"The Final Nail in WEP's Coffin"
Andrea Bittau, Mark Handley, ... -- Oakland 2006
"Multi-Use Unidirectional Proxy Re-Signatures"
Benoit Libert, ... -- CCS 2008
"Fingerprinting Blank Paper Using Commodity Scanners"
Tim Weyrich, ... -- Oakland 2009
"Structuring Protocol Implementations to Protect Sensitive Data"
Petr Marchenko, Brad Karp, ... -- Usenix 2010
"The Case for Ubiquitous Transport-Level Encryption"
Mark Handley, ... -- Usenix 2010
"PrivEx: Private Collection of Traffic Statistics for Anonymous Communication Networks"
George Danezis, ... -- CCS 2014
"Algebraic MACs and Keyed-Verification Anonymous Credentials"
Sarah Meiklejohn, ... -- CCS 2014
"CHERI: A Hybrid Capability-System Architecture for Scalable Software Compartmentalization"
Steven J. Murdoch, ... -- Oakland 2015
"Drops for Stuff: An Analysis of Reshipping Mule Scams"
Gianluca Stringhini, ... -- CCS 2015
"HORNET: High-speed Onion Routing at the Network Layer"
George Danezis, ... -- CCS 2015
"EvilCohort: Detecting Communities of Malicious Accounts on Online Services"
Gianluca Stringhini, ... -- Usenix 2015
"Centrally Banked Cryptocurrencies"
George Danezis, Sarah Meiklejohn, ... -- NDSS 2016
"Efficient Private Statistics with Succinct Sketches"
Luca Melis, George Danezis, Emiliano De Cristofaro, ... -- NDSS 2016
"Do You See What I See? Differential Treatment of Anonymous Users"
Steven J. Murdoch, ... -- NDSS 2016
"BeleniosRF: A Non-Interactive Receipt-Free Electronic Voting Scheme"
Pyrros Chaidos, ... -- CCS 2016
"Transparency Overlays and Applications"
Sarah Meiklejohn, ... -- CCS 2016
"k-fingerprinting: a Robust Scalable Website Fingerprinting Technique"
Jamie Hayes, George Danezis, ... -- Usenix 2016
"MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models"
Enrico Mariconti, Lucky Onwuzurike, Panagiotis Andriotis, Emiliano De Cristofaro, Gordon Ross, Gianluca Stringhini, ... -- NDSS 2017
"Obstacles to the Adoption of Secure Communication Tools"
Ruba Abu-Salma, M. Angela Sasse, ... -- Oakland 2017
"A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components"
Vasilios Mavroudis, Andrea Cerulli, George Danezis, ... -- CCS 2017
"POISED: Spotting Twitter Spam Off the Beaten Paths"
Gianluca Stringhini, ... -- CCS 2017
"How Double-Fetch Situations turn into Double-Fetch Vulnerabilities: A Study of Double Fetches in the Linux Kernel"
Jens Krinke, Steve Dodier-Lazaro, ... -- Usenix 2017
"Transcend: Detecting Concept Drift in Malware Classification Models"
Santanu K. Dash, ... -- Usenix 2017
"The Loopix Anonymity System"
Ania M. Piotrowska, Jamie Hayes, Sebastian Meiser, George Danezis, ... -- Usenix 2017
"Knock Knock, Who's There? Membership Inference on Aggregate Location Data."
Apostolos Pyrgelis, Emiliano De Cristofaro, ... -- NDSS 2018
"Chainspace: A Sharded Smart Contracts Platform."
Mustafa Al-Bassam, Alberto Sonnino, Shehar Bano, George Danezis, ... -- NDSS 2018
"Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency --- Choose Two"
Sebastian Meiser, ... -- Oakland 2018
"Bulletproofs: Short Proofs for Confidential Transactions and More"
Jonathan Bootle, ... -- Oakland 2018
"Tight on Budget? Tight Bounds for r-Fold Approximate Differential Privacy"
Sebastian Meiser, ... -- CCS 2018
"Tiresias: Predicting Security Events Through Deep Learning"
Enrico Mariconti, Gianluca Stringhini, ... -- CCS 2018
"The Rewards and Costs of Stronger Passwords in a University: Linking Password Lifetime to Strength"
Ingolf Becker, Simon Parkin, M. Angela Sasse, ... -- Usenix 2018
"An Empirical Analysis of Anonymity in Zcash"
George Kappos, Haaroon Yousaf, Mary Maller, Sarah Meiklejohn, ... -- Usenix 2018
"Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers"
Alberto Sonnino, Mustafa Al-Bassam, Shehar Bano, Sarah Meiklejohn, George Danezis, ... -- NDSS 2019
"Exploiting Unintended Feature Leakage in Collaborative Learning"
Luca Melis, Emiliano De Cristofaro, ... -- Oakland 2019
"Sonic: Zero-Knowledge SNARKs from Linear-Size Universal and Updatable Structured Reference Strings"
Mary Maller, Sarah Meiklejohn, ... -- CCS 2019
"Tracing Transactions Across Cryptocurrency Ledgers"
Haaroon Yousaf, George Kappos, Sarah Meiklejohn, ... -- Usenix 2019
"No Right to Remain Silent: Isolating Malicious Mixes"
Ania M. Piotrowska, George Danezis, ... -- Usenix 2019
"Snappy: Fast On-chain Payments with Practical Collaterals"
Vasilios Mavroudis, ... -- NDSS 2020
"SoK: Hate, Harassment, and the Changing Landscape of Online Abuse"
Sarah Meiklejohn, ... -- Oakland 2021
"MPC-Friendly Commitments for Publicly Verifiable Covert Security"
Matt Kusner, ... -- CCS 2021
"Dompteur: Taming Audio Adversarial Examples"
Lars Speckemeier, ... -- Usenix 2021
"On Utility and Privacy in Synthetic Genomic Data"
Bristena Oprisanu, Georgi Ganev, Emiliano De Cristofaro, ... -- NDSS 2022
"Local and Central Differential Privacy for Robustness and Privacy in Federated Learning"
Mohammad Naseri, Emiliano De Cristofaro, ... -- NDSS 2022
"TROLLMAGNIFIER: Detecting State-Sponsored Troll Accounts on Reddit?"
Emiliano De Cristofaro, ... -- Oakland 2022
"Transcending TRANSCEND: Revisiting Malware Classification in the Presence of Concept Drift"
Lorenzo Cavallaro, ... -- Oakland 2022
"CERBERUS: Exploring Federated Prediction of Security Events"
Mohammad Naseri, Enrico Mariconti, Emiliano De Cristofaro, ... -- CCS 2022
"Why So Toxic? Measuring and Triggering Toxic Behavior in Open-Domain Chatbots"
Emiliano De Cristofaro, ... -- CCS 2022
"ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning Models"
Emiliano De Cristofaro, ... -- Usenix 2022
"Synthetic Data – Anonymisation Groundhog Day"
Bristena Oprisanu, ... -- Usenix 2022
"Dos and Don'ts of Machine Learning in Computer Security"
Lorenzo Cavallaro, ... -- Usenix 2022
"How to Peel a Million: Validating and Expanding Bitcoin Clusters"
George Kappos, Haaroon Yousaf, Sarah Meiklejohn, ... -- Usenix 2022