"Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol"
Michael Backes, ... -- Oakland 2008
"Type-checking Zero-knowledge"
Michael Backes, ... -- CCS 2008
"CSAR: A Practical and Provable Technique to Make Randomized Systems Accountable"
Peter Druschel, Andreas Haeberlen, ... -- NDSS 2009
"Automatic Discovery and Quantification of Information Leaks"
Boris Koepf, Andrey Rybalchenko, ... -- Oakland 2009
"CoSP: a general framework for computational soundness proofs"
Michael Backes, ... -- CCS 2009
"Acoustic Side-Channel Attacks on Printers"
Michael Backes, ... -- Usenix 2010
"A Security API for Distributed Social Networks"
Michael Backes, ... -- NDSS 2011
"Auctions in Do-Not-Track Compliant Internet Advertising"
Alexey Reznichenko, Paul Francis, ... -- CCS 2011
"Automated Synthesis of Secure Distributed Applications"
Michael Backes, ... -- NDSS 2012
"ObliviAd: Provably Secure and Practical Online Behavioral Advertising"
Michael Backes, Aniket Kate, ... -- Oakland 2012
"Non-tracking Web Analytics"
Istemi Ekin Akkus, Ruichuan Chen, Paul Francis, ... -- CCS 2012
"Computational Soundness Without Protocol Restrictions"
Michael Backes, ... -- CCS 2012
"Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services"
Nuno Santos, Krishna P. Gummadi, ... -- Usenix 2012
"Preventing Side-channel Leaks in Web Traffic: A Formal Approach"
Michael Backes, ... -- NDSS 2013
"SoK: The Evolution of Sybil Defense via Social Networks"
Allen Clement, ... -- Oakland 2013
"Verifiable Delegation of Computation on Outsourced Data"
Michael Backes, Dario Fiore, ... -- CCS 2013
"Private-by-Design Advertising Meets the Real World"
Alexey Reznichenko, Paul Francis, ... -- CCS 2014
"You Can Run but You Can't Read: Preventing Disclosure Exploits in Executable Code"
Michael Backes, ... -- CCS 2014
"SDDR: Light-Weight, Secure Mobile Encounters"
Viktor Erdelyi, Paarijaat Aditya, Peter Druschel, ... -- Usenix 2014
"A Look at Targeted Attacks Through the Lense of an NGO"
Stevens Le Blond, Adina Uritesc, Cedric Gilbert, ... -- Usenix 2014
"Oxymoron: Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing"
Michael Backes, ... -- Usenix 2014
"Towards Detecting Anomalous User Behavior in Online Social Networks"
Bimal Viswanath, Muhammad Ahmad Bashir, Krishna P. Gummadi, ... -- Usenix 2014
"ADSNARK: Nearly Practical and Privacy-Preserving Proofs on Authenticated Data"
Michael Backes, ... -- Oakland 2015
"Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits"
Deepak Garg, ... -- CCS 2015
"Boxify: Full-fledged App Sandboxing for Stock Android"
Michael Backes, ... -- Usenix 2015
"How to Make ASLR Win the Clone Wars: Runtime Re-Randomization"
Stefan Nurnberger, Michael Backes, ... -- NDSS 2016
"SoK: Lessons Learned From Android Security Research For Appified Software Platforms"
Michael Backes, ... -- Oakland 2016
"Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability Notification"
Michael Backes, ... -- Usenix 2016
"What Cannot be Read, Cannot be Leveraged? Revisiting Assumptions of JIT-ROP Defenses"
Michael Backes, ... -- Usenix 2016
"T3: Comprehensive policy compliance in data retrieval systems"
Eslam Elnikety, Aastha Mehta, Anjo Vahldiek-Oberwagner, Deepak Garg, Peter Druschel, ... -- Usenix 2016
"On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis"
Michael Backes, ... -- Usenix 2016
"Privacy in Epigenetics: Temporal Linkability of MicroRNA Expression Profiles"
Michael Backes, ... -- Usenix 2016
"SGX-Enabled Oblivious Machine Learning"
Aastha Mehta, ... -- Usenix 2016
"A Broad View of the Ecosystem of Socially Engineered Exploit Documents"
Stevens Le Blond, Cedric Gilbert, Utkarsh Upadhyay, Manuel Gomez Rodriguez, ... -- NDSS 2017
"To Catch a Ratter: Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild"
Stevens Le Blond, ... -- Oakland 2017
"A Comprehensive Symbolic Analysis of TLS 1.3"
Marko Horvat, ... -- CCS 2017
"Qapla: Policy compliance for database-backed systems"
Aastha Mehta, Eslam Elnikety, Deepak Garg, Peter Druschel, ... -- Usenix 2017
"Investigating Ad Transparency Mechanisms in Social Media: A Case Study of Facebooks Explanations."
Krishna P. Gummadi, ... -- NDSS 2018
"Privacy Risks with Facebook's PII-based Targeting: Auditing a Data Broker's Advertising Interface"
Krishna P. Gummadi, Patrick Loiseau, ... -- Oakland 2018
"ERIM: Secure, Efficient In-process Isolation with Protection Keys (MPK)"
Anjo Vahldiek-Oberwagner, Eslam Elnikety, Nuno O. Duarte, Michael Sammler, Peter Druschel, Deepak Garg, ... -- Usenix 2019
"Finding Safety in Numbers with Secure Allegation Escrows"
Deepak Garg, Peter Druschel, ... -- NDSS 2020
""I need a better description": An Investigation Into User Expectations For Differential Privacy"
Elissa M. Redmiles, ... -- CCS 2021
"Side-channel attacks on query-based data anonymization"
Reinhard Munz, Paul Francis, ... -- CCS 2021
"An Inside Look into the Practice of Malware Analysis"
Elissa M. Redmiles, ... -- CCS 2021
"Driving 2FA Adoption at Scale: Optimizing Two-Factor Authentication Notification Design Patterns"
Elissa M. Redmiles, ... -- Usenix 2021
""It's stressful having all these phones": Investigating Sex Workers' Safety Goals, Risks, and Practices Online"
Elissa M. Redmiles, ... -- Usenix 2021
"Privacy in Urban Sensing with Instrumented Fleets, Using Air Pollution Monitoring As A Usecase"
Ishan Nangia, ... -- NDSS 2022
""Like Lesbians Walking the Perimeter": Experiences of U.S. LGBTQ+ Folks With Online Security, Safety, and Privacy Advice"
Elissa Redmiles, ... -- Usenix 2022
"Pacer: Comprehensive Network Side-Channel Mitigation in the Cloud"
Mohamed Alzayat, Roberta De Viti, Bjorn B. Brandenburg, Peter Druschel, Deepak Garg, ... -- Usenix 2022