"Graph-Based Authentication of Digital Streams"
Sara Miner, ... -- Oakland 2001
"OCB: a block-cipher mode of operation for efficient authenticated encryption"
Mihir Bellare, ... -- CCS 2001
"Inferring Internet Denial-of-Service Activity"
Geoffrey M. Voelker, Stefan Savage, ... -- Usenix 2001
"Self-Healing Key Distribution with Revocation"
Sara Miner, ... -- Oakland 2002
"Authenticated encryption in SSH: provably fixing the SSH binary packet protocol"
Mihir Bellare, Tadayoshi Kohno, ... -- CCS 2002
"802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions"
John Bellardo, Stefan Savage, ... -- Usenix 2003
"Dynamic Detection and Prevention of Race Conditions in File Accesses"
Eugene Tsyrklevich, Bennet Yee, ... -- Usenix 2003
"Analysis of an Electronic Voting System"
Tadayoshi Kohno, ... -- Oakland 2004
"On the Difficulty of Scalably Detecting Network Attacks"
Kirill Levchenko, Ramamohan Paturi, George Varghese, ... -- CCS 2004
"Attacking and Repairing the WinZip Encryption Scheme"
Tadayoshi Kohno, ... -- CCS 2004
"Remote Physical Device Fingerprinting"
Tadayoshi Kohno, Andre Broido, KC Claffy, ... -- Oakland 2005
"Misbehaving TCP Receivers Can Cause Internet-Wide Congestion Collapse"
Ryan Braud, ... -- CCS 2005
"Empirical Study of Tolerating Denial-of-Service Attacks with a Proxy Network"
Ju Wang, Xin Liu, Andrew A. Chien, ... -- Usenix 2005
"Key Regression: Enabling Efficient Key Distribution for Secure Distributed Storage"
Tadayoshi Kohno, ... -- NDSS 2006
"Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage -or- How to Store Ballots on a Voting Machine (Extended Abstract)"
Tadayoshi Kohno, ... -- Oakland 2006
"Stateful Public-Key Cryptosystems: How to Encrypt with One 160-bit Exponentiation"
Mihir Bellare, ... -- CCS 2006
"Multi-Signatures in the Plain Public-Key Model and a Generalized Forking Lemma"
Mihir Bellare, ... -- CCS 2006
"Designing Voting Machines for Verification"
Tadayoshi Kohno, ... -- Usenix 2006
"Robust Computational Secret Sharing and a Unified Account of Classical Secret-Sharing Goals"
Mihir Bellare, ... -- CCS 2007
"The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86)"
Hovav Shacham, ... -- CCS 2007
"Spamscatter: Characterizing Internet Scam Hosting Infrastructure"
David S. Anderson, Chris Fleizach, Stefan Savage, Geoffrey M. Voelker, ... -- Usenix 2007
"Proximity Breeds Danger: Emerging Threats in Metro-area Wireless Networks"
Vinh The Lam, ... -- Usenix 2007
"When Good Instructions Go Bad: Generalizing Return-Oriented Programming to RISC"
Erik Buchanan, Ryan Roemer, Hovav Shacham, Stefan Savage, ... -- CCS 2008
"Reconsidering Physical Key Secrecy: Teleduplication via Optical Decoding"
Benjamin Laxton, Kai Wang, Stefan Savage, ... -- CCS 2008
"Spamalytics: An Empirical Analysis of Spam Marketing Conversion"
Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Stefan Savage, ... -- CCS 2008
"Proactive Surge Protection: A Defense Mechanism for Bandwidth-Based Attacks"
Jerry Chou, Bill Lin, ... -- Usenix 2008
"Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties with DHTs"
Thomas Ristenpart, ... -- Usenix 2008
"Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds"
Thomas Ristenpart, Hovav Shacham, Stefan Savage, ... -- CCS 2009
"Botnet Judo: Fighting Spam with Itself"
Andreas Pitsillidis, Kirill Levchenko, Chris Kanich, Geoffrey M. Voelker, Stefan Savage, ... -- NDSS 2010
"When Good Randomness Goes Bad: Virtual Machine Reset Vulnerabilities and Hedging Deployed Cryptography"
