"PRUNES: An Efficient and Complete Strategy for Automated Trust Negotiation over the Internet"
Ting Yu, Xiaosong Ma, Marianne Winslett, ... -- CCS 2000
"Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation"
Marianne Winslett, Ting Yu, ... -- NDSS 2001
"Interoperable strategies in automated trust negotiation"
Ting Yu, Marianne Winslett, ... -- CCS 2001
"A Unified Scheme for Resource Protection in Automated Trust Negotiation"
Ting Yu, Marianne Winslett, ... -- Oakland 2003
"KNOW Why Your Access was Denied: Regulating Feedback for Usable Security"
Apu Kapadia, Geetanjali Sampemane, Roy H. Campbell, ... -- CCS 2004
"A Black-Box Tracing Technique to Identify Causes of Least-Privilege Incompatibilities"
Shuo Chen, ... -- NDSS 2005
"Aggregated Path Authentication for Efficient BGP Security"
David M. Nicol, ... -- CCS 2005
"PeerAccess: A Logic for Distributed Authorization"
Marianne Winslett, Charles Zhang, ... -- CCS 2005
"Non-Control-Data Attacks Are Realistic Threats"
Shuo Chen, ... -- Usenix 2005
"Safety and Consistency in Policy-Based Authorization Systems"
Adam J. Lee, Marianne Winslett, ... -- CCS 2006
"Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting"
Parisa Tabriz, ... -- Usenix 2006
"Generic Application-Level Protocol Analyzer and its Language"
Nikita Borisov, ... -- NDSS 2007
"On the Safety and Efficiency of Firewall Policy Deployment"
Charles Zhang, Marianne Winslett, Carl A. Gunter, ... -- Oakland 2007
"A Systematic Approach to Uncover Security Flaws in GUI Logic"
Jose Meseguer, Ralf Sasse, ... -- Oakland 2007
"CANDID: Preventing SQL Injection Attacks Using Dynamic Candidate Evaluations"
Sruthi Bandhakavi, Madhusudan Parthasarathy, ... -- CCS 2007
"Denial of Service or Denial of Security? How Attacks on Reliability can Compromise Anonymity"
Nikita Borisov, Prateek Mittal, ... -- CCS 2007
"A Tune-up for Tor: Improving Security and Performance in the Tor Network"
Robin Snader, Nikita Borisov, ... -- NDSS 2008
"Cloaker: Hardware Supported Rootkit Concealment"
Ellick Chan, Jeffrey Carlyle, Francis M. David, Roy H. Campbell, ... -- Oakland 2008
"Secure Web Browsing with the OP Web Browser"
Samuel T. King, Chris Grier, Shuo Tang, ... -- Oakland 2008
"Information Leaks in Structured Peer-to-peer Anonymous Communication Systems"
Prateek Mittal, Nikita Borisov, ... -- CCS 2008
"BootJacker: Compromising Computers using Forced Restarts"
Ellick Chan, Jeffrey Carlyle, Francis M. David, Reza Farivar, Roy H. Campbell, ... -- CCS 2008
"A Framework for Reflective Database Access Control Policies"
Lars E. Olson, Carl A. Gunter, Madhusudan Parthasarathy, ... -- CCS 2008
"Multi-flow Attacks Against Network Flow Watermarking Schemes"
Nikita Borisov, Amir Houmansadr, Negar Kiyavash, ... -- Usenix 2008
"AutoISES: Automatically Inferring Security Specification and Detecting Violations"
Lin Tan, Xiao Ma, Weiwei Xiong, Yuanyuan Zhou, ... -- Usenix 2008
"SybilInfer: Detecting Sybil Nodes using Social Networks"
Prateek Mittal, ... -- NDSS 2009
"RAINBOW: A Robust And Invisible Non-Blind Watermark for Network Flows"
Amir Houmansadr, Negar Kiyavash, Nikita Borisov, ... -- NDSS 2009
"ShadowWalker: peer-to-peer anonymous communication using redundant structured topologies"
Prateek Mittal, Nikita Borisov, ... -- CCS 2009
"Memory Safety for Low-Level Software/Hardware Interactions"
John Criswell, Vikram Adve, ... -- Usenix 2009
"The Multi-Principal OS Construction of the Gazelle Web Browser"
Samuel T. King, Chris Grier, ... -- Usenix 2009
"Towards Static Flow-Based Declassification for Legacy and Untrusted Programs"
Sruthi Bandhakavi, ... -- Oakland 2010
"Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically"
