"Taming the Devil: Techniques for Evaluating Anonymized Network Data"
Michael K. Reiter, ... -- NDSS 2008
"Towards Practical Biometric Key Generation with Randomized Biometric Templates"
Fabian Monrose, Michael K. Reiter, ... -- CCS 2008
"The Practical Subtleties of Biometric Key Generation"
Michael K. Reiter, ... -- Usenix 2008
"Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis"
Fabian Monrose, ... -- NDSS 2009
"Safe Passage for Passwords and Other Sensitive Data"
Michael K. Reiter, ... -- NDSS 2009
"False data injection attacks against state estimation in electric power grids"
Michael K. Reiter, ... -- CCS 2009
"Privacy-preserving genomic computation through program specialization"
Michael K. Reiter, ... -- CCS 2009
"English shellcode"
Fabian Monrose, ... -- CCS 2009
"Server-side Verification of Client Behavior in Online Games"
Darrell Bethea, Robert A. Cochran, Michael K. Reiter, ... -- NDSS 2010
"Trail of bytes: efficient support for forensic analysis"
Srinivas Krishnan, Kevin Z. Snow, Fabian Monrose, ... -- CCS 2010
"The security of modern password expiration: an algorithmic framework and empirical analysis"
Yinqian Zhang, Fabian Monrose, Michael K. Reiter, ... -- CCS 2010
"On Measuring the Similarity of Network Hosts: Pitfalls, New Metrics, and Empirical Analyses"
Fabian Monrose, ... -- NDSS 2011
"Usability Testing a Malware-Resistant Input Mechanism"
Alana Libonati, Michael K. Reiter, ... -- NDSS 2011
"Phonotactic Reconstruction of Encrypted VoIP Conversations: Hookt on fon-iks:"
Andrew M. White, Kevin Z. Snow, Austin Matthews, Fabian Monrose, ... -- Oakland 2011
"HomeAlone: Co-Residency Detection in the Cloud via Side-Channel Analysis"
Yinqian Zhang, Michael K. Reiter, ... -- Oakland 2011
"iSpy: Automatic Reconstruction of Typed Input from Compromising Reflections"
Rahul Raguram, Andrew M. White, Dibyendusekhar Goswami, Fabian Monrose, Jan-Michael Frahm, ... -- CCS 2011
"SHELLOS: Enabling Fast Detection and Forensic Analysis of Code Injection Attacks"
Kevin Z. Snow, Srinivas Krishnan, Fabian Monrose, ... -- Usenix 2011
"Cross-VM Side Channels and Their Use to Extract Private Keys"
Yinqian Zhang, Michael K. Reiter, ... -- CCS 2012
"Security and Usability Challenges of Moving-Object CAPTCHAs: Decoding Codewords in Motion"
Yi Xu, Jan-Michael Frahm, Fabian Monrose, ... -- Usenix 2012
"Toward Online Verification of Client Behavior in Distributed Applications"
Robert A. Cochran, Michael K. Reiter, ... -- NDSS 2013
"Clear and Present Data: Opaque Traffic and its Security Implications for the Future"
Andrew M. White, Srinivas Krishnan, Fabian Monrose, ... -- NDSS 2013
"Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization"
Kevin Z. Snow, Fabian Monrose, ... -- Oakland 2013
"Seeing Double: Reconstructing Obscured Typed Input from Repeated Compromising Reflections"
Yi Xu, Jared Heinly, Andrew M. White, Jan-Michael Frahm, Fabian Monrose, ... -- CCS 2013
"Duppel: Retrofitting Commodity Operating Systems to Mitigate Cache Side Channels in the Cloud"
Yinqian Zhang, Michael K. Reiter, ... -- CCS 2013
"Cross-Tenant Side-Channel Attacks in PaaS Clouds"
Yinqian Zhang, Michael K. Reiter, ... -- CCS 2014
"An Epidemiological Study of Malware Encounters in a Large Enterprise"
Victor Heorhiadi, Michael K. Reiter, ... -- CCS 2014