Thomas Ristenpart, Scott Yilek, ... -- NDSS 2010
"Experimental Security Analysis of a Modern Automobile"
Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, ... -- Oakland 2010
"An empirical study of privacy-violating information flows in JavaScript web applications"
Dongseok Jang, Ranjit Jhala, Sorin Lerner, Hovav Shacham, ... -- CCS 2010
"Return-oriented programming without returns"
Stephen Checkoway, Hovav Shacham, ... -- CCS 2010
"ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash"
Sarah Meiklejohn, ... -- Usenix 2010
"Re: CAPTCHAs Understanding CAPTCHA-Solving Services in an Economic Context"
Marti Motoyama, Kirill Levchenko, Chris Kanich, Damon McCoy, Geoffrey M. Voelker, Stefan Savage, ... -- Usenix 2010
"Click Trajectories: End-to-End Analysis of the Spam Value Chain"
Kirill Levchenko, Andreas Pitsillidis, Neha Chachra, Brandon Enright, Tristan Halvorson, Chris Kanich, He Liu, Damon McCoy, Geoffrey M. Voelker, Stefan Savage, ... -- Oakland 2011
"Cloak and Dagger: Dynamics of Web Search Cloaking"
David Y. Wang, Stefan Savage, Geoffrey M. Voelker, ... -- CCS 2011
"Ciphers that Encipher their own Keys"
Mihir Bellare, Sriram Keelveedhi, ... -- CCS 2011
"Comprehensive Experimental Analyses of Automotive Attack Surfaces"
Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, ... -- Usenix 2011
"Dirty Jobs: The Role of Freelance Labor in Web Service Abuse"
Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker, ... -- Usenix 2011
"Show Me the Money: Characterizing Spam-advertised Revenue"
Chris Kanich, Damon McCoy, Tristan Halvorson, Kirill Levchenko, Geoffrey M. Voelker, Stefan Savage, ... -- Usenix 2011
"The Phantom Tollbooth: Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion"
Sarah Meiklejohn, Keaton Mowery, Stephen Checkoway, Hovav Shacham, ... -- Usenix 2011
"Priceless: The Role of Payments in Abuse-advertised Goods"
Geoffrey M. Voelker, Stefan Savage, ... -- CCS 2012
"Manufacturing Compromise: The Emergence of Exploit-as-a-Service"
Neha Chachra, Kirill Levchenko, Andreas Pitsillidis, Stefan Savage, Geoffrey M. Voelker, ... -- CCS 2012
"Foundations of Garbled Circuits"
Mihir Bellare, Viet Tung Hoang, ... -- CCS 2012
"PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs"
Andreas Pitsillidis, Grant Jordan, Geoffrey M. Voelker, Stefan Savage, Kirill Levchenko, ... -- Usenix 2012
"Establishing Browser Security Guarantees through Formal Shim Verification"
Dongseok Jang, Zachary Tatlock, Sorin Lerner, ... -- Usenix 2012
"Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices"
Nadia Heninger, ... -- Usenix 2012
"Optimally Robust Private Information Retrieval"
Nadia Heninger, ... -- Usenix 2012
"Juice: A Longitudinal Study of an SEO Campaign"
David Y. Wang, Stefan Savage, Geoffrey M. Voelker, ... -- NDSS 2013
"Efficient Garbling from a Fixed-Key Blockcipher"
Mihir Bellare, Sriram Keelveedhi, ... -- Oakland 2013
"Welcome to the Entropics: Boot-Time Entropy in Embedded Devices"
Keaton Mowery, Michael Wei, David Kohlbrenner, Hovav Shacham, Steven Swanson, ... -- Oakland 2013
"Catching Click-Spam in Search Ad Networks"
Vacha Dave, ... -- CCS 2013
"Practical Comprehensive Bounds on Surreptitious Communication over DNS"
Nicholas Weaver, ... -- Usenix 2013
"DupLESS: Server-Aided Encryption for Deduplicated Storage"
Mihir Bellare, Sriram Keelveedhi, ... -- Usenix 2013
"Measuring the Practical Impact of DNSSEC Deployment"
Wilson Lian, Hovav Shacham, Stefan Savage, ... -- Usenix 2013
