"PGP in Constrained Wireless Devices"
Michael Brown, Donny Cheung, Michael Kirkup, Alfred Menezes, ... -- Usenix 2000
"Improving the Robustness of Private Information Retrieval"
Ian Goldberg, ... -- Oakland 2007
"Web-Based Inference Detection"
Bryce Zimny, ... -- Usenix 2007
"Sphinx: A Compact and Provably Secure Mix Format"
Ian Goldberg, ... -- Oakland 2009
"Multi-party off-the-record messaging"
Ian Goldberg, ... -- CCS 2009
"Improving Tor using a TCP-over-DTLS Tunnel"
Ian Goldberg, ... -- Usenix 2009
"An improved algorithm for tor circuit scheduling"
Can Tang, Ian Goldberg, ... -- CCS 2010
"Scantegrity II Municipal Election at Takoma Park: The First E2E Binding Governmental Election with Ballot Privacy"
David Chaum, Jeremy Clark, Aleksander Essex, ... -- Usenix 2010
"Formalizing Anonymous Blacklisting Systems"
Ryan Henry, Ian Goldberg, ... -- Oakland 2011
"Extending Nymble-like Systems"
Ryan Henry, Ian Goldberg, ... -- Oakland 2011
"Automatic Error Finding in Access-Control Policies"
Mahesh V. Tripunitara, ... -- CCS 2011
"Practical PIR for Electronic Commerce"
Ryan Henry, Femi Olumofin, Ian Goldberg, ... -- CCS 2011
"Telex: Anticensorship in the Network Infrastructure"
Ian Goldberg, ... -- Usenix 2011
"PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval"
Femi Olumofin, Ian Goldberg, ... -- Usenix 2011
"Enhancing Tor's Performance using Real-time Traffic Classification"
Mashael Al-Sabah, Kevin Bauer, Ian Goldberg, ... -- CCS 2012
"SkypeMorph: Protocol Obfuscation for Tor Bridges"
Hooman Mohajeri Moghaddam, Baiyu Li, Mohammad Derakhshani, Ian Goldberg, ... -- CCS 2012
"Optimally Robust Private Information Retrieval"
Casey Devet, Ian Goldberg, ... -- Usenix 2012
"One (Block) Size Fits All: PIR and SPIR Over Arbitrary-Length Records via Multi-block PIR Queries"
Ryan Henry, Yizhou Huang, Ian Goldberg, ... -- NDSS 2013
"An Empirical Evaluation of Relay Selection in Tor"
Kevin Bauer, ... -- NDSS 2013
"PCTCP: Per-Circuit TCP-over-IPsec Transport for Anonymous Communication Overlay Networks"
Ian Goldberg, ... -- CCS 2013
"Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation"
Frank Imeson, Ariq Emtenan, Siddharth Garg, Mahesh V. Tripunitara, ... -- Usenix 2013
"PrivEx: Private Collection of Traffic Statistics for Anonymous Communication Networks"
Tariq Elahi, Ian Goldberg, ... -- CCS 2014
"A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses"
Tao Wang, Ian Goldberg, ... -- CCS 2014
"The UNIX Process Identity Crisis: A Standards-Driven Approach to Setuid"
Mark Dittmer, Mahesh V. Tripunitara, ... -- CCS 2014
"Collaborative verification of information flow for a high-assurance app store"
Werner Dietl, ... -- CCS 2014
"Effective Attacks and Provable Defenses for Website Fingerprinting"
Tao Wang, Ian Goldberg, ... -- Usenix 2014
"Integrated Circuit (IC) Decamouflaging: Reverse Engineering Camouflaged ICs within Minutes (Not Years)"
Mohamed El Massad, Mahesh V. Tripunitara, ... -- NDSS 2015
"SoK: Secure Messaging"
Nik Unger, Ian Goldberg, ... -- Oakland 2015
"Deniable Key Exchanges for Secure Messaging"
Nik Unger, Ian Goldberg, ... -- CCS 2015
"Slitheen: Perfectly imitated decoy routing through traffic replacement"
Cecylia Bocovich, Ian Goldberg, ... -- CCS 2016
"Iron: Functional Encryption using Intel SGX"
Dhinakaran Vinayagamurthy, Sergey Gorbunov, ... -- CCS 2017
"Walkie-Talkie: An Efficient Defense Against Passive Website Fingerprinting Attacks"
Ian Goldberg, ... -- Usenix 2017
"ZeroTrace : Oblivious Memory Primitives from Intel SGX."
Sajin Sasy, Sergey Gorbunov, ... -- NDSS 2018
"Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions."