"Watching the Watchers: Inferring TV Content From Outdoor Light Effusions"
Yi Xu, Fabian Monrose, Jan-Michael Frahm, ... -- CCS 2014
"Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection"
Fabian Monrose, ... -- Usenix 2014
"Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming"
Kevin Z. Snow, Fabian Monrose, ... -- NDSS 2015
"Mitigating Storage Side Channels Using Statistical Privacy Mechanisms"
Qiuyu Xiao, Michael K. Reiter, ... -- CCS 2015
"Nomad: Mitigating Arbitrary Cloud Side Channels via Provider-Assisted Migration"
Michael K. Reiter, ... -- CCS 2015
"Cache, Trigger, Impersonate: Enabling Context-Sensitive Honeyclient Analysis On-the-Wire"
Teryl Taylor, Kevin Z. Snow, Nathan Otterness, Fabian Monrose, ... -- NDSS 2016
"Return to the Zombie Gadgets: Undermining Destructive Code Reads via Code Inference Attacks"
Kevin Z. Snow, Roman Rogowski, Jan Werner, Fabian Monrose, ... -- Oakland 2016
"A Software Approach to Defeating Side Channels in Last-Level Caches"
Ziqiao Zhou, Michael K. Reiter, ... -- CCS 2016
"Accessorize to a Crime: Real and Stealthy Attacks on State-Of-The-Art Face Recognition"
Michael K. Reiter, ... -- CCS 2016
"Stealing Machine Learning Models via Prediction APIs"
Michael K. Reiter, ... -- Usenix 2016
"Virtual U: Defeating Face Liveness Detection by Building Virtual Models From Your Public Photos"
Yi Xu, True Price, Jan-Michael Frahm, Fabian Monrose, ... -- Usenix 2016
"Practical Attacks Against Graph-based Clustering"
Fabian Monrose, ... -- CCS 2017
"Static Evaluation of Noninterference using Approximate Model Counting"
Ziqiao Zhou, Michael K. Reiter, ... -- Oakland 2018
"BEAT: Asynchronous BFT Made Practical"
Michael K. Reiter, ... -- CCS 2018
"Statistical Privacy for Streaming Traffic"
Michael K. Reiter, ... -- NDSS 2019
"How to end password reuse on the web"
Ke Coby Wang, Michael K. Reiter, ... -- NDSS 2019
"SoK: Security Evaluation of Home-Based IoT Deployment"
Fabian Monrose, ... -- Oakland 2019
"SoK: The Challenges, Pitfalls, and Perils of Using Hardware Performance Counters for Security"
Sanjeev Das, Jan Werner, Fabian Monrose, ... -- Oakland 2019
"Efficient Verifiable Secret Sharing with Share Recovery in BFT Protocols"
Mike Reiter, ... -- CCS 2019
"Transys: Leveraging Common Security Properties Across Hardware Designs"
Rui Zhang, Cynthia Sturton, ... -- Oakland 2020
"Methodologies for Quantifying (Re-)randomization Security and Timing under JIT-ROP"
Fabian Monrose, ... -- CCS 2020
"Civet: An Efficient Java Partitioning Framework for Hardware Enclaves"
Bhushan Jain, Donald E. Porter, ... -- Usenix 2020
"Detecting Stuffing of a User's Credentials at Her Own Accounts"
Ke Coby Wang, Michael K. Reiter, ... -- Usenix 2020
"TASE: Reducing Latency of Symbolic Execution with Transactional Memory"
Adam Humphries, ... -- NDSS 2021
"DynPTA: Combining Static and Dynamic Analysis for Practical Selective Data Protection"
Fabian Monrose, ... -- Oakland 2021
"Using Amnesia to Detect Credential Database Breaches"
Ke Coby Wang, ... -- Usenix 2021
"The Circle Of Life: A Large-Scale Study of The IoT Malware Lifecycle"
Fabian Monrose, ... -- Usenix 2021
"Clarion: Anonymous Communication from Multiparty Shuffling Protocols"
Saba Eskandarian, ... -- NDSS 2022
"Holistic Control-Flow Protection on Real-Time Embedded Systems with Kage"
Yufei Du, ... -- Usenix 2022