"Encrypting Virtual Memory"
Niels Provos, ... -- Usenix 2000
"Secure Coprocessor Integration with Kerberos V5"
Naomaru Itoi, ... -- Usenix 2000
"Defeating TCP/IP Stack Fingerprinting"
Matthew Smart, G. Robert Malan, Farnam Jahanian, ... -- Usenix 2000
"Principles of Policy in Secure Groups"
Patrick McDaniel, ... -- NDSS 2001
"Kerberized Credential Translation: A Solution to Web Access Control"
Olga Kornievskaia, Peter Honeyman, Bill Doster, Kevin Coffman, ... -- Usenix 2001
"SC-CFS: Smartcard Secured Cryptographic File System"
Naomaru Itoi, ... -- Usenix 2001
"Secure Distribution of Events in Content-Based Publish Subscribe Systems"
Lukasz Opyrchal, Atul Prakash, ... -- Usenix 2001
"Defending Against Statistical Steganalysis"
Niels Provos, ... -- Usenix 2001
"Detecting Steganographic Content on the Internet"
Niels Provos, Peter Honeyman, ... -- NDSS 2002
"Methods and Limitations of Security Policy Reconciliation"
Atul Prakash, ... -- Oakland 2002
"Hop-count filtering: an effective defense against spoofed DDoS traffic"
Kang G. Shin, ... -- CCS 2003
"On the performance, feasibility, and use of forward-secure signatures"
Eric Cronin, Sugih Jamin, ... -- CCS 2003
"High Coverage Detection of Input-Related Security Faults"
Eric Larson, Todd Austin, ... -- Usenix 2003
"Preventing Privilege Escalation"
Niels Provos, Peter Honeyman, ... -- Usenix 2003
"Improving Host Security with System Call Policies"
Niels Provos, ... -- Usenix 2003
"Web Tap: Detecting Covert Web Traffic"
Kevin Borders, Atul Prakash, ... -- CCS 2004
"The Internet Motion Sensor - A Distributed Blackhole Monitoring System"
Michael Bailey, Evan Cooke, Farnam Jahanian, David Watson, ... -- NDSS 2005
"Enriching Intrusion Alerts Through Multi-Host Causality"
Samuel T. King, Zhuoqing Morley Mao, Dominic G. Lucchetti, Peter M. Chen, ... -- NDSS 2005
"CPOL: High-Performance Policy Evaluation"
Kevin Borders, Xin Zhao, Atul Prakash, ... -- CCS 2005
"Siren: Detecting Evasive Malware (Short Paper)"
Kevin Borders, Xin Zhao, Atul Prakash, ... -- Oakland 2006
"SubVirt: Implementing malware with virtual machines"
Samuel T. King, Peter M. Chen, ... -- Oakland 2006
"Low-Rate TCP-Targeted DoS Attack Disrupts Internet Routing"
Ying Zhang, Zhuoqing Morley Mao, ... -- NDSS 2007
"Shedding Light on the Configuration of Dark Addresses"
Sushant Sinha, Michael Bailey, Farnam Jahanian, ... -- NDSS 2007
"Accurate Real-time Identification of IP Prefix Hijacking"
Xin Hu, Zhuoqing Morley Mao, ... -- Oakland 2007
"CloudAV: N-Version Antivirus in the Network Cloud"
Evan Cooke, Farnam Jahanian, Jon Oberheide, ... -- Usenix 2008
"RB-Seeker: Auto-detection of Redirection Botnets"
Xin Hu, Matthew Knysz, Kang G. Shin, ... -- NDSS 2009
"Quantifying Information Leaks in Outbound Web Traffic"
Atul Prakash, ... -- Oakland 2009
"Large-scale malware indexing using function-call graphs"
Xin Hu, Kang G. Shin, ... -- CCS 2009
"Dispatcher: enabling active botnet infiltration using automatic protocol reverse-engineering"
Xin Hu, Kang G. Shin, ... -- CCS 2009
