"Statistical Identification of Encrypted Web Browsing Traffic"
Daniel R. Simon, Yi-Min Wang, Wilf Russell, Venkat Padmanabhan, Lili Qiu, ... -- Oakland 2002
"Binder, a Logic-based Security Language"
John DeTreville, ... -- Oakland 2002
"Access Control Based on Execution History"
Cedric Fournet, ... -- NDSS 2003
"Moderately Hard, Memory-Bound Functions"
Michael Burrows, Mark Manasse, Ted Wobber, ... -- NDSS 2003
"Specifying and Verifying Hardware for Tamper-Resistant Software"
Chandramohan Thekkath, ... -- Oakland 2003
"Securing OLAP Data Cubes Against Privacy Breaches"
Dan Simon, ... -- Oakland 2004
"Verifying Policy-Based Security for Web Services"
Karthikeyan Bhargavan, Cedric Fournet, Andrew D. Gordon, ... -- CCS 2004
"Privacy-Preserving Friends Troubleshooting Network"
Helen J. Wang, ... -- NDSS 2005
"A Black-Box Tracing Technique to Identify Causes of Least-Privilege Incompatibilities"
John Dunagan, Chad Verbowski, Yi-Min Wang, ... -- NDSS 2005
"Applications of Secure Electronic Voting to Automated Privacy-Preserving Troubleshooting"
David Jao, Helen J. Wang, ... -- CCS 2005
"Control-Flow Integrity: Principles, Implementations, and Applications"
Mihai Budiu, Ulfar Erlingsson, ... -- CCS 2005
"Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities"
Yi-Min Wang, Doug Beck, Chad Verbowski, Shuo Chen, Sam King, ... -- NDSS 2006
"SubVirt: Implementing malware with virtual machines"
Yi-Min Wang, Chad Verbowski, Helen J. Wang, Jacob R. Lorch, ... -- Oakland 2006
"Data Collection With Self-Enforcing Privacy"
Frank McSherry, Ilya Mironov, ... -- CCS 2006
"A Quantitative Study of Forum Spamming Using Context-based Analysis"
Yi-Min Wang, Ming Ma, ... -- NDSS 2007
"Generic Application-Level Protocol Analyzer and its Language"
Helen J. Wang, John Dunagan, ... -- NDSS 2007
"A Systematic Approach to Uncover Security Flaws in GUI Logic"
Shuo Chen, Ralf Sasse, Helen J. Wang, Yi-Min Wang, ... -- Oakland 2007
"ShieldGen: Automatic Data Patch Generation for Unknown Vulnerabilities with Informed Probing"
Weidong Cui, Marcus Peinado, Helen J. Wang, ... -- Oakland 2007
"An Analysis of Browser Domain-Isolation Bugs and A Light-Weight Transparent Defense Mechanism"
Shuo Chen, Yi-Min Wang, David Ross, ... -- CCS 2007
"Asirra: A CAPTCHA that Exploits Interest-Aligned Manual Image Categorization"
Jeremy Elson, John R. Douceur, Jon Howell, ... -- CCS 2007
"Discoverer: Automatic Protocol Reverse Engineering from Network Traces"
Weidong Cui, Helen J. Wang, ... -- Usenix 2007
"Memory Performance Attacks: Denial of Memory Service in Multi-Core Systems"
Thomas Moscibroda, Onur Mutlu, ... -- Usenix 2007
"Automated Whitebox Fuzz Testing"
Patrice Godefroid, ... -- NDSS 2008
"Towards Practical Biometric Key Generation with Randomized Biometric Templates"
Seny Kamara, ... -- CCS 2008
"Tupni: Automatic Reverse Engineering of Input Formats"
Weidong Cui, Helen J. Wang, ... -- CCS 2008
"Panalyst: Privacy-Aware Remote Error Analysis on Commodity Software"
Zhuowei Li, ... -- Usenix 2008
"Sphinx: A Compact and Provably Secure Mix Format"
George Danezis, ... -- Oakland 2009
"Pretty-Bad-Proxy: An Overlooked Adversary in Browsers' HTTPS Deployments"
Shuo Chen, Yi Wang, Ming Zhang, ... -- Oakland 2009
"It's No Secret. Measuring the Security and Reliability of Authentication via 'Secret' Questions"
Stuart Schechter, Alice Brush, ... -- Oakland 2009
"Improving privacy and security in multi-authority attribute-based encryption"
Melissa Chase, ... -- CCS 2009
"Ripley: automatically securing web 2.0 applications through replicated execution"
Benjamin Livshits, ... -- CCS 2009
"Secure in-VM monitoring using hardware virtualization"
Weidong Cui, ... -- CCS 2009
