University of Illinois, Urbana Champaign

General Info

Rank: #6 Worldwide
#6 in US
Papers: 190
Number of Researchers: 178
APA
(average papers per authors):
1.1
Country: USA

Activity Map

Contributors

  • Nikita Borisov (25 papers)
  • Carl A. Gunter (22 papers)
  • Adam Bates (20 papers)
  • Michael Bailey (16 papers)
  • Christopher W. Fletcher (12 papers)
  • Gang Wang (11 papers)
  • Muhammad Naveed (10 papers)
  • Wajih Ul Hassan (10 papers)
  • Bo Li (10 papers)
  • Marianne Winslett (9 papers)
  • Prateek Mittal (9 papers)
  • Ling Ren (9 papers)
  • Matthew Caesar (7 papers)
  • Samuel T. King (7 papers)
  • Riccardo Paccagnella (7 papers)
  • Andrew Miller (7 papers)
  • Deepak Kumar (7 papers)
  • Joshua Mason (7 papers)
  • Soteris Demetriou (6 papers)
  • Qi Wang (6 papers)
  • Amir Houmansadr (5 papers)
  • Yih-Chun Hu (5 papers)
  • Vincent Bindschaedler (5 papers)
  • Ting Yu (4 papers)
  • Pubali Datta (4 papers)
  • Licheng Luo (4 papers)
  • Roy H. Campbell (4 papers)
  • Sourav Das (4 papers)
  • Pramod Viswanath (4 papers)
  • Nathan Dautenhahn (3 papers)
  • Qiyan Wang (3 papers)
  • Anupam Das (3 papers)
  • Zane Ma (3 papers)
  • Guliz Seray Tuncay (3 papers)
  • Mengjia Yan (3 papers)
  • Ellick Chan (3 papers)
  • Sruthi Bandhakavi (3 papers)
  • Josep Torrellas (3 papers)
  • Qingying Hao (3 papers)
  • Yunhui Long (3 papers)
  • Madhusudan Parthasarathy (3 papers)
  • Zhuotao Liu (3 papers)
  • Xuechao Wang (3 papers)
  • Kirill Levchenko (3 papers)
  • Shuo Chen (2 papers)
  • Negar Kiyavash (2 papers)
  • Wei Yang (2 papers)
  • Karan Ganju (2 papers)
  • Benjamin E. Ujcich (2 papers)
  • William H. Sanders (2 papers)
  • Muhammad Adil Inam (2 papers)
  • Tianyin Xu (2 papers)
  • Grant Garrett-Grossman (2 papers)
  • Thomas Yurek (2 papers)
  • Charles Zhang (2 papers)
  • Jeffrey Carlyle (2 papers)
  • Francis M. David (2 papers)
  • Chris Grier (2 papers)
  • Shuo Tang (2 papers)
  • Matthew Hicks (2 papers)
  • John Criswell (2 papers)
  • Vikram Adve (2 papers)
  • Manoj Prabhakaran (2 papers)
  • Joshua Reynolds (2 papers)
  • Chien-Ying Chen (2 papers)
  • Sibin Mohan (2 papers)
  • Steve T.K. Jan (2 papers)
  • Xiaojun Xu (2 papers)
  • Jose Rodrigo Sanchez Vicarte (2 papers)
  • Fan Wu (2 papers)
  • Zhuolun Xiang (2 papers)
  • Giang T. K. Nguyen (2 papers)
  • Chi-Yao Hong (2 papers)
  • Muhammad Haris Mughees (2 papers)
  • Yi Zhou (2 papers)
  • Limin Yang (2 papers)
  • Yang Wang (2 papers)
  • Robin Snader (1 papers)
  • Omid Fatemieh (1 papers)
  • Ali Farhadi (1 papers)
  • Hui Xue (1 papers)
  • Thomas Riedl (1 papers)
  • Andrew Singer (1 papers)
  • Chia-Chi Lin (1 papers)
  • Hongyang Li (1 papers)
  • Sanorita Dey (1 papers)
  • Nirupam Roy (1 papers)
  • Romit Roy Choudhury (1 papers)
  • Bloomington (1 papers)
  • Whitney Merrill (1 papers)
  • Aston Zhang (1 papers)
  • Nuraini Aguse (1 papers)
  • Jiyong Yu (1 papers)
  • Lucas Hsiung (1 papers)
  • Mohammad A. Noureddine (1 papers)
  • Kexuan Zou (1 papers)
  • Hyun Bin Lee (1 papers)
  • Sushant Dinesh (1 papers)
  • Jose Meseguer (1 papers)
  • Ralf Sasse (1 papers)
  • Murph Finnicum (1 papers)
  • Matthew Tischer (1 papers)
  • Sam Foster (1 papers)
  • Sunny Duan (1 papers)
  • Alec Mori (1 papers)
  • Amin Kharraz (1 papers)
  • Zhengping Wang (1 papers)
  • Matthew Hyder (1 papers)
  • Joseph Dickinson (1 papers)
  • Read Sprabery (1 papers)
  • Bhargava Gopireddy (1 papers)
  • Bin-Chou Kao (1 papers)
  • Yunqi Li (1 papers)
  • Nerla Jean-Louis (1 papers)
  • Huichen Li (1 papers)
  • Wanzheng Zhu (1 papers)
  • Suma Bhat (1 papers)
  • Chris Fletcher (1 papers)
  • Tom Yurek (1 papers)
  • Vinith Krishnan (1 papers)
  • Irene Isaac (1 papers)
  • Yinfang Chen (1 papers)
  • Xiaosong Ma (1 papers)
  • Apu Kapadia (1 papers)
  • Geetanjali Sampemane (1 papers)
  • David M. Nicol (1 papers)
  • Adam J. Lee (1 papers)
  • Reza Farivar (1 papers)
  • Lars E. Olson (1 papers)
  • Kurt Thomas (1 papers)
  • Ahmed Khurshid (1 papers)
  • Joshua Juen (1 papers)
  • Xun Gong (1 papers)
  • Dongjing He (1 papers)
  • Klara Nahrstedt (1 papers)
  • Zbigniew T. Kalbarczyk (1 papers)
  • Shashank Agrawal (1 papers)
  • Avesta Hojjati (1 papers)
  • Katarina Struckmann (1 papers)
  • Anku Adhikari (1 papers)
  • Thi Ngoc Tho Nguyen (1 papers)
  • Edward J. Chou (1 papers)
  • William P. King (1 papers)
  • Si Liu (1 papers)
  • Sze Chuen Tan (1 papers)
  • Samarth Kulshreshtha (1 papers)
  • Rahul Govind (1 papers)
  • Steve TK Jan (1 papers)
  • Peiyao Sheng (1 papers)
  • Gerui Wang (1 papers)
  • Boxin Wang (1 papers)
  • Linyi Li (1 papers)
  • Mohammad Noureddine (1 papers)
  • Debopam Sanyal (1 papers)
  • Atsuki Momose (1 papers)
  • Hsuan-Chi Kuo (1 papers)
  • Parisa Tabriz (1 papers)
  • Lin Tan (1 papers)
  • Xiao Ma (1 papers)
  • Weiwei Xiong (1 papers)
  • Yuanyuan Zhou (1 papers)
  • Shishir Nagaraja (1 papers)
  • Paul Murley (1 papers)
  • Eric Hennenfent (1 papers)
  • Saad Hussain (1 papers)
  • Surya Bakshi (1 papers)
  • Wenyu Wang (1 papers)
  • Tao Xie (1 papers)
  • Joseph Barnes (1 papers)
  • Taylor Judd (1 papers)
  • Jingyu Qian (1 papers)
  • Maxwell Bland (1 papers)
  • YiFei Zhu (1 papers)
  • Jaron Mink (1 papers)
  • Nata M. Barbosa (1 papers)
  • Kyle Soska (1 papers)
  • Elizabeth Tang He (1 papers)
  • Zirui Neil Zhao (1 papers)

