"Accountability and Control of Process Creation in Metasystems"
Marty Humphrey, Frederick Knabe, Adam Ferrari, Andrew Grimshaw, ... -- NDSS 2000
"Statically Detecting Likely Buffer Overflow Vulnerabilities"
David Larochelle, David Evans, ... -- Usenix 2001
"Using Directional Antennas to Prevent Wormhole Attacks"
Lingxuan Hu, David Evans, ... -- NDSS 2004
"Where's the FEEB? The Effectiveness of Instruction Set Randomization"
Ana Nora Sovarel, David Evans, Nathanael Paul, ... -- Usenix 2005
"N-Variant Systems: A Secretless Framework for Security through Diversity"
Benjamin Cox, David Evans, Adrian Filipi, Jonathan Rowanhill, Wei Hu, Jack W. Davidson, John C. Knight, Anh Nguyen-Tuong, Jason D. Hiser, ... -- Usenix 2006
"Reverse-Engineering a Cryptographic RFID Tag"
David Evans, Karsten Nohl, ... -- Usenix 2008
"Efficient Privacy-Preserving Biometric Identification"
Yan Huang, David Evans, ... -- NDSS 2011
"Automated Black-box Detection of Side-Channel Vulnerabilities in Web Applications"
Peter Chapman, David Evans, ... -- CCS 2011
"Fast and Precise Sanitizer Analysis with BEK"
Pieter Hooimeijer, ... -- Usenix 2011
"Faster Secure Two-Party Computation Using Garbled Circuits"
Yan Huang, David Evans, ... -- Usenix 2011
"Private Set Intersection: Are Garbled Circuits Better than Custom Protocols?"
Yan Huang, David Evans, ... -- NDSS 2012
"Quid-Pro-Quo-tocols: Strengthening Semi-Honest Protocols with Dual Execution"
Yan Huang, David Evans, ... -- Oakland 2012
"ILR: Where'd My Gadgets Go?"
Jason D. Hiser, Anh Nguyen-Tuong, Michele Co, Matthew Hall, Jack W. Davidson, ... -- Oakland 2012
"Billion-Gate Secure Computation with Malicious Adversaries"
Benjamin Kreuter, Abhi Shelat, Chih-Hao Shen, ... -- Usenix 2012
"Circuit Structures for Improving Efficiency of Security and Privacy Tools"
Samee Zahur, David Evans, ... -- Oakland 2013
"Fast Two-Party Secure Computation with Minimal Assumptions"
Abhi Shelat, Chih-Hao Shen, ... -- CCS 2013
"PCF: A Portable Circuit Format for Scalable Two-Party Secure Computation"
Ben Kreuter, Abhi Shelat, ... -- Usenix 2013
"Explicating SDKs: Uncovering Assumptions Underlying Secure Authentication and Authorization"
Yuchen Zhou, David Evans, ... -- Usenix 2013
"SCORAM: Oblivious RAM for Secure Computation"
Abhi Shelat, ... -- CCS 2014
"Automated Testing of Web Applications for Single Sign-On Vulnerabilities"
Yuchen Zhou, David Evans, ... -- Usenix 2014
"Geppetto: Versatile Verifiable Computation"
Samee Zahur, ... -- Oakland 2015
"Understanding and Monitoring Embedded Web Scripts"
Yuchen Zhou, David Evans, ... -- Oakland 2015
"Using Hardware Features for Increased Debugging Transparency"
Kevin Leach, ... -- Oakland 2015
"Micropayments for Decentralized Currencies"
Abhi Shelat, ... -- CCS 2015
"Automatically Evading Classifiers: A Case Study on PDF Malware Classifiers"
Weilin Xu, Yanjun Qi, David Evans, ... -- NDSS 2016
"LO-PHI: Low-Observable Physical Host Instrumentation for Malware Analysis"
Kevin Leach, ... -- NDSS 2016
"Revisiting Square-Root ORAM: Efficient Random Access in Multi-Party Computation"
Samee Zahur, Jack Doerner, David Evans, ... -- Oakland 2016
"Verifiable ASICs"
Abhi Shelat, ... -- Oakland 2016
"Secure Stable Matching at Scale"
Jack Doerner, David Evans, Abhi Shelat, ... -- CCS 2016
"Automatically Detecting Error Handling Bugs using Error Specifications"
Baishakhi Ray, ... -- Usenix 2016
"The Cut-and-Choose Game and its Application to Cryptographic Protocols"
Abhi Shelat, ... -- Usenix 2016
"Feature Squeezing: Detecting Adversarial Examples in Deep Neural Networks."
