sanjit A. Seshia, David Wagner, ... -- CCS 2009
"Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs"
David Wagner, David Molnar, Xue Li, ... -- Usenix 2009
"Cross-Origin JavaScript Capability Leaks: Detection, Exploitation, and Defense"
Dawn Song, Adam Barth, Joel Weinberger, ... -- Usenix 2009
"Protecting Browsers from Extension Vulnerabilities"
Adam Barth, Adrienne Porter Felt, Prateek Saxena, ... -- NDSS 2010
"FLAX: Systematic Discovery of Client-side Validation Vulnerabilities in Rich Web Applications"
Prateek Saxena, Steve Hanna, Pongsin Poosankam, Dawn Song, ... -- NDSS 2010
"Effective Anomaly Detection with Scarce Training Data"
William Robertson, ... -- NDSS 2010
"A3: An Extensible Platform for Application-Aware Anonymity"
William R. Marczak, ... -- NDSS 2010
"Joe-E: A Security-Oriented Subset of Java"
Adrian Mettler, David Wagner, ... -- NDSS 2010
"Preventing Capability Leaks in Secure JavaScript Subsets"
Matthew Finifter, Joel Weinberger, Adam Barth, ... -- NDSS 2010
"Binary Code Extraction and Interface Identification for Security Applications"
Juan Caballero, Noah Johnson, Stephen McCamant, Dawn Song, ... -- NDSS 2010
"Outside the Closed World: On Using Machine Learning For Network Intrusion Detection"
Vern Paxson, ... -- Oakland 2010
"ConScript: Specifying and Enforcing Fine-Grained Security Policies for JavaScript in the Browser"
Leo Meyerovich, ... -- Oakland 2010
"A Symbolic Execution Framework for JavaScript"
Prateek Saxena, Devdatta Akhawe, Steve Hanna, Stephen McCamant, Dawn Song, Feng Mao, ... -- Oakland 2010
"@spam: the underground on 140 characters or less"
Chris Grier, Vern Paxson, Michael Zhang, ... -- CCS 2010
"Survivable key compromise in software update systems"
Justin Samuel, ... -- CCS 2010
"Input generation via decomposition and re-stitching: finding bugs in Malware"
Juan Caballero, Pongsin Poosankam, Stephen McCamant, Domagoj Babic, Dawn Song, ... -- CCS 2010
"Inference and analysis of formal models of botnet command and control protocols"
Chia Yuan Cho, Domagoj Babic, Eui Chul Richard Shin, Dawn Song, ... -- CCS 2010
"P4P: Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious Users"
John Canny, ... -- Usenix 2010
"DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation"
Min Gyung Kang, Stephen McCamant, Pongsin Poosankam, Dawn Song, ... -- NDSS 2011
"Privacy-Preserving Aggregation of Time-Series Data"
Elaine Shi, Dawn Song, ... -- NDSS 2011
"Defeating UCI: Building Stealthy and Malicious Hardware"
Cynthia Sturton, David Wagner, ... -- Oakland 2011
"Differential Slicing: Identifying Causal Execution Differences for Security Applications"
Noah Johnson, Kevin Zhijie Chen, Stephen McCamant, Pongsin Poosankam, Daniel Reynaud, Dawn Song, ... -- Oakland 2011
"Click Trajectories: End-to-End Analysis of the Spam Value Chain"
Chris Grier, Vern Paxson, ... -- Oakland 2011
"Design and Evaluation of a Real-Time URL Spam Filtering Service"
Kurt Thomas, Chris Grier, Justin Ma, Vern Paxson, Dawn Song, ... -- Oakland 2011
"PaperSpeckle: Microscopic fingerprinting of paper"
Eric Brewer, ... -- CCS 2011
"Context-Sensitive Auto-Sanitization in Web Templating Languages Using Type Qualifiers"
Prateek Saxena, Dawn Song, ... -- CCS 2011