Matthew Hicks, Murph Finnicum, Samuel T. King, ... -- Oakland 2010
"@spam: the underground on 140 characters or less"
Kurt Thomas, ... -- CCS 2010
"In search of an anonymous and secure lookup: attacks on structured peer-to-peer anonymous communication systems"
Qiyan Wang, Prateek Mittal, Nikita Borisov, ... -- CCS 2010
"BotGrep: Finding P2P Bots with Structured Graph Analysis"
Shishir Nagaraja, Prateek Mittal, Chi-Yao Hong, Matthew Caesar, Nikita Borisov, ... -- Usenix 2010
"VEX: Vetting Browser Extensions for Security Vulnerabilities"
Sruthi Bandhakavi, Samuel T. King, Madhusudan Parthasarathy, Marianne Winslett, ... -- Usenix 2010
"Using Classification to Protect the Integrity of Spectrum Measurements in White Space Networks"
Omid Fatemieh, Ali Farhadi, Carl A. Gunter, ... -- NDSS 2011
"SWIRL: A Scalable Watermark to Detect Correlated Network Flows"
Amir Houmansadr, Nikita Borisov, ... -- NDSS 2011
"Defeating UCI: Building Stealthy and Malicious Hardware"
Matthew Hicks, Samuel T. King, ... -- Oakland 2011
"Cirripede: Circumvention Infrastructure using Router Redirection with Plausible Deniability"
Amir Houmansadr, Giang T. K. Nguyen, Matthew Caesar, Nikita Borisov, ... -- CCS 2011
"Stealthy Traffic Analysis of Low-Latency Anonymous Communication Using Throughput Fingerprinting"
Prateek Mittal, Ahmed Khurshid, Joshua Juen, Matthew Caesar, Nikita Borisov, ... -- CCS 2011
"Fortifying Web-Based Applications Automatically"
Shuo Tang, Nathan Dautenhahn, Samuel T. King, ... -- CCS 2011
"PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval"
Prateek Mittal, Nikita Borisov, ... -- Usenix 2011
"X-Vine: Secure and Pseudonymous Routing in DHTs Using Social Networks"
Prateek Mittal, Matthew Caesar, Nikita Borisov, ... -- NDSS 2012
"Using replicated execution for a more secure and reliable web browser"
Hui Xue, Nathan Dautenhahn, Samuel T. King, ... -- NDSS 2012
"CensorSpoofer: Asymmetric Communication using IP Spoofing for Censorship-Resistant Web Browsing"
Qiyan Wang, Xun Gong, Giang T. K. Nguyen, Amir Houmansadr, Nikita Borisov, ... -- CCS 2012
"Populated IP Addresses -- Classification and Applications"
Chi-Yao Hong, ... -- CCS 2012
"Tracking Rootkit Footprints with a Practical Memory Analysis System"
Ellick Chan, ... -- Usenix 2012
"Pisces: Anonymous Communication Using Social Networks"
Nikita Borisov, ... -- NDSS 2013
"I want my voice to be heard: IP over Voice-over-IP for Unobservable Censorship Circumvention"
Thomas Riedl, Nikita Borisov, Andrew Singer, ... -- NDSS 2013
"rBridge: User Reputation based Tor Bridge Distribution with Privacy Preservation"
Qiyan Wang, Nikita Borisov, ... -- NDSS 2013
"Identity, Location, Disease and More: Inferring Your Secrets from Android Public Resources"
Soteris Demetriou, Dongjing He, Muhammad Naveed, Carl A. Gunter, Klara Nahrstedt, ... -- CCS 2013
"Impact of Integrity Attacks on Real-Time Pricing in Smart Grids"
Zbigniew T. Kalbarczyk, ... -- CCS 2013
"Screenmilker: How to Milk Your Android Screen for Secrets"
Chia-Chi Lin, Hongyang Li, ... -- NDSS 2014
"AccelPrint: Imperfections of Accelerometers Make Smartphones Trackable"
Sanorita Dey, Nirupam Roy, Romit Roy Choudhury, ... -- NDSS 2014
"Inside Job: Understanding and Mitigating the Threat of External Device Mis-Binding on Android"
Muhammad Naveed, Soteris Demetriou, Carl A. Gunter, ... -- NDSS 2014
"The Tangled Web of Password Reuse"
Anupam Das, Matthew Caesar, Nikita Borisov, ... -- NDSS 2014
"KCoFI: Complete Control-Flow Integrity for Commodity Operating Systems"
John Criswell, Nathan Dautenhahn, Vikram Adve, ... -- Oakland 2014
"The Peril of Fragmentation: Security Hazards in Android Device Driver Customizations"
Muhammad Naveed, ... -- Oakland 2014