Papers

"PRUNES: An Efficient and Complete Strategy for Automated Trust Negotiation over the Internet"

Ting Yu, Xiaosong Ma, Marianne Winslett, ... -- CCS 2000

"Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation"

Marianne Winslett, Ting Yu, ... -- NDSS 2001

"Interoperable strategies in automated trust negotiation"

Ting Yu, Marianne Winslett, ... -- CCS 2001

"A Unified Scheme for Resource Protection in Automated Trust Negotiation"

Ting Yu, Marianne Winslett, ... -- Oakland 2003

"KNOW Why Your Access was Denied: Regulating Feedback for Usable Security"

Apu Kapadia, Geetanjali Sampemane, Roy H. Campbell, ... -- CCS 2004

"A Black-Box Tracing Technique to Identify Causes of Least-Privilege Incompatibilities"

Shuo Chen, ... -- NDSS 2005

"Aggregated Path Authentication for Efficient BGP Security"

David M. Nicol, ... -- CCS 2005

"PeerAccess: A Logic for Distributed Authorization"

Marianne Winslett, Charles Zhang, ... -- CCS 2005

"Non-Control-Data Attacks Are Realistic Threats"

Shuo Chen, ... -- Usenix 2005

"Safety and Consistency in Policy-Based Authorization Systems"

Adam J. Lee, Marianne Winslett, ... -- CCS 2006

"Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting"

Parisa Tabriz, ... -- Usenix 2006

"Generic Application-Level Protocol Analyzer and its Language"