"ScriptGard: Automatic Context-Sensitive Sanitization for Large-Scale Legacy Web Applications"
Prateek Saxena, ... -- CCS 2011
"Android Permissions Demystified"
Adrienne Porter Felt, Erika Chin, Steve Hanna, David Wagner, Dawn Song, ... -- CCS 2011
"Fast and Precise Sanitizer Analysis with BEK"
Prateek Saxena, ... -- Usenix 2011
"MACE: Model-inference-Assisted Concolic Exploration for Protocol and Vulnerability Discovery"
Chia Yuan Cho, Domagoj Babic, Pongsin Poosankam, Kevin Zhijie Chen, Edward XueJun Wu, Dawn Song, ... -- Usenix 2011
"Measuring Pay-per-Install: The Commoditization of Malware Distribution"
Chris Grier, Christian Kreibich, Vern Paxson, ... -- Usenix 2011
"Show Me the Money: Characterizing Spam-advertised Revenue"
Vern Paxson, ... -- Usenix 2011
"Permission Re-Delegation: Attacks and Defenses"
Adrienne Porter Felt, Steve Hanna, Erika Chin, ... -- Usenix 2011
"Towards Practical Oblivious RAM"
Emil Stefanov, Elaine Shi, Dawn Song, ... -- NDSS 2012
"On the Feasibility of Internet-Scale Author Identification"
Neil Zhenqiang Gong, John Bethencourt, Emil Stefanov, Eui Chul, Richard Shin, Dawn Song, ... -- Oakland 2012
"Hourglass Schemes: How to Prove that Cloud Files Are Encrypted"
Emil Stefanov, ... -- CCS 2012
"Routing Around Decoys"
Christopher Thompson, ... -- CCS 2012
"Manufacturing Compromise: The Emergence of Exploit-as-a-Service"
Chris Grier, Kurt Thomas, Vern Paxson, ... -- CCS 2012
"Dynamic Searchable Symmetric Encryption"
Charalampos Papamanthou, ... -- CCS 2012
"An Evaluation of the Google Chrome Extension Security Architecture"
Nicholas Carlini, Adrienne Porter Felt, David Wagner, ... -- Usenix 2012
"On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces"
Doug Davies, Mario Frank, Daniele Perito, Dawn Song, ... -- Usenix 2012
"TARDIS: Time and Remanence Decay in SRAM to Implement Secure Protocols on Embedded Devices without Clocks"
Dan Holcomb, ... -- Usenix 2012
"Privilege Separation in HTML5 Applications"
Devdatta Akhawe, Prateek Saxena, Dawn Song, ... -- Usenix 2012
"Pisces: Anonymous Communication Using Social Networks"
Prateek Mittal, ... -- NDSS 2013
"Preserving Link Privacy in Social Network based Systems"
Prateek Mittal, Charalampos Papamanthou, Dawn Song, ... -- NDSS 2013
"Contextual Policy Enforcement in Android Applications with Permission Event Graphs"
Kevin Zhijie Chen, Noah Johnson, Vijay D'Silva, Shuaifu Dai, Kyle MacNamara, Tom Magrino, Edward XueJun Wu, Dawn Song, ... -- NDSS 2013
"SoK: Eternal War in Memory"
Laszlo Szekeres, Mathias Payer, Tao Wei, Dawn Song, ... -- Oakland 2013
"ObliviStore: High Performance Oblivious Cloud Storage"
Emil Stefanov, ... -- Oakland 2013
"Practical Control Flow Integrity & Randomization for Binary Executables"
Tao Wei, Dawn Song, ... -- Oakland 2013
"Path ORAM: An Extremely Simple Oblivious RAM Protocol"
Emil Stefanov, ... -- CCS 2013
"Practical Dynamic Proofs of Retrievability"
Emil Stefanov, ... -- CCS 2013
"Multi-Cloud Oblivious Storage"
Emil Stefanov, ... -- CCS 2013
"PHANTOM: Practical Oblivious Computation in a Secure Processor"
Martin Maas, Eric Love, Emil Stefanov, Krste Asanovic, John Kubiatowicz, Dawn Song, ... -- CCS 2013
"Detecting Stealthy, Distributed SSH Bruteforcing"
Mobin Javed, Vern Paxson, ... -- CCS 2013