"Take This Personally: Pollution Attacks on Personalized Services"
Alex C. Snoeren, ... -- Usenix 2013
"SafeDispatch: Securing C++ Virtual Calls from Memory Corruption Attacks"
Dongseok Jang, Sorin Lerner, ... -- NDSS 2014
"DSpin: Detecting Automatically Spun Content on the Web"
Qing Zhang, David Y. Wang, Geoffrey M. Voelker, ... -- NDSS 2014
"Botcoin: Monetizing Stolen Cycles"
Danny Yuxing Huang, Sarah Meiklejohn, Vacha Dave, Stefan Savage, Alex C. Snoeren, Kirill Levchenko, ... -- NDSS 2014
"Deniable Liaisons"
Alex C. Snoeren, ... -- CCS 2014
"Characterizing Large-Scale Click Fraud in ZeroAccess"
Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker, ... -- CCS 2014
"On The Security of Mobile Cockpit Information Systems"
Devin Lundberg, Brown Farinholt, Edward Sullivan, Ryan Mast, Stefan Savage, Alex C. Snoeren, Kirill Levchenko, ... -- CCS 2014
"On the Practical Exploitability of Dual EC in TLS Implementations"
Jake Maskiewicz, Hovav Shacham, ... -- Usenix 2014
"Security Analysis of a Full-Body Scanner"
Keaton Mowery, Tom Wypych, Corey Singleton, Chris Comfort, Eric Rescorla, Hovav Shacham, ... -- Usenix 2014
"Hulk: Eliciting Malicious Behavior in Browser Extensions"
Neha Chachra, ... -- Usenix 2014
"Too LeJIT to Quit: Extending JIT Spraying to ARM"
Wilson Lian, Hovav Shacham, Stefan Savage, ... -- NDSS 2015
"On Subnormal Floating Point and Abnormal Timing"
Marc Andrysco, Keaton Mowery, David Kohlbrenner, Ranjit Jhala, Sorin Lerner, Hovav Shacham, ... -- Oakland 2015
"Security by Any Other Name: On the Effectiveness of Provider Based Email Security"
Ian Foster, Jon Larson, Max Masich, Alex C. Snoeren, Stefan Savage, Kirill Levchenko, ... -- CCS 2015
"Mass-surveillance without the State: Strongly Undetectable Algorithm-Substitution Attacks"
Mihir Bellare, Joseph Jaeger, Daniel Kane, ... -- CCS 2015
"Cookies Lack Integrity: Real-World Implications"
Nick Weaver, ... -- Usenix 2015
"Protecting C++ Dynamic Dispatch Through VTable Interleaving"
Dimitar Bounov, Rami Gokhan Kc, Sorin Lerner, ... -- NDSS 2016
"Message-recovery attacks on Feistel-based Format Preserving Encryption"
Mihir Bellare, ... -- CCS 2016
"A Systematic Analysis of the Juniper Dual EC Incident"
Jacob Maskiewicz, Eric Rescorla, Hovav Shacham, ... -- CCS 2016
"Trusted browsers for uncertain times"
David Kohlbrenner, Hovav Shacham, ... -- Usenix 2016
"You've Got Vulnerability: Exploring Effective Vulnerability Notifications"
Stefan Savage, ... -- Usenix 2016
"Pushing the Communication Barrier in Secure Computation using Lookup Tables"
Farinaz Koushanfar, ... -- NDSS 2017
"A Call to ARMs: Understanding the Costs and Benefits of JIT Spraying Mitigations"
Wilson Lian, Hovav Shacham, Stefan Savage, ... -- NDSS 2017
"Finding and Preventing Bugs in JavaScript Bindings"
Shravan Narayan, Ranjit Jhala, Deian Stefan, ... -- Oakland 2017
"How They Did It: An Analysis of Emission Defeat Devices in Modern Automobiles"
Guo Li, Kirill Levchenko, Stefan Savage, ... -- Oakland 2017
"To Catch a Ratter: Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild"
Brown Farinholt, Haikuo Yin, Kirill Levchenko, ... -- Oakland 2017
"Better Than Advertised: Improved Security Guarantees for MD-Based Hash Functions"
Mihir Bellare, Joseph Jaeger, Julia Len, ... -- CCS 2017
"Defending Against Key Exfiltration: Efficiency Improvements for BIG-Key Cryptography via Large-Alphabet Subkey Prediction"
Mihir Bellare, Wei Dai, ... -- CCS 2017
