"Expander Graphs for Digital Stream Authentication and Robust Overlay Networks"
David Zuckerman, ... -- Oakland 2002
"Obfuscated Databases and Group Privacy"
Arvind Narayanan, Vitaly Shmatikov, ... -- CCS 2005
"Fast Dictionary Attacks on Human-Memorable Passwords Using Time-Space Tradeoff"
Arvind Narayanan, Vitaly Shmatikov, ... -- CCS 2005
"Privacy-Preserving Remote Diagnostics"
Justin Brickell, Don Porter, Vitaly Shmatikov, Emmett Witchel, ... -- CCS 2007
"Robust De-anonymization of Large Sparse Datasets"
Arvind Narayanan, Vitaly Shmatikov, ... -- Oakland 2008
"Towards Practical Privacy for Genomic Computation"
Vitaly Shmatikov, ... -- Oakland 2008
"Efficient and Extensible Security Enforcement Using Dynamic Data Flow Analysis"
Walter Chang, Brandon Streiff, Calvin Li, ... -- CCS 2008
"De-anonymizing Social Networks"
Arvind Narayanan, Vitaly Shmatikov, ... -- Oakland 2009
"Efficient pseudorandom functions from the decisional linear assumption and weaker variants"
Allison B. Lewko, Brent Waters, ... -- CCS 2009
"Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs"
Owen S. Hofmann, Christopher J. Rossbach, Brent Waters, Emmett Witchel, ... -- NDSS 2010
"Revocation Systems with Very Small Private Keys"
Allison B. Lewko, Brent Waters, ... -- Oakland 2010
"Building efficient fully collusion-resilient traitor tracing and revocation schemes"
Brent Waters, ... -- CCS 2010
"Practical leakage-resilient identity-based encryption from simple assumptions"
Yannis Rouselakis, Brent Waters, ... -- CCS 2010
"'You Might Also Like:' Privacy Risks of Collaborative Filtering"
Ann Kilzer, Vitaly Shmatikov, ... -- Oakland 2011
"TxBox: Building Secure, Efficient Sandboxes with System Transactions"
Suman Jana, Vitaly Shmatikov, ... -- Oakland 2011
"Privacy and Accountability for Location-based Aggregate Statistics"
Andrew J. Blumberg, ... -- CCS 2011
"Cloaking Malware with the Trusted Platform Module"
Alan M. Dunn, Owen S. Hofmann, Brent Waters, Emmett Witchel, ... -- Usenix 2011
"Outsourcing the Decryption of ABE Ciphertexts"
Brent Waters, ... -- Usenix 2011
"Making argument systems for outsourced computation practical (sometimes)"
Srinath Setty, Richard McPherson, Andrew J. Blumberg, Michael Walfish, ... -- NDSS 2012
"Abusing File Processing in Malware Detectors for Fun and Profit"
Suman Jana, Vitaly Shmatikov, ... -- Oakland 2012
"Memento: Learning Secrets from Process Footprints"
Suman Jana, Vitaly Shmatikov, ... -- Oakland 2012
"The Most Dangerous Code in the World: Validating SSL Certificates in Non-Browser Software"
Martin Georgiev, Suman Jana, Vitaly Shmatikov, ... -- CCS 2012
"Taking Proof-Based Verified Computation a Few Steps Closer to Practicality"
Srinath Setty, Victor Vu, Nikhil Panpalia, Benjamin Braun, Andrew J. Blumberg, Michael Walfish, ... -- Usenix 2012
"The Postman Always Rings Twice: Attacking and Defending postMessage in HTML5 Websites"
Sooel Son, Vitaly Shmatikov, ... -- NDSS 2013
"I want my voice to be heard: IP over Voice-over-IP for Unobservable Censorship Circumvention"
Amir Houmansadr, ... -- NDSS 2013
"Fix Me Up: Repairing Access-Control Bugs in Web Applications"
Sooel Son, Kathryn S. McKinley, Vitaly Shmatikov, ... -- NDSS 2013
"The Parrot is Dead: Observing Unobservable Network Communications"
Amir Houmansadr, Chad Brubaker, Vitaly Shmatikov, ... -- Oakland 2013
"A Hybrid Architecture for Interactive Verifiable Computation"
Victor Vu, Srinath Setty, Andrew J. Blumberg, Michael Walfish, ... -- Oakland 2013
"Anon-Pass: Practical Anonymous Subscriptions"
Michael Z. Lee, Alan M. Dunn, Brent Waters, Emmett Witchel, ... -- Oakland 2013
"A Scanner Darkly: Protecting User Privacy From Perceptual Applications"
Suman Jana, Vitaly Shmatikov, ... -- Oakland 2013
"SoK: The Evolution of Sybil Defense via Social Networks"