"Protecting Confidential Data on Personal Computers with Storage Capsules"
Kevin Borders, Atul Prakash, Eric Vander Weele, Billy Lau, ... -- Usenix 2009
"Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs"
Scott Wolchok, J. Alex Halderman, ... -- NDSS 2010
"On Network-level Clusters for Spam Detection"
Zhiyun Qian, Zhuoqing Morley Mao, ... -- NDSS 2010
"Improving Spam Blacklisting Through Dynamic Thresholding and Speculative Aggregation"
Sushant Sinha, Michael Bailey, Farnam Jahanian, ... -- NDSS 2010
"On the Safety of Enterprise Policy Deployment"
Yudong Gao, Ni Pan, Xu Chen, Zhuoqing Morley Mao, ... -- NDSS 2010
"Investigation of Triangular Spamming: a Stealthy and Efficient Spamming Technique"
Zhiyun Qian, Zhuoqing Morley Mao, ... -- Oakland 2010
"Security analysis of India's electronic voting machines"
Scott Wolchok, Eric Wustrow, J. Alex Halderman, ... -- CCS 2010
"On Measuring the Similarity of Network Hosts: Pitfalls, New Metrics, and Empirical Analyses"
Michael Bailey, ... -- NDSS 2011
"Telex: Anticensorship in the Network Infrastructure"
Eric Wustrow, Scott Wolchok, J. Alex Halderman, ... -- Usenix 2011
"You Can Run, but You Can't Hide: Exposing Network Location for Targeted DoS Attacks in Cellular Networks"
Zhiyun Qian, Zhaoguang Wang, Qiang Xu, Zhuoqing Morley Mao, ... -- NDSS 2012
"Off-Path TCP Sequence Number Inference Attack - How Firewall Middleboxes Reduce Security"
Zhiyun Qian, Zhuoqing Morley Mao, ... -- Oakland 2012
"Innocent by Association: Early Recognition of Legitimate Users"
Junxian Huang, Zhuoqing Morley Mao, ... -- CCS 2012
"Collaborative TCP Sequence Number Inference Attack"
Zhiyun Qian, Zhuoqing Morley Mao, ... -- CCS 2012
"Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices"
Zakir Durumeric, Eric Wustrow, J. Alex Halderman, ... -- Usenix 2012
"Clear and Present Data: Opaque Traffic and its Security Implications for the Future"
Michael Bailey, ... -- NDSS 2013
"Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors"
Denis Foo Kune, Kevin Fu, ... -- Oakland 2013
"ZMap: Fast Internet-wide Scanning and Its Security Applications"
Zakir Durumeric, Eric Wustrow, J. Alex Halderman, ... -- Usenix 2013
"On the Mismanagement and Maliciousness of Networks"
Jing Zhang, Zakir Durumeric, Michael Bailey, Mingyan Liu, ... -- NDSS 2014
"Gaining Control of Cellular Traffic Accounting by Spurious TCP Retransmission"
Denis Foo Kune, ... -- NDSS 2014
"SoK: Security and Privacy in Implantable Medical Devices and Body Area Networks"
Colleen Swanson, Denis Foo Kune, ... -- Oakland 2014
"Location Privacy Protection for Smartphone Users"
Kassem Fawaz, Kang G. Shin, ... -- CCS 2014
"Security Analysis of the Estonian Internet Voting System"
Drew Springall, Travis Finkenauer, Zakir Durumeric, Harri Hursti, Margaret MacAlpine, J. Alex Halderman, ... -- CCS 2014
"Verifying Curve25519 Software"
Chang-Hong Hsu, ... -- CCS 2014
"Vulnerability and Protection of Channel State Information in Multiuser MIMO Networks"
Yu-Chih Tung, Sihui Han, Dongyao Chen, Kang G. Shin, ... -- CCS 2014
