"An IPSec-based Host Architecture for Secure Internet Multicast"
Ran Canetti, Pau-Chen Cheng, Frederique Giraud, Dimitrios Pendarakis, Josyula R. Rao, Pankay Rohatgi, ... -- NDSS 2000
"Chameleon Signatures"
Hugo Krawczyk, Tal Rabin, ... -- NDSS 2000
"Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers"
Dalit Naor, ... -- Oakland 2000
"A Practically Implementable and Tractable Delegation Logic"
Benjamin Grosof, ... -- Oakland 2000
"Efficient Authentication and Signing of Multicast Streams over Lossy Channels"
Ran Canetti, ... -- Oakland 2000
"Verifying the EROS Confinement Mechanism"
Jonathan S. Shapiro, Sam Weber, ... -- Oakland 2000
"An Access Control Model for Simplifying Constraint Expression"
Trent Jaeger, ... -- CCS 2000
"A Secure JaveTM Virtual Machine"
Leendert van Doorn, ... -- Usenix 2000
"Can Pseudonymity Really Guarantee Privacy?"
Josyula R. Rao, Pankaj Rohatgi, ... -- Usenix 2000
"Efficient and Secure Source Authentication for Multicast"
Ran Canetti, ... -- NDSS 2001
"Cryptology As a Network Service"
Michael Spreitzer, ... -- NDSS 2001
"Paillier's cryptosystem revisited"
Rosario Gennaro, Nick Howgrave-Graham, ... -- CCS 2001
"Data Remanence in Semiconductor Devices"
Peter Gutmann, ... -- Usenix 2001
"Improving DES Coprocessor Throughput for Short Operations"
Mark Lindemann, ... -- Usenix 2001
"BlueBox : A Policy-Driven, Host-Based Intrusion Detection System"
Suresh N. Chari, Pau-Chen Cheng, ... -- NDSS 2002
"Partitioning Attacks: Or How to Rapidly Clone Some GSM Cards"
Josyula R. Rao, Pankaj Rohatgi, ... -- Oakland 2002
"Efficient, DoS-resistant, secure key exchange for internet protocols"
Ran Canetti, ... -- CCS 2002
"Runtime verification of authorization hook placement for the linux security modules framework"
Antony Edwards, Trent Jaeger, Xiaolan Zhang, ... -- CCS 2002
"Using CQUAL for Static Analysis of Authorization Hook Placement"
Xiaolan Zhang, Antony Edwards, Trent Jaeger, ... -- Usenix 2002
"Probabilistic Treatment of MIXes to Hamper Traffic Analysis"
Dakshi Agrawal, ... -- Oakland 2003
"Analyzing Integrity Protection in the SELinux Example Policy"
Trent Jaeger, Reiner Sailer, Xiaolan Zhang, ... -- Usenix 2003
"Keyboard Acoustic Emanations"
Dmitri Asonov, Rakesh Agrawal, ... -- Oakland 2004
"Attestation-based Policy Enforcement for Remote Access"
Reiner Sailer, Trent Jaeger, Xiaolan Zhang, Leendert van Doorn, ... -- CCS 2004
"Design and Implementation of a TCG-based Integrity Measurement Architecture"
Reiner Sailer, Xiaolan Zhang, Trent Jaeger, Leendert van Doorn, ... -- Usenix 2004
"Bind: A Time-Of-Use Attestation Service For Secure Distributed System"
Leendert van Doorn, ... -- Oakland 2005
"Untraceable RFID Tags via Insubvertible Encryption"
Jan Camenisch, ... -- CCS 2005
"New Approaches for Deniable Authentication"
Rosario Gennaro, ... -- CCS 2005
"An architecture for robust pseudo-random generation and Applications to /dev/random"
Shai Halevi, ... -- CCS 2005
"Toward Automated Information-Flow Integrity Verification for Security-Critical Applications"
Trent Jaeger, Reiner Sailer, ... -- NDSS 2006
"Fundamental Limits on the Anonymity Provided by the MIX Technique"
Dakshi Agrawal, ... -- Oakland 2006
"Deniable Authentication and Key Exchange"
Rosario Gennaro, Hugo Krawczyk, ... -- CCS 2006
"How to Win the Clone Wars: Efficient Periodic n-Times Anonymous Authentication"
Jan Camenisch, Susan Hohenberger, ... -- CCS 2006
