"A Trend Analysis of Exploitations"
Hilary Browne, William A. Arbaugh, ... -- Oakland 2001
"P5: A Protocol for Scalable Anonymous Communication"
Rob Sherwood, Bobby Bhattacharjee, Aravind Srinivasan, ... -- Oakland 2002
"A key-management scheme for distributed sensor networks"
Laurent Eschenauer, Virgil Gligor, ... -- CCS 2002
"Secret Handshakes from Pairing-Based Key Agreements"
Narendar Shankar, ... -- Oakland 2003
"Efficiency improvements for signature schemes with tight security reductions"
Jonathan Katz, Nan Wang, ... -- CCS 2003
"Securing OLAP Data Cubes Against Privacy Breaches"
Virgil Gligor, ... -- Oakland 2004
"Copilot - a Coprocessor-based Kernel Runtime Integrity Monitor"
Nick Petroni, Timothy Fraser, Jesus Molina, William A. Arbaugh, ... -- Usenix 2004
"Distributed Detection of Node Replication Attacks in Sensor Networks"
Virgil Gligor, ... -- Oakland 2005
"Modeling Insider Attacks on Group Key-Exchange Protocols"
Jonathan Katz, Ji Sun Shin, ... -- CCS 2005
"Misbehaving TCP Receivers Can Cause Internet-Wide Congestion Collapse"
Rob Sherwood, Bobby Bhattacharjee, ... -- CCS 2005
"A Framework for the Evaluation of Intrusion Detection Systems"
Alvaro A. Cardenas, Karl Seamon, John S. Baras, ... -- Oakland 2006
"Rule-Based Static Analysis of Network Protocol Implementations"
Octavian Udrea, Cristian Lumezanu, Jeffrey S. Foster, ... -- Usenix 2006
"An Architecture for Specification-Based Detection of Semantic Integrity Violations in Kernel Dynamic Data"
Nick Petroni, Timothy Fraser, William A. Arbaugh, ... -- Usenix 2006
"Automated Detection of Persistent Kernel Control-Flow Attacks"
Nick Petroni, Michael Hicks, ... -- CCS 2007
"A New Privacy-Enhanced Matchmaking Protocol"
Ji Sun Shin, ... -- NDSS 2008
"Fable: A Language for Enforcing User-defined Security Policies"
Michael Hicks, Nikhil Swamy, Brian Corcoran, ... -- Oakland 2008
"Attacking cryptographic schemes based on 'perturbation polynomials'"
Jonathan Katz, ... -- CCS 2009
"Secure text processing with applications to private DNA matching"
Jonathan Katz, Lior Malka, ... -- CCS 2010
"A new framework for efficient password-based authenticated key exchange"
Adam Groce, Jonathan Katz, ... -- CCS 2010
"Symbolic security analysis of ruby-on-rails web applications"
Avik Chaudhuri, Jeffrey S. Foster, ... -- CCS 2010
"Scantegrity II Municipal Election at Takoma Park: The First E2E Binding Governmental Election with Ballot Privacy"
Paul S. Herrnson, ... -- Usenix 2010
"Efficient Privacy-Preserving Biometric Identification"
Jonathan Katz, ... -- NDSS 2011
"VMCrypt - Modular Software Architecture for Scalable Secure Computation"
Jonathan Katz, ... -- CCS 2011
"Faster Secure Two-Party Computation Using Garbled Circuits"
Jonathan Katz, ... -- Usenix 2011
"Private Set Intersection: Are Garbled Circuits Better than Custom Protocols?"
Jonathan Katz, ... -- NDSS 2012
"Quid-Pro-Quo-tocols: Strengthening Semi-Honest Protocols with Dual Execution"
Jonathan Katz, ... -- Oakland 2012
"Deanonymizing Mobility Traces: Using Social Network as a Side-Channel"
Mike Hicks, ... -- CCS 2012
"How Secure are Power Network Signature Based Time Stamps?"