"Peeking into Your App without Actually Seeing it: UI State Inference and Novel Android Attacks"
Qi Alfred Chen, Zhuoqing Morley Mao, ... -- Usenix 2014
"Security Analysis of a Full-Body Scanner"
Eric Wustrow, J. Alex Halderman, ... -- Usenix 2014
"An Internet-wide View of Internet-wide Scanning"
Zakir Durumeric, Michael Bailey, J. Alex Halderman, ... -- Usenix 2014
"TapDance: End-to-Middle Anticensorship without Flow Blocking"
Eric Wustrow, Colleen Swanson, J. Alex Halderman, ... -- Usenix 2014
"Static Detection of Packet Injection Vulnerabilities -- A Case for Identifying Attacker-controlled Implicit Information Leaks"
Qi Alfred Chen, Yunhan Jack Jia, Yuru Shao, Zhuoqing Morley Mao, ... -- CCS 2015
"A Search Engine Backed by Internet-Wide Scanning"
Zakir Durumeric, David Adrian, Ariana Mirian, J. Alex Halderman, ... -- CCS 2015
"Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice"
David Adrian, Zakir Durumeric, J. Alex Halderman, Drew Springall, Benjamin VanderSloot, Eric Wustrow, ... -- CCS 2015
"Anatomization and Protection of Mobile Apps' Location Privacy Threats"
Kassem Fawaz, Huan Feng, Kang G. Shin, ... -- Usenix 2015
"LinkDroid: Reducing Unregulated Aggregation of App Usage Behaviors"
Huan Feng, Kassem Fawaz, Kang G. Shin, ... -- Usenix 2015
"Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents"
Yang Liu, Armin Sarabi, Jing Zhang, Parinaz Naghizadeh Ardabili, Mingyan Liu, ... -- Usenix 2015
"Don't Forget to Lock the Back Door! A Characterization of IPv6 Network Security Policy"
Jakub Czyz, ... -- NDSS 2016
"Kratos: Discovering Inconsistent Security Policy Enforcement in the Android Framework"
Yuru Shao, Qi Alfred Chen, Z. Morley Mao, ... -- NDSS 2016
"A2: Analog Malicious Hardware"
Kaiyuan Yang, Matthew Hicks, Qing Dong, Todd Austin, Dennis Sylvester, ... -- Oakland 2016
"MitM Attack by Name Collision: Cause Analysis and Vulnerability Assessment in the New gTLD Era"
Qi Alfred Chen, Zhuoqing Morley Mao, ... -- Oakland 2016
"Security Analysis of Emerging Smart Home Applications"
Earlence Fernandes, Atul Prakash, ... -- Oakland 2016
"Users Really Do Plug in USB Drives They Find"
Zakir Durumeric, ... -- Oakland 2016
"The Misuse of Android Unix Domain Socket and Security Implications"
Yuru Shao, Yunhan Jack Jia, Zhuoqing Morley Mao, ... -- CCS 2016
"Error Handling of In-vehicle Networks Makes Them Vulnerable"
Kyong-Tak Cho, Kang G. Shin, ... -- CCS 2016
"Λ○λ: Functional Lattice Cryptography"
Eric Crockett, Chris Peikert, ... -- CCS 2016
"Protecting Privacy of BLE Device Users"
Kassem Fawaz, Kang G. Shin, ... -- Usenix 2016
"FlowFence: Practical Data Protection for Emerging IoT Application Frameworks"
Earlence Fernandes, Justin Paupore, Amir Rahmati, Atul Prakash, ... -- Usenix 2016
"Fingerprinting Electronic Control Units for Vehicle Intrusion Detection"
Kyong-Tak Cho, Kang G. Shin, ... -- Usenix 2016
"DROWN: Breaking TLS using SSLv2"
David Adrian, J. Alex Halderman, ... -- Usenix 2016
"You've Got Vulnerability: Exploring Effective Vulnerability Notifications"
Zakir Durumeric, Jakub Czyz, ... -- Usenix 2016