"Practical Comprehensive Bounds on Surreptitious Communication over DNS"
Vern Paxson, Mobin Javed, Kurt Thomas, ... -- Usenix 2013
"Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse"
Kurt Thomas, Chris Grier, Vern Paxson, ... -- Usenix 2013
"Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness"
Devdatta Akhawe, ... -- Usenix 2013
"An Empirical Study of Vulnerability Rewards Programs"
Matthew Finifter, Devdatta Akhawe, David Wagner, ... -- Usenix 2013
"Practical Dynamic Searchable Encryption with Small Leakage"
Emil Stefanov, ... -- NDSS 2014
"Doppelganger Finder: Taking Stylometry To The Underground"
Sadia Afroz, ... -- Oakland 2014
"Are You Ready to Lock? Understanding User Motivations for Smartphone Locking Behaviors"
Serge Egelman, Sakshi Jain, Rebecca Pottenger, David Wagner, ... -- CCS 2014
"Consequences of Connectivity: Characterizing Account Hijacking on Twitter"
Kurt Thomas, Frank Li, Chris Grier, Vern Paxson, ... -- CCS 2014
"Oblivious Data Structures"
Emil Stefanov, ... -- CCS 2014
"Dialing Back Abuse on Phone Verified Accounts"
Chris Grier, ... -- CCS 2014
"Characterizing Large-Scale Click Fraud in ZeroAccess"
Paul Pearce, Chris Grier, Vern Paxson, ... -- CCS 2014
"ShadowCrypt: Encrypted Web Applications for Everyone"
Warren He, Devdatta Akhawe, Sumeet Jain, Dawn Song, ... -- CCS 2014
"A Critical Evaluation of Website Fingerprinting Attacks"
Sadia Afroz, ... -- CCS 2014
"When Governments Hack Opponents: A Look at Actors and Technology"
William R. Marczak, Vern Paxson, ... -- Usenix 2014
"The Emperor's New Password Manager: Security Analysis of Web-based Password Managers"
Zhiwei Li, Warren He, Devdatta Akhawe, Dawn Song, ... -- Usenix 2014
"Hulk: Eliciting Malicious Behavior in Browser Extensions"
Chris Grier, Vern Paxson, ... -- Usenix 2014
"Burst ORAM: Minimizing ORAM Response Times for Bursty Access Patterns"
Emil Stefanov, ... -- Usenix 2014
"JIGSAW : Protecting Resource Access by Inferring Programmer Expectations"
Mathias Payer, ... -- Usenix 2014
"ROP is Still Dangerous: Breaking Modern Defenses"
Nicholas Carlini, David Wagner, ... -- Usenix 2014
"Bloom Cookies: Web Search Personalization without User Tracking"
Nitesh Mor, Oriana Riva, John Kubiatowicz, ... -- NDSS 2015
"Exploiting and Protecting Dynamic Code Generation"
Chao Zhang, ... -- NDSS 2015
"On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge"
Neil Zhenqiang Gong, ... -- NDSS 2015
"VTint: Defending Virtual Function Tables' Integrity"
Chao Zhang, Kevin Zhijie Chen, Dawn Song, ... -- NDSS 2015
"Ad Injection at Scale: Assessing Deceptive Advertisement Modifications"
Paul Pearce, Grant Ho, Vern Paxson, ... -- Oakland 2015
"Temporal Lensing and its Application in Pulsing Denial-of-Service Attacks"
Ryan Rasti, Mukul Murthy, Nicholas Weaver, Vern Paxson, ... -- Oakland 2015
"Moat: Verifying Confidentiality of Enclave Programs"
Rohit Sinha, Sanjit A. Seshia, ... -- CCS 2015
"Control-Flow Bending: On the Effectiveness of Control-Flow Integrity"
Nicholas Carlini, David Wagner, ... -- Usenix 2015
"Constants Count: Practical Improvements to Oblivious RAM"
Emil Stefanov, ... -- Usenix 2015
"Android Permissions Remystified: A Field Study on Contextual Integrity"
Arjun Baokar, Ashkan Hosseini, Serge Egelman, David Wagner, ... -- Usenix 2015