Wei-Hong Chuang, Ravi Garg, Min Wu, ... -- CCS 2012
"Verifiable Data Streaming"
Dominique Schroeder, ... -- CCS 2012
"Secure Two-Party Computation in Sublinear (Amortized) Time"
Jonathan Katz, ... -- CCS 2012
"ObliviStore: High Performance Oblivious Cloud Storage"
Elaine Shi, ... -- Oakland 2013
"Anon-Pass: Practical Anonymous Subscriptions"
Jonathan Katz, ... -- Oakland 2013
"Path ORAM: An Extremely Simple Oblivious RAM Protocol"
Elaine Shi, ... -- CCS 2013
"Practical Dynamic Proofs of Retrievability"
Elaine Shi, Charalampos Papamanthou, ... -- CCS 2013
"Multi-Cloud Oblivious Storage"
Elaine Shi, ... -- CCS 2013
"PHANTOM: Practical Oblivious Computation in a Secure Processor"
Elaine Shi, ... -- CCS 2013
"Practical Dynamic Searchable Encryption with Small Leakage"
Charalampos Papamanthou, Elaine Shi, ... -- NDSS 2014
"Scambaiter: Understanding Targeted Nigerian Scams on Craigslist"
Youngsam Park, Elaine Shi, ... -- NDSS 2014
"PermaCoin: Repurposing Bitcoin Work for Data Preservation"
Andrew Miller, Elaine Shi, Jonathan Katz, ... -- Oakland 2014
"Quantifying Information Flow for Dynamic Secrets"
Piotr Mardziel, Michael Hicks, ... -- Oakland 2014
"Automating Efficient RAM-Model Secure Computation"
Chang Liu, Yan Huang, Elaine Shi, Michael Hicks, Jonathan Katz, ... -- Oakland 2014
"Wysteria: A Programming Language for Generic, Mixed-mode Multiparty Computations"
Aseem Rastogi, Matthew A. Hammer, Michael Hicks, ... -- Oakland 2014
"Oblivious Data Structures"
Xiao Wang, Kartik Nayak, Chang Liu, Elaine Shi, ... -- CCS 2014
"ALITHEIA: Towards Practical Verifiable Graph Processing"
Yupeng Zhang, Charalampos Papamanthou, Jonathan Katz, ... -- CCS 2014
"SCORAM: Oblivious RAM for Secure Computation"
Xiao Wang, Elaine Shi, ... -- CCS 2014
"RevCast: Fast, Private Certificate Revocation over FM Radio"
Dave Levin, Neil Spring, ... -- CCS 2014
"ShadowCrypt: Encrypted Web Applications for Everyone"
Elaine Shi, ... -- CCS 2014
"SDDR: Light-Weight, Secure Mobile Encounters"
Matthew Lentz, Elaine Shi, Bobby Bhattacharjee, ... -- Usenix 2014
"Brahmastra: Driving Apps to Test the Security of Third-Party Components"
Jinseong Jeon, ... -- Usenix 2014
"TRUESET: Nearly Practical Verifiable Set Computations"
Ahmed E. Kosba, Charalampos Papamanthou, Mahmoud F. Sayed, Elaine Shi, ... -- Usenix 2014
"Burst ORAM: Minimizing ORAM Response Times for Bursty Access Patterns"
Elaine Shi, ... -- Usenix 2014
"ObliVM: A Programming Framework for Secure Computation"
Chang Liu, Xiao Wang, Kartik Nayak, Elaine Shi, ... -- Oakland 2015
"GraphSC: Parallel Secure Computation Made Easy"
Kartik Nayak, Xiao Wang, Elaine Shi, ... -- Oakland 2015
"SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies"
Andrew Miller, ... -- Oakland 2015
"The Attack of the Clones: A Study of the Impact of Shared Code on Vulnerability Patching"
Richard Johnson, Tudor Dumitras, ... -- Oakland 2015
"Nonoutsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining Coalitions"
Andrew Miller, Ahmed E. Kosba, Jonathan Katz, ... -- CCS 2015
"Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound"
Xiao Wang, ... -- CCS 2015
"Automated Analysis and Synthesis of Authenticated Encryption Schemes"
Viet Tung Hoang, Jonathan Katz, Alex J. Malozemoff, ... -- CCS 2015
"IntegriDB: Verifiable SQL for Outsourced Databases"
Jonathan Katz, Charalampos Papamanthou, Yupeng Zhang, ... -- CCS 2015
"The Dropper Effect: Insights into Malware Distribution with Downloader Graph Analytics"
Bum Jun Kwon, Jayanta Mondal, Tudor Dumitras, ... -- CCS 2015
"Efficient Genome-Wide, Privacy-Preserving Similar Patient Query based on Private Edit Distance"
