University of Texas, Austin

General Info

Rank: #46 Worldwide
#32 in US
Papers: 64
Number of Researchers: 56
APA
(average papers per authors):
1.1
Country: USA

Activity Map

Contributors

  • Vitaly Shmatikov (19 papers)
  • Brent Waters (11 papers)
  • Suman Jana (8 papers)
  • Andrew J. Blumberg (7 papers)
  • Emmett Witchel (4 papers)
  • Srinath Setty (4 papers)
  • Isil Dillig (4 papers)
  • Arvind Narayanan (4 papers)
  • Michael Walfish (3 papers)
  • Sooel Son (3 papers)
  • Amir Houmansadr (3 papers)
  • Alan M. Dunn (3 papers)
  • Mohit Tiwari (3 papers)
  • Calvin Lin (3 papers)
  • Satyanarayana Vusirikala (3 papers)
  • Ashay Rane (3 papers)
  • Hovav Shacham (3 papers)
  • Owen S. Hofmann (2 papers)
  • Richard McPherson (2 papers)
  • Kathryn S. McKinley (2 papers)
  • Martin Georgiev (2 papers)
  • Yu Feng (2 papers)
  • Allison B. Lewko (2 papers)
  • Chad Brubaker (2 papers)
  • Victor Vu (2 papers)
  • Reza Shokri (2 papers)
  • Sebastian Angel (2 papers)
  • Yannis Rouselakis (2 papers)
  • Christopher J. Rossbach (1 papers)
  • Zuocheng Ren (1 papers)
  • Ruben Martins (1 papers)
  • David Zuckerman (1 papers)
  • Ann Kilzer (1 papers)
  • Michael Z. Lee (1 papers)
  • Lorenzo Alvisi (1 papers)
  • Sarfraz Khurshid (1 papers)
  • Yuanzhong Xu (1 papers)
  • Jon Stephens (1 papers)
  • Kostas Ferles (1 papers)
  • Benjamin Mariano (1 papers)
  • David J. Wu (1 papers)
  • Justin Brickell (1 papers)
  • Don Porter (1 papers)
  • Walter Chang (1 papers)
  • Brandon Streiff (1 papers)
  • Calvin Li (1 papers)
  • Yin Zhang (1 papers)
  • Kim Ramchen (1 papers)
  • Oswaldo Olivo (1 papers)
  • Jia Chen (1 papers)
  • Yi-Chao Chen (1 papers)
  • Nikhil Panpalia (1 papers)
  • Benjamin Braun (1 papers)
  • Bing Huang (1 papers)
  • Ross Baldick (1 papers)
  • Yingchen Wang (1 papers)

Papers

"Expander Graphs for Digital Stream Authentication and Robust Overlay Networks"

David Zuckerman, ... -- Oakland 2002

"Obfuscated Databases and Group Privacy"

Arvind Narayanan, Vitaly Shmatikov, ... -- CCS 2005

"Fast Dictionary Attacks on Human-Memorable Passwords Using Time-Space Tradeoff"

Arvind Narayanan, Vitaly Shmatikov, ... -- CCS 2005

"Privacy-Preserving Remote Diagnostics"

Justin Brickell, Don Porter, Vitaly Shmatikov, Emmett Witchel, ... -- CCS 2007

"Robust De-anonymization of Large Sparse Datasets"

Arvind Narayanan, Vitaly Shmatikov, ... -- Oakland 2008

"Towards Practical Privacy for Genomic Computation"

Vitaly Shmatikov, ... -- Oakland 2008

"Efficient and Extensible Security Enforcement Using Dynamic Data Flow Analysis"

Walter Chang, Brandon Streiff, Calvin Li, ... -- CCS 2008

"De-anonymizing Social Networks"

Arvind Narayanan, Vitaly Shmatikov, ... -- Oakland 2009

"Efficient pseudorandom functions from the decisional linear assumption and weaker variants"

Allison B. Lewko, Brent Waters, ... -- CCS 2009

"Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs"