"Recognizing Functions in Binaries with Neural Networks"
Eui Chul Richard Shin, Reza Moazzezi, Dawn Song, ... -- Usenix 2015
"Cookies Lack Integrity: Real-World Implications"
Jian Jiang, ... -- Usenix 2015
"Forwarding-Loop Attacks in Content Delivery Networks"
Jian Jiang, Vern Paxson, ... -- NDSS 2016
"VTrust: Regaining Trust on Virtual Calls"
Chao Zhang, Dawn Song, ... -- NDSS 2016
"Do You See What I See? Differential Treatment of Anonymous Users"
David Fifield, Sadia Afroz, Mobin Javed, Vern Paxson, ... -- NDSS 2016
"SoK: Towards Grounding Censorship Circumvention in Empiricism"
David Fifield, Vern Paxson, ... -- Oakland 2016
"Verena: End-to-End Integrity Protection for Web Applications"
Raluca Ada Popa, ... -- Oakland 2016
"PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration"
Alex Kantchelian, Vern Paxson, ... -- CCS 2016
"Host of Troubles: Multiple Host Ambiguities in HTTP Implementations"
Jian Jiang, Nicholas Weaver, Vern Paxson, ... -- CCS 2016
"The Honey Badger of BFT Protocols"
Dawn Song, ... -- CCS 2016
"AdScale: Scalable Private Advertising with Practical Trusted Third Parties"
Watson Ladd, ... -- CCS 2016
"Hidden Voice Commands"
Nicholas Carlini, Pratyush Mishra, David Wagner, ... -- Usenix 2016
"You've Got Vulnerability: Exploring Effective Vulnerability Notifications"
Frank Li, Vern Paxson, ... -- Usenix 2016
"Towards Implicit Visual Memory-Based Authentication"
Fatma Deniz, ... -- NDSS 2017
"The Security Impact of HTTPS Interception"
Vern Paxson, ... -- NDSS 2017
"Augur: Internet-Wide Detection of Connectivity Disruptions"
Paul Pearce, Frank Li, Vern Paxson, ... -- Oakland 2017
"The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences"
Arjun Baokar, Lynn Tsai, Joel Reardon, Serge Egelman, David Wagner, ... -- Oakland 2017
"To Catch a Ratter: Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild"
Paul Pearce, ... -- Oakland 2017
"Towards Evaluating the Robustness of Neural Networks"
Nicholas Carlini, David Wagner, ... -- Oakland 2017
"A Formal Foundation for Secure Remote Execution of Enclaves"
Pramod Subramanyan, Rohit Sinha, Sanjit A. Seshia, ... -- CCS 2017
"A Large-Scale Empirical Study of Security Patches"
Frank Li, Vern Paxson, ... -- CCS 2017
"Data breaches, phishing, or malware? Understanding the risks of stolen credentials"
Frank Li, Vern Paxson, ... -- CCS 2017
"Let's go in for a closer look: Observing passwords in their natural habitat"
Serge Egelman, ... -- CCS 2017
"Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection"
Chang Liu, Dawn Song, ... -- CCS 2017
"TinyOLE: Efficient Actively Secure Two-Party Computation from Oblivious Linear Function Evaluation"
Nico Dottling, ... -- CCS 2017
"Global Measurement of DNS Censorship"
Paul Pearce, Frank Li, Vern Paxson, ... -- Usenix 2017
"Characterizing the Nature and Dynamics of Tor Exit Blocking"
Sadia Afroz, Paul Pearce, Vern Paxson, ... -- Usenix 2017
"Detecting Credential Spearphishing in Enterprise Settings"
Grant Ho, Mobin Javed, Vern Paxson, David Wagner, ... -- Usenix 2017
"Oscar: A Practical Page-Permissions-Based Scheme for Thwarting Dangling Pointers"
Thurston Dang, David Wagner, ... -- Usenix 2017
"Didn't You Hear Me? - Towards More Successful Web Vulnerability Notifications."