Xiao Wang, ... -- CCS 2015
"De-anonymizing Programmers via Code Stylometry"
Andrew Liu, ... -- Usenix 2015
"Vulnerability Disclosure in the Age of Social Media: Exploiting Twitter for Predicting Real-World Exploits"
Carl Sabottke, Octavian-Petru Suciu, Tudor Dumitras, ... -- Usenix 2015
"Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts"
Ahmed E. Kosba, Andrew Miller, Charalampos Papamanthou, ... -- Oakland 2016
"I Think They're Trying to Tell Me Something: Advice Sources and Selection for Digital Security"
Elissa M. Redmiles, Amelia R. Malone, Michelle L. Mazurek, ... -- Oakland 2016
"Revisiting Square-Root ORAM: Efficient Random Access in Multi-Party Computation"
Xiao Wang, Jonathan Katz, ... -- Oakland 2016
"You Get Where You're Looking For: The Impact Of Information Sources On Code Security"
Michelle L. Mazurek, Doowon Kim, ... -- Oakland 2016
"Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem"
Frank Cangialosi, Dave Levin, ... -- CCS 2016
"FeatureSmith: Automatically Engineering Features for Malware Detection by Mining the Security Literature"
Ziyun Zhu, Tudor Dumitras, ... -- CCS 2016
"How I Learned to be Secure: a Census-Representative Survey of Security Advice Sources and Behavior"
Elissa M. Redmiles, Michelle L. Mazurek, ... -- CCS 2016
"5Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs"
Daniel Apon, Jonathan Katz, ... -- CCS 2016
"POPE: Partial Order Preserving Encoding"
Daniel Apon, ... -- CCS 2016
"Attribute-based Key Exchange with General Policies"
Alex J. Malozemoff, ... -- CCS 2016
"The Ring of Gyges: Investigating the Future of Criminal Smart Contracts"
Ahmed E. Kosba, ... -- CCS 2016
"Build It, Break It, Fix It: Contesting Secure Development"
Andrew Ruef, Michael Hicks, James Parker, Dave Levin, Michelle L. Mazurek, ... -- CCS 2016
"The Honey Badger of BFT Protocols"
Andrew Miller, ... -- CCS 2016
"All Your Queries Are Belong to Us:The Power of File-Injection Attacks on Searchable Encryption"
Yupeng Zhang, Jonathan Katz, Charalampos Papamanthou, ... -- Usenix 2016
"The Cut-and-Choose Game and its Application to Cryptographic Protocols"
Jonathan Katz, ... -- Usenix 2016
"Catching Worms, Trojan Horses and PUPs: Unsupervised Detection of Silent Delivery Campaigns"
Bum Jun Kwon, Virinchi Srinivas, Amol Deshpande, Tudor Dumitras, ... -- NDSS 2017
"HOP: Hardware makes Obfuscation Practical"
Kartik Nayak, ... -- NDSS 2017
"CRLite: A Scalable System for Pushing All TLS Revocations to All Browsers"
Dave Levin, ... -- Oakland 2017
"Comparing the Usability of Cryptographic APIs"
Doowon Kim, Michelle L. Mazurek, ... -- Oakland 2017
"SecureML: A System for Scalable Privacy-Preserving Machine Learning"
Yupeng Zhang, ... -- Oakland 2017
"vSQL: Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases"
Yupeng Zhang, Daniel Genkin, Jonathan Katz, Dimitrios Papadopoulos, Charalampos Papamanthou, ... -- Oakland 2017
"Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation"
Xiao Wang, Samuel Ranellucci, Jonathan Katz, ... -- CCS 2017
"Certified Malware: Measuring Breaches of Trust in the Windows Code-Signing PKI"
Doowon Kim, Bum Jun Kwon, Tudor Dumitras, ... -- CCS 2017
"Global-Scale Secure Multiparty Computation"
Xiao Wang, Samuel Ranellucci, Jonathan Katz, ... -- CCS 2017
"May the Fourth Be With You: A Microarchitectural Side Channel Attack on Real-World Applications of Curve25519"
Daniel Genkin, ... -- CCS 2017
"Solidus: Confidential Distributed Ledger Transactions via PVORM"
Ahmed E. Kosba, ... -- CCS 2017
"DeTor: Provably Avoiding Geographic Regions in Tor"