Nikita Borisov, ... -- NDSS 2007

"On the Safety and Efficiency of Firewall Policy Deployment"

Charles Zhang, Marianne Winslett, Carl A. Gunter, ... -- Oakland 2007

"A Systematic Approach to Uncover Security Flaws in GUI Logic"

Jose Meseguer, Ralf Sasse, ... -- Oakland 2007

"CANDID: Preventing SQL Injection Attacks Using Dynamic Candidate Evaluations"

Sruthi Bandhakavi, Madhusudan Parthasarathy, ... -- CCS 2007

"Denial of Service or Denial of Security? How Attacks on Reliability can Compromise Anonymity"

Nikita Borisov, Prateek Mittal, ... -- CCS 2007

"A Tune-up for Tor: Improving Security and Performance in the Tor Network"

Robin Snader, Nikita Borisov, ... -- NDSS 2008

"Cloaker: Hardware Supported Rootkit Concealment"

Ellick Chan, Jeffrey Carlyle, Francis M. David, Roy H. Campbell, ... -- Oakland 2008

"Secure Web Browsing with the OP Web Browser"

Samuel T. King, Chris Grier, Shuo Tang, ... -- Oakland 2008

"Information Leaks in Structured Peer-to-peer Anonymous Communication Systems"

Prateek Mittal, Nikita Borisov, ... -- CCS 2008

"BootJacker: Compromising Computers using Forced Restarts"

Ellick Chan, Jeffrey Carlyle, Francis M. David, Reza Farivar, Roy H. Campbell, ... -- CCS 2008

"A Framework for Reflective Database Access Control Policies"

Lars E. Olson, Carl A. Gunter, Madhusudan Parthasarathy, ... -- CCS 2008

"Multi-flow Attacks Against Network Flow Watermarking Schemes"

Nikita Borisov, Amir Houmansadr, Negar Kiyavash, ... -- Usenix 2008

"AutoISES: Automatically Inferring Security Specification and Detecting Violations"

Lin Tan, Xiao Ma, Weiwei Xiong, Yuanyuan Zhou, ... -- Usenix 2008

"SybilInfer: Detecting Sybil Nodes using Social Networks"

Prateek Mittal, ... -- NDSS 2009

"RAINBOW: A Robust And Invisible Non-Blind Watermark for Network Flows"

Amir Houmansadr, Negar Kiyavash, Nikita Borisov, ... -- NDSS 2009

"ShadowWalker: peer-to-peer anonymous communication using redundant structured topologies"

Prateek Mittal, Nikita Borisov, ... -- CCS 2009

"Memory Safety for Low-Level Software/Hardware Interactions"

John Criswell, Vikram Adve, ... -- Usenix 2009

"The Multi-Principal OS Construction of the Gazelle Web Browser"

Samuel T. King, Chris Grier, ... -- Usenix 2009

"Towards Static Flow-Based Declassification for Legacy and Untrusted Programs"

Sruthi Bandhakavi, ... -- Oakland 2010

"Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically"

Matthew Hicks, Murph Finnicum, Samuel T. King, ... -- Oakland 2010

"@spam: the underground on 140 characters or less"

Kurt Thomas, ... -- CCS 2010

"In search of an anonymous and secure lookup: attacks on structured peer-to-peer anonymous communication systems"

Qiyan Wang, Prateek Mittal, Nikita Borisov, ... -- CCS 2010

"BotGrep: Finding P2P Bots with Structured Graph Analysis"

Shishir Nagaraja, Prateek Mittal, Chi-Yao Hong, Matthew Caesar, Nikita Borisov, ... -- Usenix 2010

"VEX: Vetting Browser Extensions for Security Vulnerabilities"

Sruthi Bandhakavi, Samuel T. King, Madhusudan Parthasarathy, Marianne Winslett, ... -- Usenix 2010

"Using Classification to Protect the Integrity of Spectrum Measurements in White Space Networks"

Omid Fatemieh, Ali Farhadi, Carl A. Gunter, ... -- NDSS 2011

"SWIRL: A Scalable Watermark to Detect Correlated Network Flows"

Amir Houmansadr, Nikita Borisov, ... -- NDSS 2011

"Defeating UCI: Building Stealthy and Malicious Hardware"

Matthew Hicks, Samuel T. King, ... -- Oakland 2011

"Cirripede: Circumvention Infrastructure using Router Redirection with Plausible Deniability"

Amir Houmansadr, Giang T. K. Nguyen, Matthew Caesar, Nikita Borisov, ... -- CCS 2011

"Stealthy Traffic Analysis of Low-Latency Anonymous Communication Using Throughput Fingerprinting"

Prateek Mittal, Ahmed Khurshid, Joshua Juen, Matthew Caesar, Nikita Borisov, ... -- CCS 2011