"Countering kernel rootkits with lightweight hook protection"
Weidong Cui, ... -- CCS 2009
"Mapping kernel objects to enable systematic integrity checking"
Weidong Cui, Marcus Peinado, ... -- CCS 2009
"Baggy Bounds Checking: An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors"
Manuel Costa, Miguel Castro, ... -- Usenix 2009
"NOZZLE: A Defense Against Heap-spraying Code Injection Attacks"
Benjamin Livshits, Benjamin Zorn, ... -- Usenix 2009
"GATEKEEPER: Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code"
Benjamin Livshits, ... -- Usenix 2009
"The Multi-Principal OS Construction of the Gazelle Web Browser"
Helen J. Wang, Piali Choudhury, Herman Venter, ... -- Usenix 2009
"On Network-level Clusters for Spam Detection"
Yinglian Xie, Fang Yu, ... -- NDSS 2010
"Side-Channel Leaks in Web Applications: a Reality Today, a Challenge Tomorrow"
Shuo Chen, ... -- Oakland 2010
"Investigation of Triangular Spamming: a Stealthy and Efficient Spamming Technique"
Yinglian Xie, Fang Yu, ... -- Oakland 2010
"On the Incoherencies in Web Browser Access Control Policies"
Alexander Moshchuk, Helen J. Wang, ... -- Oakland 2010
"ConScript: Specifying and Enforcing Fine-Grained Security Policies for JavaScript in the Browser"
Benjamin Livshits, ... -- Oakland 2010
"Searching the Searchers with SearchAudit"
John P. John, Fang Yu, Yinglian Xie, Martin Abadi, ... -- Usenix 2010
"Using Classification to Protect the Integrity of Spectrum Measurements in White Space Networks"
Ranyeer Chandra, ... -- NDSS 2011
"Verified Security for Browser Extensions"
Benjamin Livshits, Nikhil Swamy, ... -- Oakland 2011
"RePriv: Re-Imagining Content Personalization and In-Browser Privacy"
Benjamin Livshits, ... -- Oakland 2011
"Memoir: Practical State Continuity for Protected Modules"
Bryan Parno, Jacob R. Lorch, John R. Douceur, James Mickens, ... -- Oakland 2011
"How to Shop for Free Online - Security Analysis of Cashier-as-a-Service Based Web Stores"
Shuo Chen, Shaz Qadeer, ... -- Oakland 2011
"Extracting and Verifying Cryptographic Models from C Protocol Code by Symbolic Execution"
Andrew D. Gordon, ... -- CCS 2011
"Modular Code-Based Cryptographic Verification"
Cedric Fournet, Markulf Kohlweiss, ... -- CCS 2011
"Information-Flow Types for Homomorphic Encryptions"
Cedric Fournet, ... -- CCS 2011
"Practical Delegation of Computation using Multiple Servers"
Guy N. Rothblum, ... -- CCS 2011
"ScriptGard: Automatic Context-Sensitive Sanitization for Large-Scale Legacy Web Applications"
David Molnar, Benjamin Livshits, ... -- CCS 2011
"These Aren't the Droids You're Looking For: Retrofitting Android to Protect Data from Imperious Applications"
Jaeyeon Jung, Stuart Schechter, ... -- CCS 2011
"Fast and Precise Sanitizer Analysis with BEK"
Benjamin Livshits, David Molnar, Margus Veanes, ... -- Usenix 2011
"ZOZZLE: Fast and Precise In-Browser JavaScript Malware Detection"
Benjamin Livshits, Benjamin Zorn, ... -- Usenix 2011
"Permission Re-Delegation: Attacks and Defenses"
Helen J. Wang, Alexander Moshchuk, ... -- Usenix 2011
"deSEO: Combating Search-Result Poisoning"
Fang Yu, Yinglian Xie, Martin Abadi, ... -- Usenix 2011
"You Can Run, but You Can't Hide: Exposing Network Location for Targeted DoS Attacks in Cellular Networks"
Ming Zhang, Yi-Min Wang, ... -- NDSS 2012
"Host Fingerprinting and Tracking on the Web: Privacy and Security Implications"
Yinglian Xie, Fang Yu, Martin Abadi, ... -- NDSS 2012
"Foundations of Logic-Based Trust Management"
Moritz Y. Becker, ... -- Oakland 2012
"User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems"
Alexander Moshchuk, Bryan Parno, Helen J. Wang, ... -- Oakland 2012