"vTPM: Virtualizing the Trusted Platform Module"
Stefan Berger, Ramon Caceres, Kenneth A. Goldman, Ronald Perez, Reiner Sailer, Leendert van Doorn, ... -- Usenix 2006
"Beyond Stack Inspection: A Unified Access-Control and Information-Flow Security Model"
Marco Pistoia, ... -- Oakland 2007
"Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control"
Pau-Chen Cheng, Pankaj Rohatgi, Claudia Keser, Paul A. Karger, ... -- Oakland 2007
"Trojan Detection using IC Fingerprinting"
Dakshi Agrawal, Selcuk Baktir, Pankaj Rohatgi, ... -- Oakland 2007
"Chosen-Ciphertext Secure Proxy Re-Encryption"
Ran Canetti, ... -- CCS 2007
"Security under Key-Dependent Inputs"
Shai Halevi, Hugo Krawczyk, ... -- CCS 2007
"Secretly Monopolizing the CPU Without Superuser Privileges"
Dan Tsafrir, ... -- Usenix 2007
"Preserving Caller Anonymity in Voice-over-IP Networks"
Mudhakar Srivatsa, Arun Iyengar, ... -- Oakland 2008
"Trust Management for Secure Information Flows"
Mudhakar Srivatsa, Pankaj Rohatgi, ... -- CCS 2008
"AutoISES: Automatically Inferring Security Specification and Detecting Violations"
Xiaolan Zhang, ... -- Usenix 2008
"Attacking cryptographic schemes based on 'perturbation polynomials'"
Craig Gentry, Shai Halevi, ... -- CCS 2009
"Certificateless onion routing"
Rosario Gennaro, ... -- CCS 2009
"The fable of the bees: incentivizing robust revocation decision making in ad hoc networks"
Mudhakar Srivatsa, ... -- CCS 2009
"Effective implementation of the cell broadband engine isolation loader"
Wilfred Plouffe, ... -- CCS 2009
"A metadata calculus for secure information sharing"
Mudhakar Srivatsa, Dakshi Agrawal, ... -- CCS 2009
"Where Do You Want to Go Today? Escalating Privileges by Pathname Manipulation"
Suresh N. Chari, Shai Halevi, Wietse Venema, ... -- NDSS 2010
"Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors"
Mihai Christodorescu, Reiner Sailer, ... -- Oakland 2010
"Scalable Parametric Verification of Secure Systems: How to Verify Reference Monitors without Worrying about Data Structure Size"
Arvind Seshadri, ... -- Oakland 2010
"HyperSentry: enabling stealthy in-context measurement of hypervisor integrity"
Xiaolan Zhang, ... -- CCS 2010
"AccessMiner: using system-centric models for malware protection"
Mihai Christodorescu, ... -- CCS 2010
"Proofs of Ownerhip in Remote Storage Systems"
Shai Halevi, ... -- CCS 2011
"Sedic: Privacy-Aware Data Intensive Computing on Hybrid Cloud"
Yaoping Ruan, ... -- CCS 2011
"SICE: A Hardware-Level Strongly Isolated Computing Environment for x86 Multi-core Platforms"
Xiaolan Zhang, ... -- CCS 2011
"Ciphers that Encipher their own Keys"
David Cash, ... -- CCS 2011
"Deanonymizing Mobility Traces: Using Social Network as a Side-Channel"
Mudhakar Srivatsa, ... -- CCS 2012
"Practical Yet Universally Composable Two-Server Password-Authenticated Secret Sharing"
Jan Camenisch, Gregory Neven, ... -- CCS 2012
"Using Probabilistic Generative Models for Ranking Risks of Android Apps"
Ian Molloy, ... -- CCS 2012
"Pinocchio: Nearly Practical Verifiable Computation"
Craig Gentry, Mariana Raykova, ... -- Oakland 2013
"Outsourced Symmetric Private Information Retrieval"
Charanjit Jutla, Hugo Krawczyk, Marcel C. Rosu, Michael Steiner, ... -- CCS 2013
"Practical Comprehensive Bounds on Surreptitious Communication over DNS"
Josyula R. Rao, Reiner Sailer, Douglas Lee Schales, Marc Ph. Stoecklin, Wietse Venema, ... -- Usenix 2013
"Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation"
Charanjit Jutla, Hugo Krawczyk, Marcel C. Rosu, Michael Steiner, ... -- NDSS 2014
"Structural Data De-anonymization: Quantification, Practice, and Implications"
Mudhakar Srivatsa, ... -- CCS 2014
"Aletheia: Improving the Usability of Static Security Analysis"
Omer Tripp, Salvatore Guarnieri, Marco Pistoia, Aleksandr Aravkin, ... -- CCS 2014
"A Bayesian Approach to Privacy Enforcement in Smartphones"
Omer Tripp, Julia Rubin, ... -- Usenix 2014
"SPHINX: Detecting Security Attacks in Software-Defined Networks"
Mohan Dhawan, Rishabh Poddar, Kshiteej Mahajan, Vijay Mann, ... -- NDSS 2015
"WebCapsule: Towards a Lightweight Forensic Engine for Web Browsers"
Kapil Singh, ... -- CCS 2015
"The Dropper Effect: Insights into Malware Distribution with Downloader Graph Analytics"
Jiyong Jang, ... -- CCS 2015
"SecGraph: A Uniform and Open-source Evaluation System for Graph Data Anonymization and De-anonymization"
Xin Hu, ... -- Usenix 2015
"Dependence Makes You Vulnberable: Differential Privacy Under Dependent Tuples"
Supriyo Chakraborty, ... -- NDSS 2016
"A Unilateral-to-Mutual Authentication Compiler for Key Exchange (with Applications to Client Authentication in TLS 1.3)"
Hugo Krawczyk, ... -- CCS 2016
"Attribute-based Key Exchange with General Policies"
Hugo Krawczyk, Tal Rabin, ... -- CCS 2016
"Implementing BP-Obfuscation Using Graph-Induced Encoding"
Shai Halevi, Tzipora Halevi, Victor Shoup, ... -- CCS 2017
"Securing Real-Time Microcontroller Systems through Customized Memory View Switching."
Zhongshu Gu, ... -- NDSS 2018
"Threat Intelligence Computing"
Xiaokui Shu, Frederico Araujo, Douglas Lee Schales, Marc Ph. Stoecklin, Jiyong Jang, Heqing Huang, Josyula R. Rao, ... -- CCS 2018
"Security Namespace: Making Linux Security Frameworks Available to Containers"
Mimi Zohar, Dimitrios Pendarakis, Zhongshu Gu, ... -- Usenix 2018
"Houdini's Escape: Breaking the Resource Rein of Linux Control Groups"
Zhongshu Gu, Hani Jamjoom, ... -- CCS 2019
"PolicyLint: Investigating Internal Privacy Policy Contradictions on Google Play"
Kapil Singh, ... -- Usenix 2019
"MOPT: Optimized Mutation Scheduling for Fuzzers"
Wei-Han Lee, ... -- Usenix 2019
"Text Captcha Is Dead? A Large Scale Deployment and Empirical Study"
Changchang Liu, ... -- CCS 2020
"Actions Speak Louder than Words: Entity-Sensitive Privacy Policy and Data Flow Analysis with PoliCheck"
Benjamin Andow, Kapil Singh, ... -- Usenix 2020
"Cardpliance: PCI DSS Compliance of Android Applications"
Benjamin Andow, ... -- Usenix 2020
"Data Poisoning Attacks to Deep Learning Based Recommender Systems"
Bin Liu, ... -- NDSS 2021
"AHEAD: Adaptive Hierarchical Decomposition for Range Query under Local Differential Privacy"
Changchang Liu, ... -- CCS 2021
"WristPrint: Characterizing User Re-identification Risks from Wrist-worn Accelerometry Data"
Supriyo Chakraborty, ... -- CCS 2021
"UNIFUZZ: A Holistic and Pragmatic Metrics-Driven Platform for Evaluating Fuzzers"
Wei-Han Lee, ... -- Usenix 2021
"Understanding IoT Security from a Market-Scale Perspective"
Sunil Manandhar, ... -- CCS 2022
"Transferring Adversarial Robustness Through Robust Representation Matching"
Kevin Eykholt, ... -- Usenix 2022
"Smart Home Privacy Policies Demystified: A Study of Availability, Content, and Coverage"
Kapil Singh, ... -- Usenix 2022