"Measuring small subgroup attacks against Diffie-Hellman"
David Adrian, J. Alex Halderman, ... -- NDSS 2017
"The Security Impact of HTTPS Interception"
Zakir Durumeric, Drew Springall, J. Alex Halderman, ... -- NDSS 2017
"Automated Analysis of Privacy Requirements for Mobile Apps"
Florian Shaub, ... -- NDSS 2017
"ContexloT: Towards Providing Contextual Integrity to Appified IoT Platforms"
Yunhan Jack Jia, Qi Alfred Chen, Amir Rahmati, Earlence Fernandes, Z. Morley Mao, Atul Prakash, ... -- NDSS 2017
"Client-side Name Collision Vulnerability in the New gTLD Era: A Systematic Study"
Qi Alfred Chen, Yulong Cao, Jie You, Z. Morley Mao, ... -- CCS 2017
"Viden: Attacker Identification on In-Vehicle Networks"
Kyong-Tak Cho, Kang G. Shin, ... -- CCS 2017
"Vale: Verifying High-Performance Cryptographic Assembly Code"
Manos Kapritsos, ... -- Usenix 2017
"Understanding the Mirai Botnet"
Matt Bernhard, Zakir Durumeric, J. Alex Halderman, ... -- Usenix 2017
"Ensuring Authorized Updates in Multi-user Database-Backed Applications"
Kevin Eykholt, Atul Prakash, Barzan Mozafari, ... -- Usenix 2017
"Decentralized Action Integrity for Trigger-Action IoT Platforms."
Atul Prakash, ... -- NDSS 2018
"Exposing Congestion Attack on Emerging Connected Vehicle based Traffic Signal Control."
Qi Alfred Chen, Yucheng Yin, Yiheng Feng, Z. Morley Mao, Henry X. Liu, ... -- NDSS 2018
"Blue Note: How Intentional Acoustic Interference Damages Availability and Integrity in Hard Disk Drives and Operating Systems"
Connor Bolton, Sara Rampazzi, Andrew Kwong, Kevin Fu, ... -- Oakland 2018
"Tracking Certificate Misissuance in the Wild"
Gabrielle Beck, David Adrian, Zakir Durumeric, J. Alex Halderman, ... -- Oakland 2018
"ALCHEMY: A Language and Compiler for Homomorphic Encryption Made easY"
Chris Peikert, Chad Sharp, ... -- CCS 2018
"Quack: Scalable Remote Measurement of Application-Layer Censorship"
Benjamin VanderSloot, Allison McDonald, Will Scott, J. Alex Halderman, Roya Ensafi, ... -- Usenix 2018
"Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning"
Florian Schaub, Kang G. Shin, ... -- Usenix 2018
"From Patching Delays to Infection Symptoms: Using Risk Profiles for an Early Discovery of Vulnerabilities Exploited in the Wild"
Chaowei Xiao, Armin Sarabi, Mingyan Liu, ... -- Usenix 2018
"Meltdown: Reading Kernel Memory from User Space"
Daniel Genkin, ... -- Usenix 2018
"Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution"
Ofir Weisse, Daniel Genkin, Baris Kasikci, Thomas F. Wenisch, ... -- Usenix 2018
"We Value Your Privacy ... Now Take Some Cookies: Measuring the GDPR's Impact on Web Privacy"
Florian Schaub, ... -- NDSS 2019
"Hard Drive of Hearing: Disks that Eavesdrop with a Synthesized Microphone"
Andrew Kwong, Kevin Fu, ... -- Oakland 2019
"Iodine: Fast Dynamic Taint Tracking Using Rollback-free Optimistic Hybrid Analysis"
Subarno Banerjee, Peter M. Chen, Satish Narayanasamy, ... -- Oakland 2019
"Synesthesia: Detecting Screen Content via Remote Acoustic Side Channels"
Daniel Genkin, ... -- Oakland 2019