"Dynamic Searchable Encryption via Blind Storage"
Muhammad Naveed, Manoj Prabhakaran, Carl A. Gunter, ... -- Oakland 2014
"Controlled Functional Encryption"
Muhammad Naveed, Shashank Agrawal, Manoj Prabhakaran, Carl A. Gunter, ... -- CCS 2014
"Mayhem in the Push Clouds: Understanding and Mitigating Security Hazards in Mobile Push-Messaging Services"
Muhammad Naveed, ... -- CCS 2014
"Do You Hear What I Hear? Fingerprinting Smart Devices Through Embedded Acoustic Components"
Anupam Das, Nikita Borisov, Matthew Caesar, ... -- CCS 2014
"Decide Now or Decide Later? Quantifying the Tradeoff between Prospective and Retrospective Access Decisions"
Carl A. Gunter, ... -- CCS 2014
"Mechanized Network Origin and Path Authenticity Proofs"
Yih-Chun Hu, ... -- CCS 2014
"What's in Your Dongle and Bank Account's Mandatory and Discretionary Protection of Android External Resources"
Soteris Demetriou, Bloomington, Muhammad Naveed, Carl A. Gunter, ... -- NDSS 2015
"Leave Me Alone: App-level Protection Against Runtime Information Gathering on Android"
Muhammad Naveed, ... -- Oakland 2015
"Practicing Oblivious Access on Cloud Storage: the Gap, the Fallacy and the New Way Forward"
Vincent Bindschaedler, Muhammad Naveed, ... -- CCS 2015
"Inference Attacks against Property-Preserving Encrypted Databases"
Muhammad Naveed, ... -- CCS 2015
"A Search Engine Backed by Internet-Wide Scanning"
Michael Bailey, ... -- CCS 2015
"Flexible and Elastic DDoS Defense using Bohatei"
Michael Bailey, ... -- Usenix 2015
"Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents"
Michael Bailey, ... -- Usenix 2015
"Don't Forget to Lock the Back Door! A Characterization of IPv6 Network Security Policy"
Michael Bailey, ... -- NDSS 2016
"Tracking Mobile Web Users Through Motion Sensors: Attacks and Defenses"
Anupam Das, Nikita Borisov, Matthew Caesar, ... -- NDSS 2016
"Free for All! Assessing User Data Exposure to Advertising Libraries on Android"
Soteris Demetriou, Whitney Merrill, Wei Yang, Aston Zhang, Carl A. Gunter, ... -- NDSS 2016
"Synthesizing Plausible Privacy-Preserving Location Traces"
Vincent Bindschaedler, ... -- Oakland 2016
"Users Really Do Plug in USB Drives They Find"
Matthew Tischer, Sam Foster, Sunny Duan, Alec Mori, Michael Bailey, ... -- Oakland 2016
"MiddlePolice: Toward Enforcing Destination-Defined Policies in the Middle of the Internet"
Zhuotao Liu, Yih-Chun Hu, Michael Bailey, ... -- CCS 2016
"Draco: A System for Uniform and Fine-grained Access Control for Web Code on Android"
Guliz Seray Tuncay, Soteris Demetriou, Carl A. Gunter, ... -- CCS 2016
"Leave Your Phone at the Door: Side Channels that Reveal Factory Floor Secrets"
Avesta Hojjati, Katarina Struckmann, Anku Adhikari, Thi Ngoc Tho Nguyen, Edward J. Chou, Carl A. Gunter, Marianne Winslett, William P. King, ... -- CCS 2016
"ProvUSB: Block-level Provenance-Based Data Protection for USB Storage Devices"
Adam Bates, ... -- CCS 2016
"You've Got Vulnerability: Exploring Effective Vulnerability Notifications"
Michael Bailey, ... -- Usenix 2016
"The Security Impact of HTTPS Interception"
Zane Ma, Michael Bailey, ... -- NDSS 2017
"HOP: Hardware makes Obfuscation Practical"
Christopher W. Fletcher, ... -- NDSS 2017
"Leakage-Abuse Attacks on Order-Revealing Encryption"
Vincent Bindschaedler, ... -- Oakland 2017
"Side-Channel Attacks on Shared Search Indexes"
Vincent Bindschaedler, ... -- Oakland 2017
"Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX"
Vincent Bindschaedler, Carl A. Gunter, ... -- CCS 2017
"Understanding the Mirai Botnet"
Michael Bailey, Deepak Kumar, Zane Ma, Joshua Mason, Yi Zhou, ... -- Usenix 2017
"Fear and Logging in the Internet of Things."