"Signing Me onto Your Accounts through Facebook and Google: a Traffic-Guided Security Study of Commercially Deployed Single-Sign-On Web Services"
Shuo Chen, ... -- Oakland 2012
"Rozzle: De-Cloaking Internet Malware"
Benjamin Livshits, Benjamin Zorn, ... -- Oakland 2012
"[SoK] The quest to replace passwords: A framework for comparative evaluation of web authentication schemes"
Cormac Herley, ... -- Oakland 2012
"Populated IP Addresses -- Classification and Applications"
Fang Yu, Yinglian Xie, ... -- CCS 2012
"Innocent by Association: Early Recognition of Legitimate Users"
Yinglian Xie, Fang Yu, Qifa Ke, Martin Abadi, ... -- CCS 2012
"Full Proof Cryptography: Verifiable Compilation of Efficient Zero-Knowledge Protocols"
Santiago Zanella-Beguelin, ... -- CCS 2012
"Knowing Your Enemy: Understanding and Detecting Malicious Web Advertising"
Yinglian Xie, Fang Yu, ... -- CCS 2012
"Privacy-Aware Personalization for Mobile Advertising"
Suman Nath, ... -- CCS 2012
"Collaborative TCP Sequence Number Inference Attack"
Yinglian Xie, ... -- CCS 2012
"Operating System Framed in Case of Mistaken Identity"
Stuart Schechter, ... -- CCS 2012
"On Significance of the Least Significant Bits For Differential Privacy"
Ilya Mironov, ... -- CCS 2012
"Dynamic Searchable Symmetric Encryption"
Seny Kamara, Tom Roeder, ... -- CCS 2012
"Verified Security of Redundancy-Free Encryption from Rabin and RSA"
Santiago Zanella-Beguelin, ... -- CCS 2012
"Salus: A System for Server-Aided Secure Function Evaluation"
Seny Kamara, ... -- CCS 2012
"Impact of Spam Exposure on User Engagement"
Justin M. Rao, ... -- Usenix 2012
"Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services"
Stefan Saroiu, ... -- Usenix 2012
"STEALTHMEM: System-Level Protection Against Cache-Based Side Channel Attacks in the Cloud"
Marcus Peinado, Gloria Mainar-Ruiz, ... -- Usenix 2012
"Progressive Authentication: Deciding When to Authenticate on Mobile Phones"
Oriana Riva, Karin Strauss, Dimitrios Lymberopoulos, ... -- Usenix 2012
"Clickjacking: Attacks and Defenses"
Alex Moshchuk, Helen J. Wang, Stuart Schechter, ... -- Usenix 2012
"Tracking Rootkit Footprints with a Practical Memory Analysis System"
Weidong Cui, Marcus Peinado, ... -- Usenix 2012
"InteGuard: Toward Automatic Protection of Third-Party Web Service Integrations"
Shuo Chen, ... -- NDSS 2013
"Intention and Origination: An Inside Look at Large-Scale Bot Queries"
Yinglian Xie, Fang Yu, ... -- NDSS 2013
"Fix Me Up: Repairing Access-Control Bugs in Web Applications"
Kathryn S. McKinley, ... -- NDSS 2013
"Towards Practical Reactive Security Audit Using Extended Static Checkers"
Shuvendu K. Lahiri, ... -- Oakland 2013
"Finding the Linchpins of the Dark Web: a Study on Topologically Dedicated Hosts on Malicious Web Infrastructures"
Yinglian Xie, Fang Yu, ... -- Oakland 2013
"Pinocchio: Nearly Practical Verifiable Computation"
Bryan Parno, Jon Howell, ... -- Oakland 2013
"Implementing TLS with Verified Cryptographic Security"
Cedric Fournet, Markulf Kohlweiss, ... -- Oakland 2013
"Fully Automated Analysis of Padding-Based Encryption in the Computational Model"
Santiago Zanella-Beguelin, ... -- CCS 2013
"Diglossia: Detecting Code Injection Attacks With Precision and Efficiency"
Kathryn S. McKinley, ... -- CCS 2013
"deDacota: Toward Preventing Server-Side XSS via Automatic Code and Data Separation"
Weidong Cui, Mariusz Jakubowski, Marcus Peinado, ... -- CCS 2013
"Content-Based Isolation: Rethinking Isolation Policy Design on Client Systems"
Alexander Moshchuk, Helen J. Wang, ... -- CCS 2013
"Unauthorized Origin Crossing on Mobile Platforms: Threats and Mitigation"
Rui Wang, Shuo Chen, ... -- CCS 2013
"Automatic Mediation of Privacy-Sensitive Resource Access in Smartphone Applications"