"The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations"
Daniel Genkin, ... -- Oakland 2019
"Towards Automated Safety Vetting of PLC Code in Real-World Plants"
Yassine Qamsane, Yuru Shao, Yikai Lin, Kira Barton, James Moyne, Z. Morley Mao, ... -- Oakland 2019
"(Un)informed Consent: Studying GDPR Consent Notices in the Field"
Florian Schaub, ... -- CCS 2019
"Adversarial Sensor Attack on LiDAR-based Perception in Autonomous Driving"
Yulong Cao, Chaowei Xiao, Benjamin Cyr, Yimeng Zhou, Won Park, Sara Rampazzi, Kevin Fu, Z. Morley Mao, ... -- CCS 2019
"Conjure: Summoning Proxies from Unused Address Space"
J. Alex Halderman, J. Alex Halderman, ... -- CCS 2019
"Fallout: Leaking Data on Meltdown-resistant CPUs"
Daniel Genkin, Marina Minkin, ... -- CCS 2019
"Let's Encrypt: An Automated Certificate Authority to Encrypt the Entire Web"
J. Alex Halderman, James Kasten, ... -- CCS 2019
"LibreCAN: Automated CAN Message Translator"
Mert D. Pese, Troy Stacer, C. Andres Campos, Eric Newberry, Dongyao Chen, Kang G. Shin, ... -- CCS 2019
"Trick or Heat? Manipulating Critical Temperature-Based Control Systems using Rectification attacks"
Sara Rampazzi, Angel Rodriguez, Kevin Fu, ... -- CCS 2019
"Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features"
Chaowei Xiao, ... -- Usenix 2019
"Decentralized Control: A Case Study of Russia"
Reethika Ramesh, Ram Sundara Raman, Matthew Bernhard, Victor Ongkowijaya, Steven Sprecher, Roya Ensafi, ... -- NDSS 2020
"Measuring the Deployment of Network Censorship Filters at Global Scale"
Ram Sundara Raman, Adrian Stoll, Armin Sarabi, Reethika Ramesh, Roya Ensafi, ... -- NDSS 2020
"Can Voters Detect Malicious Manipulation of Ballot Marking Devices?"
Matthew Bernhard, Allison McDonald, Henry Meng, Jensen Hwa, Kevin Chang, J. Alex Halderman, ... -- Oakland 2020
"ICAS: An Extensible Framework for Estimating the Susceptibility of IC Layouts to Additive Trojans"
Timothy Trippel, Kang G. Shin, ... -- Oakland 2020
"LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection"
Marina Minkin, Daniel Genkin, ... -- Oakland 2020
"Pseudorandom Black Swans: Cache Attacks on CTR_DRBG"
Andrew Kwong, Daniel Genkin, ... -- Oakland 2020
"RAMBleed: Reading Bits in Memory Without Accessing Them"
Andrew Kwong, Daniel Genkin, ... -- Oakland 2020
"SoK: A Minimalist Approach to Formalizing Analog Sensor Security"
Connor Bolton, Kevin Fu, ... -- Oakland 2020
"Censored Planet: An Internet-wide, Longitudinal Censorship Observatory"
Ram Sundara Raman, Prerana Shenoy, Roya Ensafi, ... -- CCS 2020
"Towards Robust LiDAR-based Perception in Autonomous Driving: General Black-box Adversarial Sensor Attack and Countermeasures"
Jiachen Sun, Yulong Cao, Z. Morley Mao, ... -- Usenix 2020
"Security Analysis of Unified Payments Interface and Payment Apps in India"
Renuka Kumar, Hao Lu, Atul Prakash, ... -- Usenix 2020
"Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems"
Benjamin Cyr, Sara Rampazzi, Daniel Genkin, Kevin Fu, ... -- Usenix 2020
"Bomberman: Defining and Defeating Hardware Ticking Timebombs at Design-time"