Weilin Xu, David Evans, Yanjun Qi, ... -- NDSS 2018
"Dangerous Skills: Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems"
Yuan Tian, ... -- Oakland 2019
"Demystifying Hidden Privacy Settings in Mobile Apps"
Fnu Suya, Yuan Tian, ... -- Oakland 2019
"MalMax: Multi-Aspect Execution for Automated Dynamic Web Server Malware Analysis"
Abbas Naderi-Afooshteh, Yonghwi Kwon, Jack W. Davidson, Anh Nguyen-Tuong, ... -- CCS 2019
"Birthday, Name and Bifacial-security: Understanding Passwords of Chinese Web Users"
Yuan Tian, ... -- Usenix 2019
"Evaluating Differentially Private Machine Learning in Practice"
Bargav Jayaraman, David Evans, ... -- Usenix 2019
"TKPERM: Cross-platform Permission Knowledge Transfer to Detect Overprivileged Third-party Applications"
Faysal Hossain Shezan, Kaiming Cheng, Yuan Tian, ... -- NDSS 2020
"PMP: Cost-effective Forced Execution with Probabilistic Memory Pre-planning"
Yonghwi Kwon, ... -- Oakland 2020
"TARDIS: Rolling Back The Clock On CMS-Targeting Cyber Attacks"
Yonghwi Kwon, ... -- Oakland 2020
"Hybrid Batch Attacks: Finding Black-box Adversarial Examples with Limited Queries"
Fnu Suya, Jianfeng Chi, David Evans, Yuan Tian, ... -- Usenix 2020
"iOS, Your OS, Everybody's OS: Vetting and Analyzing Network Services of iOS Applications"
Yuan Tian, ... -- Usenix 2020
"C$^2$SR: Cybercrime Scene Reconstruction for Post-mortem Forensic Analysis"
Yonghwi Kwon, ... -- NDSS 2021
"CryptGPU: Fast Privacy-Preserving Machine Learning on the GPU"
Sijun Tan, Yuan Tian, David J. Wu, ... -- Oakland 2021
"Is Private Learning Possible with Instance Encoding?"
Mohammad Mahmoody, ... -- Oakland 2021
"OSPREY: Recovery of Variable and Data Structure via Probabilistic Analysis for Stripped Binary"
Yonghwi Kwon, ... -- Oakland 2021
"Shorter and Faster Post-Quantum zkSNARKs from Lattices"
Hang Su, David J. Wu, ... -- CCS 2021
"Spinner: Automated Dynamic Command Subsystem Perturbation"
Meng Wang, Chijung Jung, Ali Ahad, Yonghwi Kwon, ... -- CCS 2021
"Same Coverage, Less Bloat: Accelerating Binary-only Fuzzing with Coverage-preserving Coverage-guided Tracing"
Anh Nguyen-Tuong, Jason Hiser, Jack Davidson, ... -- CCS 2021
"Breaking Through Binaries: Compiler-quality Instrumentation for Better Binary-only Fuzzing"
Anh Nguyen-Tuong, Jason D. Hiser, Jack W. Davidson, ... -- Usenix 2021
"MPInspector: A Systematic and Automatic Approach for Evaluating the Security of IoT Messaging Protocols"
Yuan Tian, ... -- Usenix 2021
"Forensic Analysis of Configuration-based Attacks"
Ali Ahad, ... -- NDSS 2022
"Locally Differentially Private Sparse Vector Aggregation"
Tianhao Wang, ... -- Oakland 2022
"SwarmFlawFinder: Discovering and Exploiting Logic Flaws of Swarm Algorithms"
Chijung Jung, Ali Ahad, Yonghwi Kwon, ... -- Oakland 2022
"Are Attribute Inference Attacks Just Imputation?"
Bargav Jayaraman, David Evans, ... -- CCS 2022
"DriveFuzz: Discovering Autonomous Driving Bugs through Driving Quality-Guided Fuzzing"
Yonghwi Kwon, ... -- CCS 2022
"Federated Boosted Decision Trees with Differential Privacy"
Tianhao Wang, ... -- CCS 2022
"Graph Unlearning"
Tianhao Wang, ... -- CCS 2022
"SecSMT: Securing SMT Processors against Contention-Based Covert Channels"
Xida Ren, Ashish Venkat, ... -- Usenix 2022
"Your Microphone Array Retains Your Identity: A Robust Voice Liveness Detection System for Smart Speakers"
Matthew Pillari, Arjun Deopujari, Liam Brennan, Hafsah Shamsie, Yuan Tian, ... -- Usenix 2022
"Creating a Secure Underlay for the Internet"
Yixin Sun, ... -- Usenix 2022