"Fortifying Web-Based Applications Automatically"

Shuo Tang, Nathan Dautenhahn, Samuel T. King, ... -- CCS 2011

"PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval"

Prateek Mittal, Nikita Borisov, ... -- Usenix 2011

"X-Vine: Secure and Pseudonymous Routing in DHTs Using Social Networks"

Prateek Mittal, Matthew Caesar, Nikita Borisov, ... -- NDSS 2012

"Using replicated execution for a more secure and reliable web browser"

Hui Xue, Nathan Dautenhahn, Samuel T. King, ... -- NDSS 2012

"CensorSpoofer: Asymmetric Communication using IP Spoofing for Censorship-Resistant Web Browsing"

Qiyan Wang, Xun Gong, Giang T. K. Nguyen, Amir Houmansadr, Nikita Borisov, ... -- CCS 2012

"Populated IP Addresses -- Classification and Applications"

Chi-Yao Hong, ... -- CCS 2012

"Tracking Rootkit Footprints with a Practical Memory Analysis System"

Ellick Chan, ... -- Usenix 2012

"Pisces: Anonymous Communication Using Social Networks"

Nikita Borisov, ... -- NDSS 2013

"I want my voice to be heard: IP over Voice-over-IP for Unobservable Censorship Circumvention"

Thomas Riedl, Nikita Borisov, Andrew Singer, ... -- NDSS 2013

"rBridge: User Reputation based Tor Bridge Distribution with Privacy Preservation"

Qiyan Wang, Nikita Borisov, ... -- NDSS 2013

"Identity, Location, Disease and More: Inferring Your Secrets from Android Public Resources"

Soteris Demetriou, Dongjing He, Muhammad Naveed, Carl A. Gunter, Klara Nahrstedt, ... -- CCS 2013

"Impact of Integrity Attacks on Real-Time Pricing in Smart Grids"

Zbigniew T. Kalbarczyk, ... -- CCS 2013

"Screenmilker: How to Milk Your Android Screen for Secrets"

Chia-Chi Lin, Hongyang Li, ... -- NDSS 2014

"AccelPrint: Imperfections of Accelerometers Make Smartphones Trackable"

Sanorita Dey, Nirupam Roy, Romit Roy Choudhury, ... -- NDSS 2014

"Inside Job: Understanding and Mitigating the Threat of External Device Mis-Binding on Android"

Muhammad Naveed, Soteris Demetriou, Carl A. Gunter, ... -- NDSS 2014

"The Tangled Web of Password Reuse"

Anupam Das, Matthew Caesar, Nikita Borisov, ... -- NDSS 2014

"KCoFI: Complete Control-Flow Integrity for Commodity Operating Systems"

John Criswell, Nathan Dautenhahn, Vikram Adve, ... -- Oakland 2014

"The Peril of Fragmentation: Security Hazards in Android Device Driver Customizations"

Muhammad Naveed, ... -- Oakland 2014

"Dynamic Searchable Encryption via Blind Storage"

Muhammad Naveed, Manoj Prabhakaran, Carl A. Gunter, ... -- Oakland 2014

"Controlled Functional Encryption"

Muhammad Naveed, Shashank Agrawal, Manoj Prabhakaran, Carl A. Gunter, ... -- CCS 2014

"Mayhem in the Push Clouds: Understanding and Mitigating Security Hazards in Mobile Push-Messaging Services"

Muhammad Naveed, ... -- CCS 2014

"Do You Hear What I Hear? Fingerprinting Smart Devices Through Embedded Acoustic Components"

Anupam Das, Nikita Borisov, Matthew Caesar, ... -- CCS 2014

"Decide Now or Decide Later? Quantifying the Tradeoff between Prospective and Retrospective Access Decisions"

Carl A. Gunter, ... -- CCS 2014

"Mechanized Network Origin and Path Authenticity Proofs"

Yih-Chun Hu, ... -- CCS 2014

"What's in Your Dongle and Bank Account's Mandatory and Discretionary Protection of Android External Resources"

Soteris Demetriou, Bloomington, Muhammad Naveed, Carl A. Gunter, ... -- NDSS 2015

"Leave Me Alone: App-level Protection Against Runtime Information Gathering on Android"

Muhammad Naveed, ... -- Oakland 2015

"Practicing Oblivious Access on Cloud Storage: the Gap, the Fallacy and the New Way Forward"

Vincent Bindschaedler, Muhammad Naveed, ... -- CCS 2015

"Inference Attacks against Property-Preserving Encrypted Databases"

Muhammad Naveed, ... -- CCS 2015

"A Search Engine Backed by Internet-Wide Scanning"

Michael Bailey, ... -- CCS 2015

"Flexible and Elastic DDoS Defense using Bohatei"