Timothy Trippel, Kang G. Shin, ... -- Oakland 2021
"CacheOut: Leaking Data on Intel CPUs via Cache Evictions"
Stephan van Schaik, Marina Minkin, Andrew Kwong, Daniel Genkin, ... -- Oakland 2021
"Invisible for both Camera and LiDAR: Security of Multi-Sensor Fusion based Perception in Autonomous Driving Under Physical-World Attacks"
Yulong Cao, Dawei Yang, Mingyan Liu, ... -- Oakland 2021
"Poltergeist: Acoustic Adversarial Machine Learning against Cameras and Computer Vision"
Kevin Fu, ... -- Oakland 2021
"Consistency Analysis of Data-Usage Purposes in Mobile Apps"
Duc Bui, Yuan Yao, Kang G. Shin, ... -- CCS 2021
""It's stressful having all these phones": Investigating Sex Workers' Safety Goals, Risks, and Practices Online"
Allison McDonald, Florian Schaub, ... -- Usenix 2021
""Now I'm a bit angry:" Individuals' Awareness, Perception, and Responses to Data Breaches that Affected Them"
Yixin Zou, Florian Schaub, ... -- Usenix 2021
"The Role of Computer Security Customer Support in Helping Survivors of Intimate Partner Violence"
Yixin Zou, Allison McDonald, Florian Schaub, ... -- Usenix 2021
"DOLMA: Securing Speculation with the Principle of Transient Non-Observability"
Kevin Loughlin, Ian Neal, Jiacheng Ma, Elisa Tsai, Ofir Weisse, Satish Narayanasamy, Baris Kasikci, ... -- Usenix 2021
"T-Miner: A Generative Approach to Defend Against Trojan Attacks on DNN-based Text Classification"
Neal Mangaokar, ... -- Usenix 2021
"Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses"
Ayush Agarwal, Daniel Genkin, ... -- Usenix 2021
"Security Analysis of the Democracy Live Online Voting System"
J. Alex Halderman, ... -- Usenix 2021
"Automated Discovery of Denial-of-Service Vulnerabilities in Connected Vehicle Protocols"
Shengtuo Hu, Jiachen Sun, Yiheng Feng, Z. Morley Mao, Henry X. Liu, ... -- Usenix 2021
"VPNInspector: Systematic Investigation of the VPN Ecosystem"
Reethika Ramesh, Diwen Xue, Roya Ensafi, ... -- NDSS 2022
"SpecHammer: Combining Spectre and Rowhammer for New Speculative Attacks"
Youssef Tobah, Andrew Kwong, Ingab Kang, Kang G. Shin, ... -- Oakland 2022
"Spook.js: Attacking Chrome Strict Site Isolation via Speculative Execution"
Ayush Agarwal, ... -- Oakland 2022
"Do Opt-Outs Really Opt Me Out?"
Duc Bui, Brian Tang, Kang G. Shin, ... -- CCS 2022
"When Frodo Flips: End-to-End Key Recovery on FrodoKEM via Rowhammer"
Andrew Kwong, ... -- CCS 2022
"A Large-scale Investigation into Geodifferences in Mobile Apps"
Renuka Kumar, Apurva Virkud, Ram Sundara Raman, Atul Prakash, Roya Ensafi, ... -- Usenix 2022
"Security Analysis of Camera-LiDAR Fusion Against Black-Box Attacks on Autonomous Vehicles"
Yulong Cao, Z. Morley Mao, ... -- Usenix 2022
"OpenVPN is Open to VPN Fingerprinting"
Diwen Xue, Reethika Ramesh, Arham Jain, J. Alex Halderman, Roya Ensafi, ... -- Usenix 2022
"Fuzzing Hardware Like Software"
Timothy Trippel, Kang G. Shin, ... -- Usenix 2022
"The Antrim County 2020 Election Incident: An Independent Forensic Investigation"
J. Alex Halderman, ... -- Usenix 2022