Zhihao Li, Stephen Herwig, Dave Levin, ... -- Usenix 2017
"Assessing User Perceptions of Online Targeted Advertising"
Angelisa C. Plane, Elissa M. Redmiles, Michelle L. Mazurek, ... -- Usenix 2017
"USB Snooping Made Easy: Crosstalk Leakage Attacks on USB Hubs"
Daniel Genkin, ... -- Usenix 2017
"A Longitudinal, End-to-End View of the DNSSEC Ecosystem"
Dave Levin, ... -- Usenix 2017
"Qapla: Policy compliance for database-backed systems"
Katura Harvey, ... -- Usenix 2017
"Another Flip in the Wall of Rowhammer Defenses"
Daniel Genkin, ... -- Oakland 2018
"Hackers vs. Testers: A Comparison of Software Vulnerability Discovery Processes"
Daniel Votipka, Rock Stevens, Elissa Redmiles, Jeremy Hu, Michelle L. Mazurek, ... -- Oakland 2018
"vRAM: Faster Verifiable RAM With Program-Independent Preprocessing"
Yupeng Zhang, Daniel Genkin, Jonathan Katz, Charalampos Papamanthou, ... -- Oakland 2018
"xJsnark: A Framework for Efficient Verifiable Computation"
Ahmed E. Kosba, Charalampos Papamanthou, ... -- Oakland 2018
"Asking for a Friend: Evaluating Response Biases in Security User Studies"
Elissa M. Redmiles, Ziyun Zhu, Tudor Dumitras, Michelle L. Mazurek, ... -- CCS 2018
"What was that site doing with my Facebook password?, Designing Password-Reuse Notifications"
Elissa M. Redmiles, ... -- CCS 2018
"Evaluating Fuzz Testing"
George Klees, Andrew Ruef, Benji Cooper, Michael Hicks, ... -- CCS 2018
"Improved Non-Interactive Zero Knowledge with Applications to Post-Quantum Signatures"
Jonathan Katz, Xiao Wang, ... -- CCS 2018
"New Constructions for Forward and Backward Private Symmetric Searchable Encryption"
Charalampos Papamanthou, ... -- CCS 2018
"The Battle for New York: A Case Study of Applied Digital Threat Modeling at the Enterprise Level"
Rock Stevens, Daniel Votipka, Elissa M. Redmiles, Michelle L. Mazurek, ... -- Usenix 2018
"The Broken Shield: Measuring Revocation Effectiveness in the Windows Code-Signing PKI"
Doowon Kim, Bum Jun Kwon, Tudor Dumitras, ... -- Usenix 2018
"From Patching Delays to Infection Symptoms: Using Risk Profiles for an Early Discovery of Vulnerabilities Exploited in the Wild"
Tudor Dumitras, ... -- Usenix 2018
"Fast and Service-preserving Recovery from Malware Infections Using CRIU"
Ashton Webster, Ryan Eckenrod, James Purtilo, ... -- Usenix 2018
"When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning Attacks"
Octavian Suciu, Radu Marginean, Yigitcan Kaya, Hal Daume III, Tudor Dumitras, ... -- Usenix 2018
"Measurement and Analysis of Hajime, a Peer-to-peer IoT Botnet"
Stephen Herwig, Katura Harvey, George Hughey, Richard Roberts, Dave Levin, ... -- NDSS 2019
"Data Recovery on Encrypted Databases With k-Nearest Neighbor Query Leakage"
Charalampos Papamanthou, ... -- Oakland 2019
"How Well Do My Results Generalize? Comparing Security and Privacy Survey Results from MTurk, Web, and Telephone Samples"
Elissa M. Redmiles, Michelle L. Mazurek, ... -- Oakland 2019
""Should I Worry?" A Cross-Cultural Examination of Account Security Incident Response"
Elissa M. Redmiles, ... -- Oakland 2019
"Geneva: Evolving Censorship Evasion Strategies"
Kevin Bock, George Hughey, Dave Levin, ... -- CCS 2019
"Oh, the Places You've Been! User Reactions to Longitudinal Transparency About Third-Party Web Tracking and Inferencing"
Michelle L. Mazurek, ... -- CCS 2019
"Traceback for End-to-End Encrypted Messaging"
Ian Miers, ... -- CCS 2019
"Transparency Logs via Append-only Authenticated Dictionaries"
Charalampos Papamanthou, ... -- CCS 2019
"Two-party Private Set Intersection with an Untrusted Third Party."