Lorenzo Alvisi, ... -- Oakland 2013
"Practical Constructions and New Proof Methods for Large Universe Attribute-Based Encryption"
Yannis Rouselakis, Brent Waters, ... -- CCS 2013
"Catching Click-Spam in Search Ad Networks"
Yin Zhang, ... -- CCS 2013
"PHANTOM: Practical Oblivious Computation in a Secure Processor"
Mohit Tiwari, ... -- CCS 2013
"Diglossia: Detecting Code Injection Attacks With Precision and Efficiency"
Sooel Son, Kathryn S. McKinley, Vitaly Shmatikov, ... -- CCS 2013
"Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers"
Suman Jana, Alan M. Dunn, ... -- Usenix 2013
"No Direction Home: The True Cost of Routing Around Decoys"
Amir Houmansadr, Vitaly Shmatikov, ... -- NDSS 2014
"Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks"
Martin Georgiev, Suman Jana, Vitaly Shmatikov, ... -- NDSS 2014
"Using Frankencerts for Automated Adversarial Testing of Certificate Validation in SSL/TLS Implementations"
Chad Brubaker, Suman Jana, Sarfraz Khurshid, Vitaly Shmatikov, ... -- Oakland 2014
"Fully Secure and Fast Signing from Obfuscation"
Kim Ramchen, Brent Waters, ... -- CCS 2014
"Efficient RAM and control flow in verifiable outsourced computation"
Srinath Setty, Zuocheng Ren, Andrew J. Blumberg, ... -- NDSS 2015
"Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems"
Yuanzhong Xu, ... -- Oakland 2015
"Detecting and Exploiting Second Order Denial-of-Service Vulnerabilities in Web Applications"
Oswaldo Olivo, Isil Dillig, Calvin Lin, ... -- CCS 2015
"Privacy-Preserving Deep Learning"
Reza Shokri, ... -- CCS 2015
"Raccoon: Digital Side-Channel Freedom through Obfuscated Execution"
Ashay Rane, Mohit Tiwari, Calvin Lin, ... -- Usenix 2015
"Synthesizing Plausible Privacy-Preserving Location Traces"
Reza Shokri, ... -- Oakland 2016
"Breaking web applications built on top of encrypted data"
Richard McPherson, ... -- CCS 2016
"Defending against malicious peripherals with Cinch"
Sebastian Angel, Andrew J. Blumberg, ... -- Usenix 2016
"Secure, Precise, and Fast Floating-Point Operations on x86 Processors"
Ashay Rane, Calvin Lin, Mohit Tiwari, ... -- Usenix 2016
"Automated Synthesis of Semantic Malware Signatures using Maximum Satisfiability"
Yu Feng, Ruben Martins, Isil Dillig, ... -- NDSS 2017
"Full accounting for verifiable outsourcing"
Andrew J. Blumberg, ... -- CCS 2017
"Precise Detection of Side-Channel Vulnerabilities using Quantitative Cartesian Hoare Logic"
Jia Chen, Yu Feng, Isil Dillig, ... -- CCS 2017
"Vale: Verifying High-Performance Cryptographic Assembly Code"
Ashay Rane, ... -- Usenix 2017
"PIR with Compressed Queries and Amortized Query Processing"
Sebastian Angel, ... -- Oakland 2018
"Are These Pairing Elements Correct? Automated Verification and Applications"
Satyanarayana Vusirikala, ... -- CCS 2019
"DeMiCPU: Device Fingerprinting with Magnetic Signals Radiated by CPU"
Yi-Chao Chen, ... -- CCS 2019
"Not Everything is Dark and Gloomy: Power Grid Protections Against IoT Demand Attacks"
Bing Huang, Ross Baldick, ... -- Usenix 2019
"PPE Circuits: Formal Definition to Software Automation"
Satyanarayana Vusirikala, Brent Waters, ... -- CCS 2020
"Retrofitting Fine Grain Isolation in the Firefox Renderer"
Hovav Shacham, ... -- Usenix 2020
"SmartPulse: Automated Checking of Temporal Properties in Smart Contracts"
Jon Stephens, Kostas Ferles, Benjamin Mariano, Isil Dillig, ... -- Oakland 2021
"PPE Circuits for Rational Polynomials"
Satyanarayana Vusirikala, ... -- CCS 2021
"Swivel: Hardening WebAssembly against Spectre"
Hovav Shacham, ... -- Usenix 2021
"Spiral: Fast, High-Rate Single-Server PIR via FHE Composition"
David J. Wu, ... -- Oakland 2022
"Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86"
Yingchen Wang, Hovav Shacham, ... -- Usenix 2022