"Identity-Based Format-Preserving Encryption"
Mihir Bellare, ... -- CCS 2017
"Quantifying the Pressure of Legal Risks on Third-party Vulnerability Research"
Alexander Gamero-Garrido, Stefan Savage, Kirill Levchenko, Alex C. Snoeren, ... -- CCS 2017
"Prime+Abort: A Timer-Free High-Precision L3 Cache Attack using Intel TSX"
Craig Disselkoen, David Kohlbrenner, Leo Porter, Dean Tullsen, ... -- Usenix 2017
"The buoyancy of castles: Examining the effectiveness of mitigations against floating-point timing channels"
David Kohlbrenner, Hovav Shacham, ... -- Usenix 2017
"Dead Store Elimination (Still) Considered Harmful"
Zhaomo Yang, Brian Johannesmeyer, Sorin Lerner, Kirill Levchenko, ... -- Usenix 2017
"Tracking Ransomware End-to-end"
Vector Guo Li, Kirill Levchenko, Alex C. Snoeren, ... -- Oakland 2018
"Asking for a Friend: Evaluating Response Biases in Security User Studies"
Sean Kross, ... -- CCS 2018
"Lawful Device Access without Mass Surveillance Risk: A Technical Design Discussion"
Stefan Savage, ... -- CCS 2018
"Towards Verified, Constant-time Floating Point Operations"
Marc Andrysco, Ranjit Jhala, Deian Stefan, ... -- CCS 2018
"Secure Outsourced Matrix Computation and Application to Neural Networks"
Yongsoo Song, ... -- CCS 2018
"Schrödinger's RAT: Profiling the Stakeholders in the Remote Access Trojan Ecosystem"
Brown Farinholt, Kirill Levchenko, ... -- Usenix 2018
"How Well Do My Results Generalize? Comparing Security and Privacy Survey Results from MTurk, Web, and Telephone Samples"
Sean Kross, ... -- Oakland 2019
"On the Security of Two-Round Multi-Signatures"
Igors Stepanovs, ... -- Oakland 2019
"The Code That Never Ran: Modeling Attacks on Speculative Evaluation"
Craig Disselkoen, ... -- Oakland 2019
"Multisketches: Practical Secure Sketches Using Off-the-Shelf Biometric Matching Algorithms"
M. Sadegh Riazi, Farinaz Koushanfar, ... -- CCS 2019
"Network Hygiene, Incentives, and Regulation: Deployment of Source Address Validation in the Internet"
Ryan Koga, Ken Keys, KC Claffy, ... -- CCS 2019
"Towards Continuous Access Control Validation and Forensics"
Chengcheng Xiang, Yudong Wu, Bingyu Shen, Mingyao Shen, Yuanyuan Zhou, Cindy Moore, ... -- CCS 2019
"VeriSketch: Synthesizing Secure Hardware Designs with Timing-Sensitive Information Flow Properties"
Armaiti Ardeshiricham, Yoshiki Takashima, Sicun Gao, Ryan Kastner, ... -- CCS 2019
"Please Pay Inside: Evaluating Bluetooth-based Detection of Gas Pump Skimmers"
Nishant Bhaskar, Maxwell Bland, Aaron Schulman, ... -- Usenix 2019
"Reading the Tea leaves: A Comparative Analysis of Threat Intelligence"
Vector Guo Li, Geoffrey M. Voelker, Stefan Savage, ... -- Usenix 2019
"Detecting and Characterizing Lateral Phishing at Scale"
Stefan Savage, Geoffrey M. Voelker, ... -- Usenix 2019
"IODINE: Verifying Constant-Time Execution of Hardware"
Klaus v. Gleissenthall, Rami Gokhan Kc, Deian Stefan, Ranjit Jhala, ... -- Usenix 2019
"XONN: XNOR-based Oblivious Deep Neural Network Inference"
M Sadegh Riazi, Mohammad Samragh, Farinaz Koushanfar, ... -- Usenix 2019
"Pseudorandom Black Swans: Cache Attacks on CTR_DRBG"
Nadia Heninger, ... -- Oakland 2020
"A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web"
Sean Kross, ... -- Usenix 2020
"Sys: A Static/Symbolic Tool for Finding Good Bugs in Good (Browser) Code"
Deian Stefan, ... -- Usenix 2020
"CopyCat: Controlled Instruction-Level Attacks on Enclaves"
Nadia Heninger, ... -- Usenix 2020
"Retrofitting Fine Grain Isolation in the Firefox Renderer"