Michael Bailey, ... -- Usenix 2015

"Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents"

Michael Bailey, ... -- Usenix 2015

"Don't Forget to Lock the Back Door! A Characterization of IPv6 Network Security Policy"

Michael Bailey, ... -- NDSS 2016

"Tracking Mobile Web Users Through Motion Sensors: Attacks and Defenses"

Anupam Das, Nikita Borisov, Matthew Caesar, ... -- NDSS 2016

"Free for All! Assessing User Data Exposure to Advertising Libraries on Android"

Soteris Demetriou, Whitney Merrill, Wei Yang, Aston Zhang, Carl A. Gunter, ... -- NDSS 2016

"Synthesizing Plausible Privacy-Preserving Location Traces"

Vincent Bindschaedler, ... -- Oakland 2016

"Users Really Do Plug in USB Drives They Find"

Matthew Tischer, Sam Foster, Sunny Duan, Alec Mori, Michael Bailey, ... -- Oakland 2016

"MiddlePolice: Toward Enforcing Destination-Defined Policies in the Middle of the Internet"

Zhuotao Liu, Yih-Chun Hu, Michael Bailey, ... -- CCS 2016

"Draco: A System for Uniform and Fine-grained Access Control for Web Code on Android"

Guliz Seray Tuncay, Soteris Demetriou, Carl A. Gunter, ... -- CCS 2016

"Leave Your Phone at the Door: Side Channels that Reveal Factory Floor Secrets"

Avesta Hojjati, Katarina Struckmann, Anku Adhikari, Thi Ngoc Tho Nguyen, Edward J. Chou, Carl A. Gunter, Marianne Winslett, William P. King, ... -- CCS 2016

"ProvUSB: Block-level Provenance-Based Data Protection for USB Storage Devices"

Adam Bates, ... -- CCS 2016

"You've Got Vulnerability: Exploring Effective Vulnerability Notifications"

Michael Bailey, ... -- Usenix 2016

"The Security Impact of HTTPS Interception"

Zane Ma, Michael Bailey, ... -- NDSS 2017

"HOP: Hardware makes Obfuscation Practical"

Christopher W. Fletcher, ... -- NDSS 2017

"Leakage-Abuse Attacks on Order-Revealing Encryption"

Vincent Bindschaedler, ... -- Oakland 2017

"Side-Channel Attacks on Shared Search Indexes"

Vincent Bindschaedler, ... -- Oakland 2017

"Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX"

Vincent Bindschaedler, Carl A. Gunter, ... -- CCS 2017

"Understanding the Mirai Botnet"

Michael Bailey, Deepak Kumar, Zane Ma, Joshua Mason, Yi Zhou, ... -- Usenix 2017

"Fear and Logging in the Internet of Things."

Qi Wang, Wajih Ul Hassan, Adam Bates, Carl A. Gunter, ... -- NDSS 2018

"ZeroTrace : Oblivious Memory Primitives from Intel SGX."

Christopher W. Fletcher, ... -- NDSS 2018

"Towards Scalable Cluster Auditing through Grammatical Inference over Provenance Graphs."

Wajih Ul Hassan, Nuraini Aguse, Adam Bates, ... -- NDSS 2018

"Resolving the Predicament of Android Custom Permissions."

Guliz Seray Tuncay, Soteris Demetriou, Karan Ganju, Carl A. Gunter, ... -- NDSS 2018

"A Tale of Two Studies: The Best and Worst of YubiKey Usability"

Joshua Reynolds, ... -- Oakland 2018

"SoK: Plug & Pray Today - Understanding USB Insecurity in Versions 1 through C"

Deepak Kumar, Michael Bailey, Adam Bates, ... -- Oakland 2018

"Surveylance: Automatically Detecting Online Survey Scams"

Amin Kharraz, ... -- Oakland 2018

"Tracking Certificate Misissuance in the Wild"

Deepak Kumar, Zhengping Wang, Matthew Hyder, Joseph Dickinson, Joshua Mason, Michael Bailey, ... -- Oakland 2018

"Cross-App Poisoning in Software-Defined Networking"

Benjamin E. Ujcich, Qi Wang, Adam Bates, William H. Sanders, ... -- CCS 2018

"Runtime Analysis of Whole-System Provenance"

Adam Bates, ... -- CCS 2018

"Property Inference Attacks on Deep Neural Networks using Permutation Invariant Representations"

Karan Ganju, Qi Wang, Wei Yang, Carl A. Gunter, Nikita Borisov, ... -- CCS 2018

"Web's Sixth Sense: A Study of Scripts Accessing Smartphone Sensors"

Nikita Borisov, ... -- CCS 2018

"Skill Squatting Attacks on Amazon Alexa"

Deepak Kumar, Riccardo Paccagnella, Paul Murley, Eric Hennenfent, Joshua Mason, Adam Bates, Michael Bailey, ... -- Usenix 2018

"CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition"

Yunhui Long, Carl A. Gunter, ... -- Usenix 2018

"BurnBox: Self-Revocable Encryption in a World Of Compelled Access"

Muhammad Haris Mughees, ... -- Usenix 2018

"Analysis of Privacy Protections in Fitness Tracking Social Networks -or- You can run, but can you hide?"