Qi Wang, Wajih Ul Hassan, Adam Bates, Carl A. Gunter, ... -- NDSS 2018
"ZeroTrace : Oblivious Memory Primitives from Intel SGX."
Christopher W. Fletcher, ... -- NDSS 2018
"Towards Scalable Cluster Auditing through Grammatical Inference over Provenance Graphs."
Wajih Ul Hassan, Nuraini Aguse, Adam Bates, ... -- NDSS 2018
"Resolving the Predicament of Android Custom Permissions."
Guliz Seray Tuncay, Soteris Demetriou, Karan Ganju, Carl A. Gunter, ... -- NDSS 2018
"A Tale of Two Studies: The Best and Worst of YubiKey Usability"
Joshua Reynolds, ... -- Oakland 2018
"SoK: Plug & Pray Today - Understanding USB Insecurity in Versions 1 through C"
Deepak Kumar, Michael Bailey, Adam Bates, ... -- Oakland 2018
"Surveylance: Automatically Detecting Online Survey Scams"
Amin Kharraz, ... -- Oakland 2018
"Tracking Certificate Misissuance in the Wild"
Deepak Kumar, Zhengping Wang, Matthew Hyder, Joseph Dickinson, Joshua Mason, Michael Bailey, ... -- Oakland 2018
"Cross-App Poisoning in Software-Defined Networking"
Benjamin E. Ujcich, Qi Wang, Adam Bates, William H. Sanders, ... -- CCS 2018
"Runtime Analysis of Whole-System Provenance"
Adam Bates, ... -- CCS 2018
"Property Inference Attacks on Deep Neural Networks using Permutation Invariant Representations"
Karan Ganju, Qi Wang, Wei Yang, Carl A. Gunter, Nikita Borisov, ... -- CCS 2018
"Web's Sixth Sense: A Study of Scripts Accessing Smartphone Sensors"
Nikita Borisov, ... -- CCS 2018
"Skill Squatting Attacks on Amazon Alexa"
Deepak Kumar, Riccardo Paccagnella, Paul Murley, Eric Hennenfent, Joshua Mason, Adam Bates, Michael Bailey, ... -- Usenix 2018
"CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition"
Yunhui Long, Carl A. Gunter, ... -- Usenix 2018
"BurnBox: Self-Revocable Encryption in a World Of Compelled Access"
Muhammad Haris Mughees, ... -- Usenix 2018
"Analysis of Privacy Protections in Fitness Tracking Social Networks -or- You can run, but can you hide?"