Owen S. Hofmann, Christopher J. Rossbach, Brent Waters, Emmett Witchel, ... -- NDSS 2010

"Revocation Systems with Very Small Private Keys"

Allison B. Lewko, Brent Waters, ... -- Oakland 2010

"Building efficient fully collusion-resilient traitor tracing and revocation schemes"

Brent Waters, ... -- CCS 2010

"Practical leakage-resilient identity-based encryption from simple assumptions"

Yannis Rouselakis, Brent Waters, ... -- CCS 2010

"'You Might Also Like:' Privacy Risks of Collaborative Filtering"

Ann Kilzer, Vitaly Shmatikov, ... -- Oakland 2011

"TxBox: Building Secure, Efficient Sandboxes with System Transactions"

Suman Jana, Vitaly Shmatikov, ... -- Oakland 2011

"Privacy and Accountability for Location-based Aggregate Statistics"

Andrew J. Blumberg, ... -- CCS 2011

"Cloaking Malware with the Trusted Platform Module"

Alan M. Dunn, Owen S. Hofmann, Brent Waters, Emmett Witchel, ... -- Usenix 2011

"Outsourcing the Decryption of ABE Ciphertexts"

Brent Waters, ... -- Usenix 2011

"Making argument systems for outsourced computation practical (sometimes)"

Srinath Setty, Richard McPherson, Andrew J. Blumberg, Michael Walfish, ... -- NDSS 2012

"Abusing File Processing in Malware Detectors for Fun and Profit"

Suman Jana, Vitaly Shmatikov, ... -- Oakland 2012

"Memento: Learning Secrets from Process Footprints"

Suman Jana, Vitaly Shmatikov, ... -- Oakland 2012

"The Most Dangerous Code in the World: Validating SSL Certificates in Non-Browser Software"

Martin Georgiev, Suman Jana, Vitaly Shmatikov, ... -- CCS 2012

"Taking Proof-Based Verified Computation a Few Steps Closer to Practicality"

Srinath Setty, Victor Vu, Nikhil Panpalia, Benjamin Braun, Andrew J. Blumberg, Michael Walfish, ... -- Usenix 2012

"The Postman Always Rings Twice: Attacking and Defending postMessage in HTML5 Websites"

Sooel Son, Vitaly Shmatikov, ... -- NDSS 2013

"I want my voice to be heard: IP over Voice-over-IP for Unobservable Censorship Circumvention"

Amir Houmansadr, ... -- NDSS 2013

"Fix Me Up: Repairing Access-Control Bugs in Web Applications"

Sooel Son, Kathryn S. McKinley, Vitaly Shmatikov, ... -- NDSS 2013

"The Parrot is Dead: Observing Unobservable Network Communications"

Amir Houmansadr, Chad Brubaker, Vitaly Shmatikov, ... -- Oakland 2013

"A Hybrid Architecture for Interactive Verifiable Computation"

Victor Vu, Srinath Setty, Andrew J. Blumberg, Michael Walfish, ... -- Oakland 2013

"Anon-Pass: Practical Anonymous Subscriptions"

Michael Z. Lee, Alan M. Dunn, Brent Waters, Emmett Witchel, ... -- Oakland 2013

"A Scanner Darkly: Protecting User Privacy From Perceptual Applications"

Suman Jana, Vitaly Shmatikov, ... -- Oakland 2013

"SoK: The Evolution of Sybil Defense via Social Networks"

Lorenzo Alvisi, ... -- Oakland 2013

"Practical Constructions and New Proof Methods for Large Universe Attribute-Based Encryption"

Yannis Rouselakis, Brent Waters, ... -- CCS 2013

"Catching Click-Spam in Search Ad Networks"

Yin Zhang, ... -- CCS 2013

"PHANTOM: Practical Oblivious Computation in a Secure Processor"

Mohit Tiwari, ... -- CCS 2013

"Diglossia: Detecting Code Injection Attacks With Precision and Efficiency"

Sooel Son, Kathryn S. McKinley, Vitaly Shmatikov, ... -- CCS 2013

"Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers"