Wajih Ul Hassan, Saad Hussain, Adam Bates, ... -- Usenix 2018

"From Patching Delays to Infection Symptoms: Using Risk Profiles for an Early Discovery of Vulnerabilities Exploited in the Wild"

Bo Li, ... -- Usenix 2018

"Erays: Reverse Engineering Ethereum's Opaque Smart Contracts"

Yi Zhou, Deepak Kumar, Surya Bakshi, Joshua Mason, Andrew Miller, Michael Bailey, ... -- Usenix 2018

"DelegaTEE: Brokered Delegation Using Trusted Execution Environments"

Andrew Miller, ... -- Usenix 2018

"Data Oblivious ISA Extensions for Side Channel-Resistant and High Performance Computing"

Jiyong Yu, Lucas Hsiung, Christopher W. Fletcher, ... -- NDSS 2019

"NoDoze: Combatting Threat Alert Fatigue with Automated Provenance Triage"

Wajih Ul Hassan, Adam Bates, ... -- NDSS 2019

"Attack Directories, Not Caches: Side Channel Attacks in a Non-Inclusive World"

Mengjia Yan, Read Sprabery, Bhargava Gopireddy, Christopher W. Fletcher, Roy H. Campbell, Josep Torrellas, ... -- Oakland 2019

"Towards Automated Safety Vetting of PLC Code in Real-World Plants"

Chien-Ying Chen, Bin-Chou Kao, Sibin Mohan, ... -- Oakland 2019

"Charting the Attack Surface of Trigger-Action IoT Platforms"

Qi Wang, Pubali Datta, Si Liu, Carl A. Gunter, Adam Bates, ... -- CCS 2019

"Conjure: Summoning Proxies from Unused Address Space"

Sze Chuen Tan, Nikita Borisov, ... -- CCS 2019

"DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps"

Zhuotao Liu, ... -- CCS 2019

"HoneyBadgerMPC and AsynchroMix: Practical Asynchronous MPC and its Application to Anonymous Communication"

Thomas Yurek, Samarth Kulshreshtha, Rahul Govind, Andrew Miller, ... -- CCS 2019

"HyperService: Interoperability and Programmability across Heterogeneous Blockchains"

Zhuotao Liu, Yih-Chun Hu, ... -- CCS 2019

"Prism: Deconstructing the Blockchain to Approach Physical Limits"

Pramod Viswanath, ... -- CCS 2019

"Security Certification in Payment Card Industry: Testbeds, Measurements, and Recommendations"

Gang Wang, ... -- CCS 2019

"Towards Continuous Access Control Validation and Forensics"

Tianyin Xu, ... -- CCS 2019

"Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features"

Bo Li, ... -- Usenix 2019

"Please Pay Inside: Evaluating Bluetooth-based Detection of Gas Pump Skimmers"

Kirill Levchenko, ... -- Usenix 2019

"PolicyLint: Investigating Internal Privacy Policy Contradictions on Google Play"

Wenyu Wang, Tao Xie, ... -- Usenix 2019

"Reading the Tea leaves: A Comparative Analysis of Threat Intelligence"

Kirill Levchenko, ... -- Usenix 2019

"All Things Considered: An Analysis of IoT Devices on Home Networks"

Deepak Kumar, ... -- Usenix 2019

"Automated Discovery of Cross-Plane Event-Based Vulnerabilities in Software-Defined Networking"

Benjamin E. Ujcich, Adam Bates, William H. Sanders, ... -- NDSS 2020

"Custos: Practical Tamper-Evident Auditing of Operating Systems Using Trusted Execution"

Riccardo Paccagnella, Pubali Datta, Wajih Ul Hassan, Adam Bates, Christopher W. Fletcher, Andrew Miller, ... -- NDSS 2020

"DefRec: Establishing Physical Function Virtualization to Disrupt Reconnaissance of Power Grids’ Cyber-Physical Infrastructures"

Yih-Chun Hu, ... -- NDSS 2020

"OmegaLog: High-Fidelity Attack Investigation via Transparent Multi-layer Log Analysis"

Wajih Ul Hassan, Mohammad A. Noureddine, Pubali Datta, Adam Bates, ... -- NDSS 2020

"Unicorn: Runtime Provenance-Based Detector for Advanced Persistent Threats"