Wajih Ul Hassan, Saad Hussain, Adam Bates, ... -- Usenix 2018
"From Patching Delays to Infection Symptoms: Using Risk Profiles for an Early Discovery of Vulnerabilities Exploited in the Wild"
Bo Li, ... -- Usenix 2018
"Erays: Reverse Engineering Ethereum's Opaque Smart Contracts"
Yi Zhou, Deepak Kumar, Surya Bakshi, Joshua Mason, Andrew Miller, Michael Bailey, ... -- Usenix 2018
"DelegaTEE: Brokered Delegation Using Trusted Execution Environments"
Andrew Miller, ... -- Usenix 2018
"Data Oblivious ISA Extensions for Side Channel-Resistant and High Performance Computing"
Jiyong Yu, Lucas Hsiung, Christopher W. Fletcher, ... -- NDSS 2019
"NoDoze: Combatting Threat Alert Fatigue with Automated Provenance Triage"
Wajih Ul Hassan, Adam Bates, ... -- NDSS 2019
"Attack Directories, Not Caches: Side Channel Attacks in a Non-Inclusive World"
Mengjia Yan, Read Sprabery, Bhargava Gopireddy, Christopher W. Fletcher, Roy H. Campbell, Josep Torrellas, ... -- Oakland 2019
"Towards Automated Safety Vetting of PLC Code in Real-World Plants"
Chien-Ying Chen, Bin-Chou Kao, Sibin Mohan, ... -- Oakland 2019
"Charting the Attack Surface of Trigger-Action IoT Platforms"
Qi Wang, Pubali Datta, Si Liu, Carl A. Gunter, Adam Bates, ... -- CCS 2019
"Conjure: Summoning Proxies from Unused Address Space"
Sze Chuen Tan, Nikita Borisov, ... -- CCS 2019
"DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps"
Zhuotao Liu, ... -- CCS 2019
"HoneyBadgerMPC and AsynchroMix: Practical Asynchronous MPC and its Application to Anonymous Communication"
Thomas Yurek, Samarth Kulshreshtha, Rahul Govind, Andrew Miller, ... -- CCS 2019
"HyperService: Interoperability and Programmability across Heterogeneous Blockchains"
Zhuotao Liu, Yih-Chun Hu, ... -- CCS 2019
"Prism: Deconstructing the Blockchain to Approach Physical Limits"
Pramod Viswanath, ... -- CCS 2019
"Security Certification in Payment Card Industry: Testbeds, Measurements, and Recommendations"
Gang Wang, ... -- CCS 2019
"Towards Continuous Access Control Validation and Forensics"
Tianyin Xu, ... -- CCS 2019
"Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features"
Bo Li, ... -- Usenix 2019
"Please Pay Inside: Evaluating Bluetooth-based Detection of Gas Pump Skimmers"
Kirill Levchenko, ... -- Usenix 2019
"PolicyLint: Investigating Internal Privacy Policy Contradictions on Google Play"
Wenyu Wang, Tao Xie, ... -- Usenix 2019
"Reading the Tea leaves: A Comparative Analysis of Threat Intelligence"
Kirill Levchenko, ... -- Usenix 2019
"All Things Considered: An Analysis of IoT Devices on Home Networks"
Deepak Kumar, ... -- Usenix 2019
"Automated Discovery of Cross-Plane Event-Based Vulnerabilities in Software-Defined Networking"
Benjamin E. Ujcich, Adam Bates, William H. Sanders, ... -- NDSS 2020
"Custos: Practical Tamper-Evident Auditing of Operating Systems Using Trusted Execution"
Riccardo Paccagnella, Pubali Datta, Wajih Ul Hassan, Adam Bates, Christopher W. Fletcher, Andrew Miller, ... -- NDSS 2020
"DefRec: Establishing Physical Function Virtualization to Disrupt Reconnaissance of Power Grids’ Cyber-Physical Infrastructures"
Yih-Chun Hu, ... -- NDSS 2020
"OmegaLog: High-Fidelity Attack Investigation via Transparent Multi-layer Log Analysis"
Wajih Ul Hassan, Mohammad A. Noureddine, Pubali Datta, Adam Bates, ... -- NDSS 2020
"Unicorn: Runtime Provenance-Based Detector for Advanced Persistent Threats"
Adam Bates, ... -- NDSS 2020
"You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis"
Qi Wang, Wajih Ul Hassan, Kexuan Zou, Carl A. Gunter, ... -- NDSS 2020
"Flash Boys 2.0: Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability"
Yunqi Li, ... -- Oakland 2020