Samuel Ranellucci, ... -- CCS 2019
"VoltJockey: Breaching TrustZone by Software-Controlled Voltage Manipulation over Multi-core Frequencies"
Gang Qu, ... -- CCS 2019
"You Are Who You Appear to Be: A Longitudinal Study of Domain Impersonation in TLS Certificates"
Richard Roberts, Yaelle Goldschlag, Rachel Walter, Dave Levin, ... -- CCS 2019
"Terminal Brain Damage: Exposing the Graceless Degradation in Deep Neural Networks Under Hardware Fault Attacks"
Sanghyun Hong, Yigitcan Kaya, Tudor Dumitras, ... -- Usenix 2019
"Users Really Do Answer Telephone Scams"
Huahong Tu, ... -- Usenix 2019
"Compliance Cautions: Investigating Security Issues Associated with U.S. Digital-Security Standards"
Rock Stevens, Kevin Halliday, Michelle L. Mazurek, ... -- NDSS 2020
"Dynamic Searchable Encryption with Small Client Storage"
Ioannis Demertzis, Charalampos Papamanthou, ... -- NDSS 2020
"Finding Safety in Numbers with Secure Allegation Escrows"
Bobby Bhattacharjee, ... -- NDSS 2020
"Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers"
Jonathan Katz, ... -- Oakland 2020
"The State of the Uniform: Attacks on Encrypted Databases Beyond the Uniform Query Distribution"
Charalampos Papamanthou, ... -- Oakland 2020
"A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web"
Elissa M. Redmiles, Noel Warford, Amritha Jayanti, Aravind Koneru, Rock Stevens, Michelle L. Mazurek, ... -- Usenix 2020
"Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix It"
Daniel Votipka, Kelsey R. Fulton, James Parker, Matthew Hou, Michelle L. Mazurek, Michael Hicks, ... -- Usenix 2020
"What Twitter Knows: Characterizing Ad Targeting Practices, User Perceptions, and Ad Explanations Through Users' Own Twitter Data"
Nathan Reitinger, Justin Goodman, Michelle L. Mazurek, ... -- Usenix 2020
"Achieving Keyless CDNs with Conclaves"
Stephen Herwig, Dave Levin, ... -- Usenix 2020
"An Observational Investigation of Reverse Engineers’ Processes"
Daniel Votipka, Seth Rabin, Michelle L. Mazurek, ... -- Usenix 2020
"MIRAGE: Succinct Arguments for Randomized Algorithms with Applications to Universal zk-SNARKs"
Charalampos Papamanthou, ... -- Usenix 2020
"SEAL: Attack Mitigation for Encrypted Databases via Adjustable Leakage"
Ioannis Demertzis, Charalampos Papamanthou, ... -- Usenix 2020
"EarArray: Defending against DolphinAttack via Acoustic Attenuation"
Gang Qu, ... -- NDSS 2021
"HackEd: A Pedagogical Analysis of Online Vulnerability Discovery Exercises"
Eric Zhang, Michelle L. Mazurek, ... -- Oakland 2021
"Response-Hiding Encrypted Ranges: Revisiting Security via Parametrized Leakage-Abuse Attacks"
Charalampos Papamanthou, ... -- Oakland 2021
"Wolverine: Fast, Scalable, and Communication-Efficient Zero-Knowledge Proofs for Boolean and Arithmetic Circuits"
Jonathan Katz, ... -- Oakland 2021
"Fuzzy Message Detection"
Ian Miers, ... -- CCS 2021
"Labeled PSI from Homomorphic Encryption with Reduced Computation and Communication"
Michael Rosenberg, ... -- CCS 2021
"EasyPQC: Verifying Post-Quantum Cryptography"
Xiong Fan, Shih-Han Hung, Jonathan Katz, Xiaodi Wu, ... -- CCS 2021
"Compressed Oblivious Encoding for Homomorphically Encrypted Search"
Dana Dachman-Soled, ... -- CCS 2021
"Constant-Overhead Zero-Knowledge for RAM Programs"
Jonathan Katz, ... -- CCS 2021
"The Exact Security of BIP32 Wallets"
Julian Loss, ... -- CCS 2021
