"Implementation of Crossrealm Referral Handling in the MIT Kerberos Client"
Michael M. Swift, ... -- NDSS 2001
"Preventing Format-String Attacks via Automatic and Efficient Dynamic Checking"
Michael F. Ringenburg, Dan Grossman, ... -- CCS 2005
"Robust TCP Stream Reassembly in the Presence of Adversaries"
Sarang Dharmapurikar, ... -- Usenix 2005
"A Crawler-based Study of Spyware in the Web"
Alex Moshchuk, Tanya Bragin, Steven D. Gribble, Henry M. Levy, ... -- NDSS 2006
"A Safety-Oriented Platform for Web Applications"
Richard S. Cox, Steven D. Gribble, Henry M. Levy, ... -- Oakland 2006
"Stateful Public-Key Cryptosystems: How to Encrypt with One 160-bit Exponentiation"
Tadayoshi Kohno, ... -- CCS 2006
"On the Optimal Communication Complexity of Multiphase Protocols for Perfect Communication"
N. R. Prasad, ... -- Oakland 2007
"SpyProxy: Execution-based Detection of Malicious Web Content"
Alexander Moshchuk, Tanya Bragin, Damien Deville, Steven D. Gribble, Henry M. Levy, ... -- Usenix 2007
"Devices That Tell on You: Privacy Trends in Consumer Ubiquitous Computing"
T. Scott Saponas, Jonathan Lester, Carl Hartung, Sameer Agarwal, Tadayoshi Kohno, ... -- Usenix 2007
"Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses"
Tadayoshi Kohno, Daniel Halperin, ... -- Oakland 2008
"Privacy Oracle: a System for Finding Application Leaks with Black Box Differential Testing"
Gabriel Maganis, Tadayoshi Kohno, ... -- CCS 2008
"RFIDS and Secret Handshakes: Defending Against Ghost-and-Leech Attacks and Unauthorized Reads with Context-Aware Communications"
Alexei Czeskis, Karl Koscher, Tadayoshi Kohno, ... -- CCS 2008
"Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties with DHTs"
Tadayoshi Kohno, Gabriel Maganis, Arvind Krishnamurthy, ... -- Usenix 2008
"EPC RFID tag security weaknesses and defenses: passport cards, enhanced drivers licenses, and beyond"
Karl Koscher, Vjekoslav Brajkovic, Tadayoshi Kohno, ... -- CCS 2009
"GATEKEEPER: Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code"
Salvatore Guarnieri, ... -- Usenix 2009
"Vanish: Increasing Data Privacy with Self-Destructing Data"
Tadayoshi Kohno, Henry M. Levy, Roxana Geambasu, Amit Levy, ... -- Usenix 2009
"The Multi-Principal OS Construction of the Gazelle Web Browser"
Alexander Moshchuk, ... -- Usenix 2009
"Experimental Security Analysis of a Modern Automobile"
Karl Koscher, Alexei Czeskis, Franziska Roesner, Shwetak Patel, Tadayoshi Kohno, ... -- Oakland 2010
"Survivable key compromise in software update systems"
Justin Cappos, ... -- CCS 2010
"Retaining sandbox containment despite bugs in privileged memory-safe code"
Justin Cappos, Armon Dadgar, Jeff Rasley, Justin Samuel, Ivan Beschastnikh, Cosmin Barsan, Arvind Krishnamurthy, Thomas Anderson, ... -- CCS 2010
"Searching the Searchers with SearchAudit"
John P. John, Arvind Krishnamurthy, ... -- Usenix 2010
"Televisions, Video Privacy, and Powerline Electromagnetic Interference"
Miro Enev, Sidhant Gupta, Tadayoshi Kohno, Shwetak Patel, ... -- CCS 2011
"These Aren't the Droids You're Looking For: Retrofitting Android to Protect Data from Imperious Applications"
Peter Hornyack, Seungyeop Han, David Wetherall, ... -- CCS 2011
"Comprehensive Experimental Analyses of Automotive Attack Surfaces"
Karl Koscher, Alexei Czeskis, Franziska Roesner, Tadayoshi Kohno, ... -- Usenix 2011
"deSEO: Combating Search-Result Poisoning"
John P. John, Arvind Krishnamurthy, ... -- Usenix 2011
"User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems"
Franziska Roesner, Tadayoshi Kohno, ... -- Oakland 2012
"Strengthening User Authentication through Opportunistic Cryptographic Identity Assertions"
Alexei Czeskis, Tadayoshi Kohno, ... -- CCS 2012
"Origin-Bound Certificates: A Fresh Approach to Strong Client Authentication for the Web"
Alexei Czeskis, ... -- Usenix 2012
"Control-Alt-Hack: The Design and Evaluation of a Card Game for Computer Security Awareness and Education"
Tamara Denning, Adam Lerner, Adam Shostack, Tadayoshi Kohno, ... -- CCS 2013
"Securing Embedded User Interfaces: Android and Beyond"
Franziska Roesner, Tadayoshi Kohno, ... -- Usenix 2013
"SafeDispatch: Securing C++ Virtual Calls from Memory Corruption Attacks"
Zachary Tatlock, ... -- NDSS 2014
"World-Driven Access Control for Continuous Sensing"
Franziska Roesner, Tadayoshi Kohno, ... -- CCS 2014
"Collaborative verification of information flow for a high-assurance app store"