Benjamin Livshits, Jaeyeon Jung, ... -- Usenix 2013
"ZQL: A Compiler for Privacy-Preserving Data Processing"
Cedric Fournet, Markulf Kohlweiss, George Danezis, ... -- Usenix 2013
"Explicating SDKs: Uncovering Assumptions Underlying Secure Authentication and Authorization"
Rui Wang, Shuo Chen, Shaz Qadeer, Yuri Gurevich, ... -- Usenix 2013
"Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers"
Benjamin Livshits, Helen J. Wang, Eyal Ofek, ... -- Usenix 2013
"Web PKI: Closing the Gap between Guidelines and Practices"
Martin Abadi, Andrew Birrell, Ilya Mironov, Ted Wobber, Yinglian Xie, ... -- NDSS 2014
"Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS"
Cedric Fournet, ... -- Oakland 2014
"Pivot: Fast, Synchronous Mashup Isolation Using Generator Chains"
James Mickens, ... -- Oakland 2014
"Bootstrapping Privacy Compliance in Big Data Systems"
Janice Tsai, Jeannette M. Wing, ... -- Oakland 2014
"Upgrading Your Android, Elevating My Malware: Privilege Escalation Through Mobile OS Updating"
Rui Wang, ... -- Oakland 2014
"PermaCoin: Repurposing Bitcoin Work for Data Preservation"
Bryan Parno, ... -- Oakland 2014
"World-Driven Access Control for Continuous Sensing"
David Molnar, Alexander Moshchuk, Helen J. Wang, ... -- CCS 2014
"OAuth Demystified for Mobile Application Developers"
Shuo Chen, ... -- CCS 2014
"Algebraic MACs and Keyed-Verification Anonymous Credentials"
Melissa Chase, Greg Zaverucha, ... -- CCS 2014
"Characterizing Large-Scale Click Fraud in ZeroAccess"
Saikat Guha, ... -- CCS 2014
"ZØ: An Optimizing Distributing Zero-Knowledge Compiler"
Benjamin Livshits, ... -- Usenix 2014
"Brahmastra: Driving Apps to Test the Security of Third-Party Components"
Jaeyeon Jung, ... -- Usenix 2014
"Towards Reliable Storage of 56-bit Secrets in Human Memory"
Stuart Schechter, ... -- Usenix 2014
"Password Portfolios and the Finite-Effort User: Sustainably Managing Large Numbers of Accounts"
Dinei Florencio, Cormac Herley, ... -- Usenix 2014
"Telepathwords: Preventing Weak Passwords by Reading Users' Minds"
Cormac Herley, Stuart Schechter, ... -- Usenix 2014
"Bloom Cookies: Web Search Personalization without User Tracking"
Suman Nath, ... -- NDSS 2015
"A Messy State of the Union: Taming the Composite State Machines of TLS"
Cedric Fournet, Markulf Kohlweiss, ... -- Oakland 2015
"Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems"
Weidong Cui, Marcus Peinado, ... -- Oakland 2015
"Geppetto: Versatile Verifiable Computation"
Craig Costello, Cedric Fournet, Jon Howell, Markulf Kohlweiss, Michael Naehrig, Olga Ohrimenko, Bryan Parno, ... -- Oakland 2015
"Post-quantum key exchange for the TLS protocol from the ring learning with errors problem"
Craig Costello, Michael Naehrig, ... -- Oakland 2015
"Securing MapReduce with SGX: Data Analytics in the Untrusted Cloud using COTS Secure Processors"
Manuel Costa, Cedric Fournet, Christos Gkantsidis, Marcus Peinado, Gloria Mainar-Ruiz, ... -- Oakland 2015
"Securing Multiparty Online Services via Certified Symbolic Transactions"
Shuo Chen, Shaz Qadeer, Rui Wang, ... -- Oakland 2015
"SurroundWeb: Mitigating Privacy Concerns in a 3D Web Browser"
David Molnar, Eyal Ofek, Chris Rossbach, Benjamin Livshits, Alexander Moshchuk, Helen J. Wang, Ran Gal, ... -- Oakland 2015
"Inference Attacks against Property-Preserving Encrypted Databases"
Seny Kamara, ... -- CCS 2015
"GRECS: Graph Encryption for Approximate Shortest Distance Queries"
Seny Kamara, ... -- CCS 2015
"Observing and Preventing Leakage in MapReduce"
Olga Ohrimenko, Cedric Fournet, Manuel Costa, Christos Gkantsidis, Markulf Kohlweiss, ... -- CCS 2015
"Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice"