"Leveraging EM Side-Channel Information to Detect Rowhammer Attacks"
Bo Li, ... -- Oakland 2020
"Sync HotStuff: Simple and Practical Synchronous State Machine Replication"
Ling Ren, ... -- Oakland 2020
"Tactical Provenance Analysis for Endpoint Detection and Response Systems"
Wajih Ul Hassan, Adam Bates, ... -- Oakland 2020
"Throwing Darts in the Dark? Detecting Bots with Limited Data using Neural Data Augmentation"
Steve T.K. Jan, Qingying Hao, Gang Wang, ... -- Oakland 2020
"Gotta Catch'Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks"
Bo Li, ... -- CCS 2020
"Logging to the Danger Zone: Race Condition Attacks and Defenses on System Audit Frameworks"
Riccardo Paccagnella, Adam Bates, ... -- CCS 2020
"On the Optimality of Optimistic Responsiveness"
Ling Ren, ... -- CCS 2020
"Everything is a Race and Nakamoto Always Wins"
Pramod Viswanath, Xuechao Wang, ... -- CCS 2020
"Empirical Measurement of Systemic 2FA Usability"
Joshua Reynolds, Joseph Barnes, Taylor Judd, Joshua Mason, Michael Bailey, ... -- Usenix 2020
"See No Evil: Phishing for Permissions with False Transparency"
Guliz Seray Tuncay, Jingyu Qian, Carl A. Gunter, ... -- Usenix 2020
"Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN Architectures"
Mengjia Yan, Christopher W. Fletcher, Josep Torrellas, ... -- Usenix 2020
"Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines"
Limin Yang, Gang Wang, ... -- Usenix 2020
"DOVE: A Data-Oblivious Virtual Environment"
Hyun Bin Lee, Christopher W. Fletcher, Carl A. Gunter, ... -- NDSS 2021
"FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data"
Gang Wang, ... -- NDSS 2021
"SpecTaint: Speculative Taint Analysis for Discovering Spectre Gadgets"
Mengjia Yan, ... -- NDSS 2021
"CanDID: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance, and Accountability"
Nerla Jean-Louis, Andrew Miller, ... -- Oakland 2021
"Detecting AI Trojans Using Meta Neural Analysis"
Xiaojun Xu, Qi Wang, Huichen Li, Nikita Borisov, Carl A. Gunter, Bo Li, ... -- Oakland 2021
"Invisible for both Camera and LiDAR: Security of Multi-Sensor Fusion based Perception in Autonomous Driving Under Physical-World Attacks"
Bo Li, ... -- Oakland 2021
"Self-Supervised Euphemism Detection and Identification for Content Moderation"
Wanzheng Zhu, Suma Bhat, ... -- Oakland 2021
"SoK: Hate, Harassment, and the Changing Landscape of Online Abuse"
Deepak Kumar, Michael Bailey, ... -- Oakland 2021
"Multi-Threshold Byzantine Fault Tolerance"
Ling Ren, ... -- CCS 2021
"It's Not What It Looks Like: Manipulating Perceptual Hashing based Applications"
Qingying Hao, Licheng Luo, Steve TK Jan, Gang Wang, ... -- CCS 2021
"BFT Protocol Forensics"
Peiyao Sheng, Gerui Wang, Pramod Viswanath, ... -- CCS 2021
"Securing Parallel-chain Protocols under Variable Mining Power"
Xuechao Wang, Pramod Viswanath, ... -- CCS 2021
"DataLens: Scalable Privacy Preserving Training via Gradient Compression and Aggregation"
Boxin Wang, Fan Wu, Yunhui Long, Bo Li, ... -- CCS 2021
"TSS: Transformation-Specific Smoothing for Robustness Certification"
Linyi Li, Xiaojun Xu, Bo Li, ... -- CCS 2021
"Validating the Integrity of Audit Logs Against Execution Repartitioning Attacks"
Mohammad Noureddine, Wajih Ul Hassan, Adam Bates, ... -- CCS 2021
"Indistinguishability Prevents Scheduler Side-Channels in Real-Time Systems"
Chien-Ying Chen, Debopam Sanyal, Sibin Mohan, ... -- CCS 2021
"Asynchronous Data Replication Protocol and its Applications"
Sourav Das, Zhuolun Xiang, Ling Ren, ... -- CCS 2021
"OnionPIR: Response Efficient Single-Server PIR"
Muhammad Haris Mughees, Ling Ren, ... -- CCS 2021
"Jetset: Targeted Firmware Rehosting for Embedded Systems"