Michael D. Ernst, Rene Just, Suzanne Millstein, Stuart Pernsteiner, Franziska Roesner, Karl Koscher, Paulo Barros, Ravi Bhoraskar, Seungyeop Han, Paul Vines, Edward XueJun Wu, ... -- CCS 2014
"Brahmastra: Driving Apps to Test the Security of Third-Party Components"
Ravi Bhoraskar, Seungyeop Han, David Wetherall, ... -- Usenix 2014
"Investigating the Computer Security Practices and Needs of Journalists"
Polina Charters, Tobin Holliday, Franziska Roesner, ... -- Usenix 2015
"AUDACIOUS: User-Driven Access Control with Unmodified Operating Systems"
Talia Ringer, Dan Grossman, Franziska Roesner, ... -- CCS 2016
"Internet Jones and the Raiders of the Lost Trackers: An Archaeological Study of Web Tracking from 1996 to 2016"
Adam Lerner, Anna Kornfeld Simpson, Tadayoshi Kohno, Franziska Roesner, ... -- Usenix 2016
"Securing Augmented Reality Output"
Kiron Lebeck, Kimberly Ruth, Tadayoshi Kohno, Franziska Roesner, ... -- Oakland 2017
"Rewriting History: Changing the Archived Web from the Present"
Ada Lerner, Tadayoshi Kohno, Franziska Roesner, ... -- CCS 2017
"When the Weakest Link is Strong: Secure Collaboration in the Case of the Panama Papers"
Franziska Roesner, ... -- Usenix 2017
"Computer Security, Privacy, and DNA Sequencing"
Peter Ney, Karl Koscher, Lee Organick, Luis Ceze, Tadayoshi Kohno, ... -- Usenix 2017
"Decentralized Action Integrity for Trigger-Action IoT Platforms."
Earlence Fernandes, ... -- NDSS 2018
"Computer Security and Privacy for Refugees in the United States"
Lucy Simko, Samia Ibtasam, Franziska Roesner, Tadayoshi Kohno, ... -- Oakland 2018
"Towards Security and Privacy for Multi-User Augmented Reality: Foundations with End Users"
Kiron Lebeck, Kimberly Ruth, Tadayoshi Kohno, Franziska Roesner, ... -- Oakland 2018
"Rethinking Access Control and Authentication for the Home Internet of Things (IoT)"
Earlence Fernandes, ... -- Usenix 2018
"Prism: Deconstructing the Blockchain to Approach Physical Limits"
Sreeram Kannan, ... -- CCS 2019
"Computer Security and Privacy in the Interactions Between Victim Service Providers and Human Trafficking Survivors"
Christine Chen, Franziska Roesner, ... -- Usenix 2019
"Secure Multi-User Content Sharing for Augmented Reality Applications"
Kimberly Ruth, Tadayoshi Kohno, Franziska Roesner, ... -- Usenix 2019
"Understanding and Improving Security and Privacy in Multi-User Smart Homes: A Design Exploration and In-Home User Study"
Eric Zeng, Franziska Roesner, ... -- Usenix 2019
"Genotype Extraction and False Relative Attacks: Security Risks to Third-Party Genetic Genealogy Services Beyond Identity Inference"
Peter Ney, Luis Ceze, Tadayoshi Kohno, ... -- NDSS 2020
"Are Anonymity-Seekers Just Like Everybody Else? An Analysis of Contributions to Wikipedia from Tor"
Kaylea Champion, Benjamin Mako Hill, ... -- Oakland 2020
"Everything is a Race and Nakamoto Always Wins"
Sreeram Kannan, ... -- CCS 2020
"What Twitter Knows: Characterizing Ad Targeting Practices, User Perceptions, and Ad Explanations Through Users' Own Twitter Data"
Miranda Wei, ... -- Usenix 2020
"Defensive Technology Use by Political Activists During the Sudanese Revolution"
Lucy Simko, Tadayoshi Kohno, ... -- Oakland 2021
"Which Privacy and Security Attributes Most Impact Consumers‚ Risk Perception and Willingness to Purchase IoT Devices?"
Pardis Emami-Naeini, ... -- Oakland 2021
"BFT Protocol Forensics"
Sreeram Kannan, ... -- CCS 2021
"Securing Parallel-chain Protocols under Variable Mining Power"
Viswa Virinchi Muppirala, Sreeram Kannan, ... -- CCS 2021
"Augury: Using Data Memory-Dependent Prefetchers to Leak Data at Rest"
Michael Flanders, David Kohlbrenner, ... -- Oakland 2022
"Minotaur: Multi-Resource Blockchain Consensus"
Sreeram Kannan, ... -- CCS 2022
"VeRSA: Verifiable Registries with Efficient Client Audits from RSA Authenticated Dictionaries"
Stefano Tessaro, ... -- CCS 2022
"Electronic Monitoring Smartphone Apps: An Analysis of Risks from Technical, Human-Centered, and Legal Perspectives"
Kentrell Owens, Franziska Roesner, Tadayoshi Kohno, ... -- Usenix 2022
""Like Lesbians Walking the Perimeter": Experiences of U.S. LGBTQ+ Folks With Online Security, Safety, and Privacy Advice"
Christine Geeng, Mike Harris, Franziska Roesner, ... -- Usenix 2022
"Khaleesi: Breaker of Advertising and Tracking Request Chains"
Umar Iqbal, ... -- Usenix 2022
"Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86"
David Kohlbrenner, ... -- Usenix 2022
"QuORAM: A Quorum-Replicated Fault Tolerant ORAM Datastore"
Huijia Lin, Stefano Tessaro, ... -- Usenix 2022