Adam Bates, ... -- NDSS 2020

"You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis"

Qi Wang, Wajih Ul Hassan, Kexuan Zou, Carl A. Gunter, ... -- NDSS 2020

"Flash Boys 2.0: Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability"

Yunqi Li, ... -- Oakland 2020

"Leveraging EM Side-Channel Information to Detect Rowhammer Attacks"

Bo Li, ... -- Oakland 2020

"Sync HotStuff: Simple and Practical Synchronous State Machine Replication"

Ling Ren, ... -- Oakland 2020

"Tactical Provenance Analysis for Endpoint Detection and Response Systems"

Wajih Ul Hassan, Adam Bates, ... -- Oakland 2020

"Throwing Darts in the Dark? Detecting Bots with Limited Data using Neural Data Augmentation"

Steve T.K. Jan, Qingying Hao, Gang Wang, ... -- Oakland 2020

"Gotta Catch'Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks"

Bo Li, ... -- CCS 2020

"Logging to the Danger Zone: Race Condition Attacks and Defenses on System Audit Frameworks"

Riccardo Paccagnella, Adam Bates, ... -- CCS 2020

"On the Optimality of Optimistic Responsiveness"

Ling Ren, ... -- CCS 2020

"Everything is a Race and Nakamoto Always Wins"

Pramod Viswanath, Xuechao Wang, ... -- CCS 2020

"Empirical Measurement of Systemic 2FA Usability"

Joshua Reynolds, Joseph Barnes, Taylor Judd, Joshua Mason, Michael Bailey, ... -- Usenix 2020

"See No Evil: Phishing for Permissions with False Transparency"

Guliz Seray Tuncay, Jingyu Qian, Carl A. Gunter, ... -- Usenix 2020

"Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN Architectures"

Mengjia Yan, Christopher W. Fletcher, Josep Torrellas, ... -- Usenix 2020

"Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines"

Limin Yang, Gang Wang, ... -- Usenix 2020

"DOVE: A Data-Oblivious Virtual Environment"

Hyun Bin Lee, Christopher W. Fletcher, Carl A. Gunter, ... -- NDSS 2021

"FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data"

Gang Wang, ... -- NDSS 2021

"SpecTaint: Speculative Taint Analysis for Discovering Spectre Gadgets"

Mengjia Yan, ... -- NDSS 2021

"CanDID: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance, and Accountability"

Nerla Jean-Louis, Andrew Miller, ... -- Oakland 2021

"Detecting AI Trojans Using Meta Neural Analysis"

Xiaojun Xu, Qi Wang, Huichen Li, Nikita Borisov, Carl A. Gunter, Bo Li, ... -- Oakland 2021

"Invisible for both Camera and LiDAR: Security of Multi-Sensor Fusion based Perception in Autonomous Driving Under Physical-World Attacks"

Bo Li, ... -- Oakland 2021

"Self-Supervised Euphemism Detection and Identification for Content Moderation"

Wanzheng Zhu, Suma Bhat, ... -- Oakland 2021

"SoK: Hate, Harassment, and the Changing Landscape of Online Abuse"

Deepak Kumar, Michael Bailey, ... -- Oakland 2021

"Multi-Threshold Byzantine Fault Tolerance"

Ling Ren, ... -- CCS 2021

"It's Not What It Looks Like: Manipulating Perceptual Hashing based Applications"

Qingying Hao, Licheng Luo, Steve TK Jan, Gang Wang, ... -- CCS 2021

"BFT Protocol Forensics"

Peiyao Sheng, Gerui Wang, Pramod Viswanath, ... -- CCS 2021

"Securing Parallel-chain Protocols under Variable Mining Power"

Xuechao Wang, Pramod Viswanath, ... -- CCS 2021

"DataLens: Scalable Privacy Preserving Training via Gradient Compression and Aggregation"

Boxin Wang, Fan Wu, Yunhui Long, Bo Li, ... -- CCS 2021

"TSS: Transformation-Specific Smoothing for Robustness Certification"

Linyi Li, Xiaojun Xu, Bo Li, ... -- CCS 2021

"Validating the Integrity of Audit Logs Against Execution Repartitioning Attacks"

Mohammad Noureddine, Wajih Ul Hassan, Adam Bates, ... -- CCS 2021

"Indistinguishability Prevents Scheduler Side-Channels in Real-Time Systems"

Chien-Ying Chen, Debopam Sanyal, Sibin Mohan, ... -- CCS 2021

"Asynchronous Data Replication Protocol and its Applications"

Sourav Das, Zhuolun Xiang, Ling Ren, ... -- CCS 2021

"OnionPIR: Response Efficient Single-Server PIR"

Muhammad Haris Mughees, Ling Ren, ... -- CCS 2021

"Jetset: Targeted Firmware Rehosting for Embedded Systems"