Maxwell Bland, YiFei Zhu, Joshua Mason, Kirill Levchenko, ... -- Usenix 2021
"Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical"
Riccardo Paccagnella, Licheng Luo, Christopher W. Fletcher, ... -- Usenix 2021
"Double-Cross Attacks: Subverting Active Learning Systems"
Jose Rodrigo Sanchez Vicarte, Gang Wang, Christopher W. Fletcher, ... -- Usenix 2021
"CADE: Detecting and Explaining Concept Drift Samples for Security Applications"
Limin Yang, Qingying Hao, Gang Wang, ... -- Usenix 2021
"Causal Analysis for Software-Defined Networking Attacks"
Adam Bates, ... -- Usenix 2021
"Assessing Browser-level Defense against IDN-based Phishing"
Steve T.K. Jan, Yang Wang, Gang Wang, ... -- Usenix 2021
"Stars Can Tell: A Robust Method to Defend against GPS Spoofing Attacks using Off-the-shelf Chipset"
Gang Wang, ... -- Usenix 2021
"What's in a Name? Exploring CA Certificate Control"
Zane Ma, Joshua Mason, Michael Bailey, ... -- Usenix 2021
"Forensic Analysis of Configuration-based Attacks"
Muhammad Adil Inam, Wajih Ul Hassan, Adam Bates, Tianyin Xu, ... -- NDSS 2022
"An In-depth Analysis of Duplicated Linux Kernel Bug Reports"
Gang Wang, ... -- NDSS 2022
"SynthCT: Towards Portable Constant-Time Code"
Sushant Dinesh, Grant Garrett-Grossman, Christopher W. Fletcher, ... -- NDSS 2022
"HeadStart: Efficiently Verifiable and Low-Latency Participatory Randomness Generation at Scale"
Yih-Chun Hu, ... -- NDSS 2022
"hbACSS: How to Robustly Share Many Secrets"
Thomas Yurek, Licheng Luo, Andrew Miller, ... -- NDSS 2022
"Augury: Using Data Memory-Dependent Prefetchers to Leak Data at Rest"
Jose Rodrigo Sanchez Vicarte, Riccardo Paccagnella, Grant Garrett-Grossman, Chris Fletcher, ... -- Oakland 2022
"Copy, Right? A Testing Framework for Copyright Protection of Deep Learning Models"
Bo Li, ... -- Oakland 2022
"LinkTeller: Recovering Private Edges from Graph Neural Networks via Influence Analysis"
Fan Wu, Yunhui Long, Bo Li, ... -- Oakland 2022
"Practical Asynchronous Distributed Key Generation"
Sourav Das, Tom Yurek, Zhuolun Xiang, Andrew Miller, Ling Ren, ... -- Oakland 2022
"SPURT: Scalable Distributed Randomness Beacon with Transparent Setup"
Sourav Das, Vinith Krishnan, Irene Isaac, Ling Ren, ... -- Oakland 2022
"ShadeWatcher: Recommendation-guided Cyber Threat Analysis using System Audit Records"
Yinfang Chen, ... -- Oakland 2022
"Constant Latency in Sleepy Consensus"
Atsuki Momose, Ling Ren, ... -- CCS 2022
"Hecate: Lifting and Shifting On-Premises Workloads to an Untrusted Cloud"
Hsuan-Chi Kuo, ... -- CCS 2022
"Minotaur: Multi-Resource Blockchain Consensus"
Xuechao Wang, ... -- CCS 2022
"Practical Settlement Bounds for Proof-of-Work Blockchains"
Ling Ren, ... -- CCS 2022
"Secret-Shared Joins with Multiplicity from Aggregation Trees"
Sourav Das, ... -- CCS 2022
"DeepPhish: Understanding User Trust Towards Artificially Generated Profiles in Online Social Networks"
Jaron Mink, Licheng Luo, Nata M. Barbosa, Yang Wang, Gang Wang, ... -- Usenix 2022
"ALASTOR: Reconstructing the Provenance of Serverless Intrusions"
Pubali Datta, Muhammad Adil Inam, Adam Bates, ... -- Usenix 2022
"Measurement by Proxy: On the Accuracy of Online Marketplace Measurements"
Kyle Soska, ... -- Usenix 2022
"Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86"
Riccardo Paccagnella, Elizabeth Tang He, Christopher W. Fletcher, ... -- Usenix 2022
"Binoculars: Contention-Based Side-Channel Attacks Exploiting the Page Walker"
Zirui Neil Zhao, Christopher W. Fletcher, Josep Torrellas, ... -- Usenix 2022
"Don't Mesh Around: Side-Channel Attacks and Mitigations on Mesh Interconnects"
Riccardo Paccagnella, ... -- Usenix 2022