Suman Jana, Alan M. Dunn, ... -- Usenix 2013

"No Direction Home: The True Cost of Routing Around Decoys"

Amir Houmansadr, Vitaly Shmatikov, ... -- NDSS 2014

"Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks"

Martin Georgiev, Suman Jana, Vitaly Shmatikov, ... -- NDSS 2014

"Using Frankencerts for Automated Adversarial Testing of Certificate Validation in SSL/TLS Implementations"

Chad Brubaker, Suman Jana, Sarfraz Khurshid, Vitaly Shmatikov, ... -- Oakland 2014

"Fully Secure and Fast Signing from Obfuscation"

Kim Ramchen, Brent Waters, ... -- CCS 2014

"Efficient RAM and control flow in verifiable outsourced computation"

Srinath Setty, Zuocheng Ren, Andrew J. Blumberg, ... -- NDSS 2015

"Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems"

Yuanzhong Xu, ... -- Oakland 2015

"Detecting and Exploiting Second Order Denial-of-Service Vulnerabilities in Web Applications"

Oswaldo Olivo, Isil Dillig, Calvin Lin, ... -- CCS 2015

"Privacy-Preserving Deep Learning"

Reza Shokri, ... -- CCS 2015

"Raccoon: Digital Side-Channel Freedom through Obfuscated Execution"

Ashay Rane, Mohit Tiwari, Calvin Lin, ... -- Usenix 2015

"Synthesizing Plausible Privacy-Preserving Location Traces"

Reza Shokri, ... -- Oakland 2016

"Breaking web applications built on top of encrypted data"

Richard McPherson, ... -- CCS 2016

"Defending against malicious peripherals with Cinch"

Sebastian Angel, Andrew J. Blumberg, ... -- Usenix 2016

"Secure, Precise, and Fast Floating-Point Operations on x86 Processors"

Ashay Rane, Calvin Lin, Mohit Tiwari, ... -- Usenix 2016

"Automated Synthesis of Semantic Malware Signatures using Maximum Satisfiability"

Yu Feng, Ruben Martins, Isil Dillig, ... -- NDSS 2017

"Full accounting for verifiable outsourcing"

Andrew J. Blumberg, ... -- CCS 2017

"Precise Detection of Side-Channel Vulnerabilities using Quantitative Cartesian Hoare Logic"

Jia Chen, Yu Feng, Isil Dillig, ... -- CCS 2017

"Vale: Verifying High-Performance Cryptographic Assembly Code"

Ashay Rane, ... -- Usenix 2017

"PIR with Compressed Queries and Amortized Query Processing"

Sebastian Angel, ... -- Oakland 2018

"Are These Pairing Elements Correct? Automated Verification and Applications"

Satyanarayana Vusirikala, ... -- CCS 2019

"DeMiCPU: Device Fingerprinting with Magnetic Signals Radiated by CPU"

Yi-Chao Chen, ... -- CCS 2019

"Not Everything is Dark and Gloomy: Power Grid Protections Against IoT Demand Attacks"

Bing Huang, Ross Baldick, ... -- Usenix 2019

"PPE Circuits: Formal Definition to Software Automation"

Satyanarayana Vusirikala, Brent Waters, ... -- CCS 2020

"Retrofitting Fine Grain Isolation in the Firefox Renderer"

Hovav Shacham, ... -- Usenix 2020

"SmartPulse: Automated Checking of Temporal Properties in Smart Contracts"

Jon Stephens, Kostas Ferles, Benjamin Mariano, Isil Dillig, ... -- Oakland 2021

"PPE Circuits for Rational Polynomials"

Satyanarayana Vusirikala, ... -- CCS 2021

"Swivel: Hardening WebAssembly against Spectre"

Hovav Shacham, ... -- Usenix 2021

"Spiral: Fast, High-Rate Single-Server PIR via FHE Composition"

David J. Wu, ... -- Oakland 2022

"Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86"

Yingchen Wang, Hovav Shacham, ... -- Usenix 2022