"'Passwords Keep Me Safe' – Understanding What Children Think about Passwords"
Olivia Murphy, ... -- Usenix 2021
""It's stressful having all these phones": Investigating Sex Workers' Safety Goals, Risks, and Practices Online"
Michelle L. Mazurek, ... -- Usenix 2021
"Evaluating In-Workflow Messages for Improving Mental Models of End-to-End Encryption"
Omer Akgul, Wei Bai, Shruti Das, Michelle L. Mazurek, ... -- Usenix 2021
"Mystique: Efficient Conversions for Zero-Knowledge Proofs with Applications to Machine Learning"
Jonathan Katz, ... -- Usenix 2021
"Database Reconstruction from Noisy Volumes: A Cache Side-Channel Attack on SQLite"
Aria Shahverdi, Dana Dachman-Soled, ... -- Usenix 2021
"Strategies and Perceived Risks of Sending Sensitive Documents"
Noel Warford, Ashna Mediratta, Michelle L. Mazurek, ... -- Usenix 2021
"Weaponizing Middleboxes for TCP Reflected Amplification"
Kevin Bock, Yair Fax, Kyle Hurley, Dave Levin, ... -- Usenix 2021
"When Malware Changed Its Mind: An Empirical Study of Variable Program Behaviors in the Real World"
Erin Avllazagaj, Tudor Dumitras, ... -- Usenix 2021
"Fooling the Eyes of Autonomous Vehicles: Robust Physical Adversarial Examples Against Traffic Sign Recognition Systems"
Gang Qu, ... -- NDSS 2022
"Above and Beyond: Organizational Efforts to Complement U.S. Digital Security Compliance Mandates"
Rock Stevens, Michelle L. Mazurek, ... -- NDSS 2022
"Investigating Influencer VPN Ads on YouTube"
Omer Akgul, Richard Roberts, Dave Levin, Michelle L. Mazurek, ... -- Oakland 2022
"SNARKBlock: Federated Anonymous Blocklisting from Hidden Common Input Aggregate Proofs"
Michael Rosenberg, Ian Miers, ... -- Oakland 2022
"SoK: A Framework for Unifying At-Risk User Research"
Noel Warford, Kaitlyn Yang, Omer Akgul, Nathan Malkin, Michelle L. Mazurek, ... -- Oakland 2022
"Batching, Aggregation, and Zero-Knowledge Proofs in Bilinear Accumulators"
Shravan Srinivasan, ... -- CCS 2022
"Foundations of Coin Mixing Services"
Noemi Glaeser, ... -- CCS 2022
"Hammurabi: A Framework for Pluggable, Logic-Based X.509 Certificate Validation Policies"
Michael Lum, Yaelle Goldschlag, Leah Kannan, Kasra Torshizi, Yujie Wang, Dave Levin, ... -- CCS 2022
"Thora: Atomic and Privacy-Preserving Multi-Channel Updates"
Kasra Abbaszadeh, ... -- CCS 2022
"Understanding the How and the Why: Exploring Secure Development Practices through a Course Competition"
Kelsey R. Fulton, Desiree Abrokwa, Michelle L. Mazurek, Michael Hicks, ... -- CCS 2022
"When Frodo Flips: End-to-End Key Recovery on FrodoKEM via Rowhammer"
Hunter Kippen, Dana Dachman-Soled, ... -- CCS 2022
"Orca: Blocklisting in Sender-Anonymous Messaging"
Ian Miers, ... -- Usenix 2022
"Expected Exploitability: Predicting the Development of Functional Vulnerability Exploits"
Octavian Suciu, Tudor Dumitras, ... -- Usenix 2022
"Hyperproofs: Aggregating and Maintaining Proofs in Vector Commitments"
Shravan Srinivasan, ... -- Usenix 2022
"Why Users (Don't) Use Password Managers at a Large Educational Institution"
Michelle L. Mazurek, ... -- Usenix 2022
"FIXREVERTER: A Realistic Bug Injection Methodology for Benchmarking Fuzz Testing"
Michael Hicks, ... -- Usenix 2022
"GET /out: Automated Discovery of Application-Layer Censorship Evasion Strategies"
Michael Harrity, Kevin Bock, Frederick Sell, Dave Levin, ... -- Usenix 2022