Maxwell Bland, YiFei Zhu, Joshua Mason, Kirill Levchenko, ... -- Usenix 2021

"Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical"

Riccardo Paccagnella, Licheng Luo, Christopher W. Fletcher, ... -- Usenix 2021

"Double-Cross Attacks: Subverting Active Learning Systems"

Jose Rodrigo Sanchez Vicarte, Gang Wang, Christopher W. Fletcher, ... -- Usenix 2021

"CADE: Detecting and Explaining Concept Drift Samples for Security Applications"

Limin Yang, Qingying Hao, Gang Wang, ... -- Usenix 2021

"Causal Analysis for Software-Defined Networking Attacks"

Adam Bates, ... -- Usenix 2021

"Assessing Browser-level Defense against IDN-based Phishing"

Steve T.K. Jan, Yang Wang, Gang Wang, ... -- Usenix 2021

"Stars Can Tell: A Robust Method to Defend against GPS Spoofing Attacks using Off-the-shelf Chipset"

Gang Wang, ... -- Usenix 2021

"What's in a Name? Exploring CA Certificate Control"

Zane Ma, Joshua Mason, Michael Bailey, ... -- Usenix 2021

"Forensic Analysis of Configuration-based Attacks"

Muhammad Adil Inam, Wajih Ul Hassan, Adam Bates, Tianyin Xu, ... -- NDSS 2022

"An In-depth Analysis of Duplicated Linux Kernel Bug Reports"

Gang Wang, ... -- NDSS 2022

"SynthCT: Towards Portable Constant-Time Code"

Sushant Dinesh, Grant Garrett-Grossman, Christopher W. Fletcher, ... -- NDSS 2022

"HeadStart: Efficiently Verifiable and Low-Latency Participatory Randomness Generation at Scale"

Yih-Chun Hu, ... -- NDSS 2022

"hbACSS: How to Robustly Share Many Secrets"

Thomas Yurek, Licheng Luo, Andrew Miller, ... -- NDSS 2022

"Augury: Using Data Memory-Dependent Prefetchers to Leak Data at Rest"

Jose Rodrigo Sanchez Vicarte, Riccardo Paccagnella, Grant Garrett-Grossman, Chris Fletcher, ... -- Oakland 2022

"Copy, Right? A Testing Framework for Copyright Protection of Deep Learning Models"

Bo Li, ... -- Oakland 2022

"LinkTeller: Recovering Private Edges from Graph Neural Networks via Influence Analysis"

Fan Wu, Yunhui Long, Bo Li, ... -- Oakland 2022

"Practical Asynchronous Distributed Key Generation"

Sourav Das, Tom Yurek, Zhuolun Xiang, Andrew Miller, Ling Ren, ... -- Oakland 2022

"SPURT: Scalable Distributed Randomness Beacon with Transparent Setup"

Sourav Das, Vinith Krishnan, Irene Isaac, Ling Ren, ... -- Oakland 2022

"ShadeWatcher: Recommendation-guided Cyber Threat Analysis using System Audit Records"

Yinfang Chen, ... -- Oakland 2022

"Constant Latency in Sleepy Consensus"

Atsuki Momose, Ling Ren, ... -- CCS 2022

"Hecate: Lifting and Shifting On-Premises Workloads to an Untrusted Cloud"

Hsuan-Chi Kuo, ... -- CCS 2022

"Minotaur: Multi-Resource Blockchain Consensus"

Xuechao Wang, ... -- CCS 2022

"Practical Settlement Bounds for Proof-of-Work Blockchains"

Ling Ren, ... -- CCS 2022

"Secret-Shared Joins with Multiplicity from Aggregation Trees"

Sourav Das, ... -- CCS 2022

"DeepPhish: Understanding User Trust Towards Artificially Generated Profiles in Online Social Networks"

Jaron Mink, Licheng Luo, Nata M. Barbosa, Yang Wang, Gang Wang, ... -- Usenix 2022

"ALASTOR: Reconstructing the Provenance of Serverless Intrusions"

Pubali Datta, Muhammad Adil Inam, Adam Bates, ... -- Usenix 2022

"Measurement by Proxy: On the Accuracy of Online Marketplace Measurements"

Kyle Soska, ... -- Usenix 2022

"Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86"

Riccardo Paccagnella, Elizabeth Tang He, Christopher W. Fletcher, ... -- Usenix 2022

"Binoculars: Contention-Based Side-Channel Attacks Exploiting the Page Walker"

Zirui Neil Zhao, Christopher W. Fletcher, Josep Torrellas, ... -- Usenix 2022

"Don't Mesh Around: Side-Channel Attacks and Mitigations on Mesh Interconnects"

Riccardo Paccagnella, ... -- Usenix 2022