Frank Li, ... -- NDSS 2018
"A Machine Learning Approach To Prevent Malicious Calls Over Telephony Networks"
Chang Liu, Dawn Song, ... -- Oakland 2018
"Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning"
Chang Liu, Bo Li, ... -- Oakland 2018
"Oblix: An Efficient Oblivious Search Index"
Pratyush Mishra, Rishabh Poddar, Jerry Chen, Alessandro Chiesa, Raluca Ada Popa, ... -- Oakland 2018
"DeepMem: Learning Graph Neural Network Models for Fast and Robust Memory Forensic Analysis"
Chang Liu, Dawn Song, ... -- CCS 2018
"PASTA: PASsword-based Threshold Authentication"
Peihan Miao, ... -- CCS 2018
"DIZK: A Distributed Zero Knowledge Proof System"
Howard Wu, Wenting Zheng, Alessandro Chiesa, Raluca Ada Popa, Ion Stoica, ... -- Usenix 2018
"Schrödinger's RAT: Profiling the Stakeholders in the Remote Access Trojan Ecosystem"
Paul Pearce, ... -- Usenix 2018
"We Still Don't Have Secure Cross-Domain Requests: an Empirical Study of CORS"
Vern Paxson, ... -- Usenix 2018
"TextBugger: Generating Adversarial Text Against Real-world Applications"
Bo Li, ... -- NDSS 2019
"DeepSec: A Uniform Platform for Security Analysis of Deep Learning Models"
Bo Li, ... -- Oakland 2019
"Helen: Maliciously Secure Coopetitive Learning for Linear Models"
Wenting Zheng, Raluca Ada Popa, Joseph E. Gonzalez, Ion Stoica, ... -- Oakland 2019
"Towards Practical Differentially Private Convex Optimization"
Joseph P. Near, Dawn Song, ... -- Oakland 2019
"CHURP: Dynamic-Committee Proactive Secret Sharing"
Lun Wang, Andrew Low, Yupeng Zhang, Dawn Song, ... -- CCS 2019
"DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps"
Peng Gao, ... -- CCS 2019
"Detecting Fake Accounts in Online Social Networks at the Time of Registrations"
Dawn Song, ... -- CCS 2019
"Geneva: Evolving Censorship Evasion Strategies"
Xiao Qiang, ... -- CCS 2019
"HyperService: Interoperability and Programmability across Heterogeneous Blockchains"
Peng Gao, ... -- CCS 2019
"Lifelong Anomaly Detection Through Unlearning"
Min Du, Zhi Chen, Rajvardhan Oak, Dawn Song, ... -- CCS 2019
"Network Hygiene, Incentives, and Regulation: Deployment of Source Address Validation in the Internet"
Joshua Kroll, ... -- CCS 2019
"Quantitative Verification of Neural Networks and Its Security Applications"
Shweta Shinde, ... -- CCS 2019
"The Secret Sharer: Evaluating and Testing Unintended Memorization in Neural Networks"
Chang Liu, Dawn Song, ... -- Usenix 2019
"50 Ways to Leak Your Data: An Exploration of Apps' Circumvention of the Android Permissions Systems"
Primal Wijesekera, Amit Elazari Bar On, Serge Egelman, ... -- Usenix 2019
"Detecting and Characterizing Lateral Phishing at Scale"
Grant Ho, Vern Paxson, David Wagner, ... -- Usenix 2019
"WAVE: A Decentralized Authorization Framework with Transitive Delegation"
Michael P Andersen, Sam Kumar, Moustafa AbdelBaky, Gabe Fierro, John Kolb, Hyung-Sin Kim, David E. Culler, Raluca Ada Popa, ... -- Usenix 2019
"JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT"
Sam Kumar, Yuncong Hu, Michael P Andersen, Raluca Ada Popa, David E. Culler, ... -- Usenix 2019
"DEEPVSA: Facilitating Value-set Analysis with Deep Learning for Postmortem Program Analysis"
Min Du, Dawn Song, ... -- Usenix 2019
"Metal: A Metadata-Hiding File-Sharing System"
Weikeng Chen, Raluca Ada Popa, ... -- NDSS 2020
"HopSkipJumpAttack: A Query-Efficient Decision-Based Attack"
Jianbo Chen, Michael I. Jordan, Martin J. Wainwright, ... -- Oakland 2020
"The State of the Uniform: Attacks on Encrypted Databases Beyond the Uniform Query Distribution"
Evgenios Kornaropoulos, ... -- Oakland 2020
"Transparent Polynomial Delegation and Its Applications to Zero Knowledge Proof"
Jiaheng Zhang, Tiancheng Xie, Dawn Song, ... -- Oakland 2020
"ZEXE: Enabling Decentralized Private Computation"
Alessandro Chiesa, Pratyush Mishra, Howard Wu, ... -- Oakland 2020
"Verifiable Timed Signatures Made Practical"
Giulio Malavolta, ... -- CCS 2020
"Zero Knowledge Proofs for Decision Tree Predictions and Accuracy"
Jiaheng Zhang, Dawn Song, ... -- CCS 2020
"Ligero++: A New Optimized Sublinear IOP"
Tiancheng Xie, ... -- CCS 2020
"Empirical Measurement of Systemic 2FA Usability"
Joshua Reynolds, Nikita Samarin, Serge Egelman, ... -- Usenix 2020
"The Impact of Ad-Blockers on Product Search and Purchase Behavior: A Lab Experiment"
Alisa Frik, ... -- Usenix 2020
"An Off-Chip Attack on Hardware Enclaves via the Memory Bus"
Dayeol Lee, Ian T. Fang, Raluca Ada Popa, ... -- Usenix 2020
"Civet: An Efficient Java Partitioning Framework for Hardware Enclaves"
Jeongseok Son, Raluca Ada Popa, ... -- Usenix 2020
"BesFS: A POSIX Filesystem for Enclaves with a Mechanized Safety Proof"
Shweta Shinde, ... -- Usenix 2020
"PARTEMU: Enabling Dynamic Analysis of Real-World TrustZone Software Using Emulation"
Rohan Padhye, Koushik Sen, ... -- Usenix 2020
"Actions Speak Louder than Words: Entity-Sensitive Privacy Policy and Data Flow Analysis with PoliCheck"
Serge Egelman, ... -- Usenix 2020
"Visor: Privacy-Preserving Video Analytics as a Cloud Service"
Rishabh Poddar, Raluca Ada Popa, ... -- Usenix 2020
"SANNS: Scaling Up Secure Approximate k-Nearest Neighbors Search"
Oxana Poburinnaya, ... -- Usenix 2020
"MIRAGE: Succinct Arguments for Randomized Algorithms with Applications to Universal zk-SNARKs"
Dawn Song, ... -- Usenix 2020
"Composition Kills: A Case Study of Email Sender Authentication"
Vern Paxson, ... -- Usenix 2020
"Pancake: Frequency Smoothing for Encrypted Data Stores"
Lloyd Brown, ... -- Usenix 2020
"Droplet: Decentralized Authorization and Access Control for Encrypted Data Streams"
Sylvia Ratnasamy, ... -- Usenix 2020
"Delphi: A Cryptographic Inference Service for Neural Networks"
Pratyush Mishra, Ryan Lehmkuhl, Akshayaram Srinivasan, Wenting Zheng, Raluca Ada Popa, ... -- Usenix 2020
"Is Private Learning Possible with Instance Encoding?"