Stefanie Roos, Ian Goldberg, ... -- NDSS 2018
"The aftermath of a crypto-ransomware attack at a large academic institution"
Leah Zhang-Kennedy, ... -- Usenix 2018
"Secure Sublinear Time Differentially Private Median Computation"
Florian Kerschbaum, ... -- NDSS 2020
"Pointproofs: Aggregating Proofs for Multiple Vector Commitments"
Sergey Gorbunov, ... -- CCS 2020
"Cyber-Physical Inconsistency Vulnerability Identification for Safety Checks in Robotic Vehicles"
Yousra Aafer, ... -- CCS 2020
"Forensic Analysis in Access Control: Foundations and a Case-Study from Practice"
Nahid Juma, Xiaowei Huang, Mahesh V. Tripunitara, ... -- CCS 2020
"Post-quantum TLS without handshake signatures"
Douglas Stebila, ... -- CCS 2020
"Chaperone: Real-time Locking and Loss Prevention for Smartphones"
Jiayi Chen, Urs Hengartner, ... -- Usenix 2020
"Walking Onions: Scaling Anonymity Networks while Protecting Users"
Chelsea H. Komlo, Ian Goldberg, ... -- Usenix 2020
"Pixel: Multi-signatures for Consensus"
Sergey Gorbunov, ... -- Usenix 2020
"Secure Multi-party Computation of Differentially Private Median"
Florian Kerschbaum, ... -- Usenix 2020
"Obfuscated Access and Search Patterns in Searchable Encryption"
Zhiwei Shang, Simon Oya, Florian Kerschbaum, ... -- NDSS 2021
"Compact Certificates of Collective Knowledge"
Georgios Vlachos, ... -- Oakland 2021
"OSPREY: Recovery of Variable and Data Structure via Probabilistic Analysis for Stripped Binary"
Yousra Aafer, ... -- Oakland 2021
"STOCHFUZZ: Sound and Cost-effective Fuzzing of Stripped Binaries by Incremental and Stochastic Rewriting"
Yousra Aafer, ... -- Oakland 2021
"Secure Multi-party Computation of Differentially Private Heavy Hitters"
Florian Kerschbaum, ... -- CCS 2021
"Differential Privacy for Directional Data"
Florian Kerschbaum, ... -- CCS 2021
"Dissecting Residual APIs in Custom Android ROMs"
Zeinab El-Rewini, Yousra Aafer, ... -- CCS 2021
"Hiding the Access Pattern is Not Enough: Exploiting Search Pattern Leakage in Searchable Encryption"
Simon Oya, Florian Kerschbaum, ... -- Usenix 2021
"PACStack: an Authenticated Call Stack"
Hans Liljestrand, N. Asokan, ... -- Usenix 2021
"Android SmartTVs Vulnerability Discovery via Log-Guided Fuzzing"
Yousra Aafer, ... -- Usenix 2021
"Once is Never Enough: Foundations for Sound Statistical Inference in Tor Network Experimentation"
Justin Tracey, Ian Goldberg, ... -- Usenix 2021
"SoK: Demystifying Binary Lifters Through the Lens of Downstream Applications"
Yuyan Bao, ... -- Oakland 2022
"SoK: How Robust is Image Classification Deep Neural Network Watermarking?"
Nils Lukas, Edward Jiang, Xinda Li, Florian Kerschbaum, ... -- Oakland 2022
"Cache Refinement Type for Side-Channel Detection of Cryptographic Software"
Yuyan Bao, ... -- CCS 2022
"Fast Fully Oblivious Compaction and Shuffling"
Sajin Sasy, Ian Goldberg, ... -- CCS 2022
"Poirot: Probabilistically Recommending Protections for the Android Framework"
Zeinab El-Rewini, Yousra Aafer, ... -- CCS 2022
"Proof-of-Possession for KEM Certificates using Verifiable Generation"
Philip Hodges, Douglas Stebila, ... -- CCS 2022
"Selective MPC: Distributed Computation of Differentially Private Key-Value Statistics"
Thomas Humphries, Rasoul Akhavan Mahdavi, Shannon Veitch, Florian Kerschbaum, ... -- CCS 2022
"Aardvark: An Asynchronous Authenticated Dictionary with Applications to Account-based Cryptocurrencies"
Sergey Gorbunov, ... -- Usenix 2022
"Caring about Sharing: User Perceptions of Multiparty Data Sharing"
Bailey Kacsmar, Kyle Tilbury, Miti Mazmudar, Florian Kerschbaum, ... -- Usenix 2022
"ProFactory: Improving IoT Security via Formalized Protocol Customization"
Yousra Aafer, ... -- Usenix 2022
"Constant-weight PIR: Single-round Keyword PIR via Constant-weight Equality Operators"
Rasoul Akhavan Mahdavi, Florian Kerschbaum, ... -- Usenix 2022
"IHOP: Improved Statistical Query Recovery against Searchable Symmetric Encryption through Quadratic Optimization"
Simon Oya, Florian Kerschbaum, ... -- Usenix 2022