Shravan Narayan, Craig Disselkoen, Sorin Lerner, Deian Stefan, ... -- Usenix 2020
"Exploring Connections Between Active Learning and Model Extraction"
Kamalika Chaudhuri, Songbai Yan, ... -- Usenix 2020
"TPM-FAIL: TPM meets Timing and Lattice Attacks"
Nadia Heninger, ... -- Usenix 2020
"SANNS: Scaling Up Secure Approximate k-Nearest Neighbors Search"
M. Sadegh Riazi, ... -- Usenix 2020
"Доверя́й, но проверя́й: SFI safety for native-compiled Wasm"
Evan Johnson, David Thien, Yousef Alhessi, Shravan Narayan, Sorin Lerner, Stefan Savage, Deian Stefan, ... -- NDSS 2021
"Diogenes: Lightweight Scalable RSA Modulus Generation with a Dishonest Majority"
Daniele Micciancio, ... -- Oakland 2021
"High-Assurance Cryptography in the Spectre Era"
Sunjay Cauligi, ... -- Oakland 2021
"SugarCoat: Programmatically Generating Privacy-Preserving, Web-Compatible Resource Replacements for Content Blocking"
Michael Smith, Deian Stefan, ... -- CCS 2021
"The Invisible Shadow: How Security Cameras Leak Private Activities"
Xinyu Zhang, ... -- CCS 2021
"COINN: Crypto/ML Codesign for Oblivious Inference via Neural Networks"
Siam U. Hussain, Mojan Javaheripi, Mohammad Samragh, Farinaz Koushanfar, ... -- CCS 2021
"Solver-Aided Constant-Time Hardware Verification"
Rami Gokhan Kc, Deian Stefan, Ranjit Jhala, ... -- CCS 2021
"Driving 2FA Adoption at Scale: Optimizing Two-Factor Authentication Notification Design Patterns"
Grant Ho, ... -- Usenix 2021
"Jetset: Targeted Firmware Rehosting for Embedded Systems"
Evan Johnson, Stefan Savage, ... -- Usenix 2021
"Can Systems Explain Permissions Better? Understanding Users' Misperceptions under Smartphone Runtime Permission Model"
Bingyu Shen, Chengcheng Xiang, Yudong Wu, Mingyao Shen, Yuanyuan Zhou, ... -- Usenix 2021
"Locally Differentially Private Analysis of Graph Statistics"
Jacob Imola, Kamalika Chaudhuri, ... -- Usenix 2021
"Swivel: Hardening WebAssembly against Spectre"
Shravan Narayan, Craig Disselkoen, Daniel Moghimi, Sunjay Cauligi, Evan Johnson, Zhao Gang, Dean Tullsen, Deian Stefan, ... -- Usenix 2021
"WaveGuard: Understanding and Mitigating Audio Adversarial Examples"
Shehzeen Hussain, Paarth Neekhara, Shlomo Dubnov, Julian McAuley, Farinaz Koushanfar, ... -- Usenix 2021
"Hopper: Modeling and Detecting Lateral Movement"
Grant Ho, Stefan Savage, Geoffrey M. Voelker, ... -- Usenix 2021
"Evaluating Physical-Layer BLE Location Tracking Attacks on Mobile Devices"
Hadi Givehchian, Nishant Bhaskar, Eliana Rodriguez Herrera, Hector Lopez Soto, Christian Dameff, Dinesh Bharadia, Aaron Schulman, ... -- Oakland 2022
"SoK: Practical Foundations for Software Spectre Defenses"
Sunjay Cauligi, Craig Disselkoen, Daniel Moghimi, Deian Stefan, ... -- Oakland 2022
"Differentially Private Triangle and 4-Cycle Counting in the Shuffle Model"
Jacob Imola, Kamalika Chaudhuri, ... -- CCS 2022
"SecSMT: Securing SMT Processors against Contention-Based Covert Channels"
Mohammadkazem Taram, Dean Tullsen, ... -- Usenix 2022
"Spoki: Unveiling a New Wave of Scanners through a Reactive Network Telescope"
Alberto Dainotti, ... -- Usenix 2022
"Communication-Efficient Triangle Counting under Local Differential Privacy"
Jacob Imola, Kamalika Chaudhuri, ... -- Usenix 2022
"FLAME: Taming Backdoors in Federated Learning"
Huili Chen, Farinaz Koushanfar, ... -- Usenix 2022
"Open to a fault: On the passive compromise of TLS keys via transient errors"
George Arnold Sullivan, Nadia Heninger, ... -- Usenix 2022