Sanjam Garg, ... -- Oakland 2021
"Merkle^2: A Low-Latency Transparency Log System"
Yuncong Hu, Kian Hooshmand, Rajeswari Harika Kalidhindi, Seung Jin Yang, Raluca Ada Popa, ... -- Oakland 2021
"Response-Hiding Encrypted Ranges: Revisiting Security via Parametrized Leakage-Abuse Attacks"
Evgenios Kornaropoulos, ... -- Oakland 2021
"Doubly Efficient Interactive Proofs for General Arithmetic Circuits with Linear Prover Time"
Jiaheng Zhang, Yinuo Zhang, Dawn Song, ... -- CCS 2021
"Learning Security Classifiers with Verified Global Robustness Properties"
David Wagner, ... -- CCS 2021
"Senate: A Maliciously-Secure MPC Platform for Collaborative Analytics"
Rishabh Poddar, Sukrit Kalra, Ryan Deng, Raluca Ada Popa, Joseph M. Hellerstein, ... -- Usenix 2021
"Muse: Secure Inference Resilient to Malicious Clients"
Ryan Lehmkuhl, Pratyush Mishra, Raluca Ada Popa, ... -- Usenix 2021
"ObliCheck: Efficient Verification of Oblivious Algorithms with Unobservable State"
Jeongseok Son, Griffin Prechter, Rishabh Poddar, Raluca Ada Popa, Koushik Sen, ... -- Usenix 2021
"Extracting Training Data from Large Language Models"
Eric Wallace, Dawn Song, ... -- Usenix 2021
"Cerebro: A Platform for Multi-Party Cryptographic Collaborative Learning"
Wenting Zheng, Ryan Deng, Weikeng Chen, Raluca Ada Popa, Ion Stoica, ... -- Usenix 2021
"Hopper: Modeling and Detecting Lateral Movement"
Grant Ho, Vern Paxson, David Wagner, ... -- Usenix 2021
"How Great is the Great Firewall? Measuring China's DNS Censorship"
Bill Marczak, ... -- Usenix 2021
"A Metadata-Hiding File-Sharing System with Malicious Security"
Weikeng Chen, ... -- NDSS 2022
"hbACSS: How to Robustly Share Many Secrets"
Jaiden Fairoze, ... -- NDSS 2022
"Copy, Right? A Testing Framework for Copyright Protection of Deep Learning Models"
Dawn Song, ... -- Oakland 2022
"Deployment of Source Address Validation by Network Operators: A Randomized Control Trial"
Alisa Frik, ... -- Oakland 2022
"SecFloat: Accurate Floating-Point meets Secure 2-Party Computation"
Deevashwer Rathee, ... -- Oakland 2022
"Waldo: A Private Time-Series Database from Function Secret-Sharing"
Emma Dauterman, Mayank Rathee, Raluca Popa, Ion Stoica, ... -- Oakland 2022
"Bullshark: DAG BFT Protocols Made Practical"
Neil Giridharan, ... -- CCS 2022
"Cerberus: A Formal Approach to Secure and Efficient Enclave Memory Sharing"
Dayeol Lee, Kevin Cheang, Alexander Thomas, Catherine Lu, Pranav Gaddamadugu, Dawn Song, Sanjit A. Seshia, Krste Asanovic, ... -- CCS 2022
"Succinct Zero Knowledge for Floating Point Computations"
Sanjam Garg, Yinuo Zhang, ... -- CCS 2022
"zkBridge: Trustless Cross-chain Bridges Made Practical"
Tiancheng Xie, Jiaheng Zhang, Dawn Song, ... -- CCS 2022
"PrivGuard: Privacy Regulation Compliance Made Easier"
Lun Wang, Neel Somani, Andrew Low, Dawn Song, ... -- Usenix 2022
"Polynomial Commitment with a One-to-Many Prover and Applications"
Jiaheng Zhang, Tiancheng Xie, ... -- Usenix 2022
"Piranha: A GPU Platform for Secure Computation"
Jean-Luc Watson, Sameer Wagh, Raluca Ada Popa, ... -- Usenix 2022