Santiago Zanella-Beguelin, ... -- CCS 2015
"Cookies Lack Integrity: Real-World Implications"
Shuo Chen, ... -- Usenix 2015
"Differentially Private Password Frequency Lists"
Jeremiah Blocki, ... -- NDSS 2016
"Cinderella: Turning Shabby X.509 Certificates into Elegant Anonymous Credentials with the Magic of Verifiable Computation"
Antoine Delignat-Lavaud, Cedric Fournet, Markulf Kohlweiss, Bryan Parno, ... -- Oakland 2016
"Downgrade Resilience in Key-Exchange Protocols"
Cedric Fournet, Markulf Kohlweiss, Santiago Zanella-Beguelin, ... -- Oakland 2016
"Prepose: Privacy, Security, and Reliability for Gesture-Based Programming"
Benjamin Livshits, David Molnar, Margus Veanes, ... -- Oakland 2016
"Security Analysis of Emerging Smart Home Applications"
Jaeyeon Jung, ... -- Oakland 2016
"Hash First, Argue Later: Adaptive Verifiable Computations on Outsourced Data"
Cedric Fournet, Markulf Kohlweiss, Olga Ohrimenko, Bryan Parno, ... -- CCS 2016
"Transparency Overlays and Applications"
Melissa Chase, ... -- CCS 2016
"The Web/Local Boundary Is Fuzzy - A Security Study of Chrome's Process-based Sandboxing"
Shuo Chen, ... -- CCS 2016
"Frodo: Take off the ring! Practical, Quantum-Secure Key Exchange from LWE"
Craig Costello, Michael Naehrig, ... -- CCS 2016
"Authenticated Network Time Synchronization"
Greg Zaverucha, ... -- Usenix 2016
"SGX-Enabled Oblivious Machine Learning"
Olga Ohrimenko, Manuel Costa, Cedric Fournet, Sebastian Nowozin, Felix Schuster, Kapil Vaswani, ... -- Usenix 2016
"Hello from the Other Side: SSH over Robust Cache Covert Channels in the Cloud"
Daniel Gruss, ... -- NDSS 2017
"T-SGX: Eradicating Controlled-Channel Attacks Against Enclave Programs"
Marcus Peinado, ... -- NDSS 2017
"HOP: Hardware makes Obfuscation Practical"
Nishanth Chandran, Satya Lokam, Vipal Goyal, ... -- NDSS 2017
"Implementing and Proving the TLS 1.3 Record Layer"
Antoine Delignat-Lavaud, Cedric Fournet, Markulf Kohlweiss, Jonathan Protzenko, Aseem Rastogi, Nikhil Swamy, Santiago Zanella-Beguelin, ... -- Oakland 2017
"Pyramid: Enhancing Selectivity in Big Data Protection with Count Featurization"
Siddhartha Sen, ... -- Oakland 2017
"SoK: Science, Security, and the Elusive Goal of Security as a Scientific Pursuit"
Cormac Herley, ... -- Oakland 2017
"FAME: Fast Attribute-based Message Encryption"
Melissa Chase, ... -- CCS 2017
"Fast Private Set Intersection from Homomorphic Encryption"
Hao Chen (2), Kim Laine, ... -- CCS 2017
"HACL*: A Verified Modern Cryptographic Library"
Protzenko Jonathan, ... -- CCS 2017
"Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives"
Melissa Chase, Greg Zaverucha, ... -- CCS 2017
"Hacking in Darkness: Return-oriented Programming against Secure Enclaves"
Marcus Peinado, ... -- Usenix 2017
"Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing"
Marcus Peinado, ... -- Usenix 2017
"Speeding up detection of SHA-1 collision attacks using unavoidable attack conditions"
Daniel Shumow, ... -- Usenix 2017
"Vale: Verifying High-Performance Cryptographic Assembly Code"
Barry Bond, Chris Hawblitzel, K. Rustan M. Leino, Jacob R. Lorch, Srinath Setty, ... -- Usenix 2017
"EnclaveDB: A Secure Database using SGX"
Kapil Vaswani, Manuel Costa, ... -- Oakland 2018
"PIR with Compressed Queries and Amortized Query Processing"
Hao Chen, Kim Laine, Srinath Setty, ... -- Oakland 2018
"Labeled PSI from Fully Homomorphic Encryption with Malicious Security"
Hao Chen (2), Kim Laine, ... -- CCS 2018
"Secure Outsourced Matrix Computation and Application to Neural Networks"
Kristin Lauter, ... -- CCS 2018
"We Still Don't Have Secure Cross-Domain Requests: an Empirical Study of CORS"
Shuo Chen, ... -- Usenix 2018
"All Your GPS Are Belong To Us: Towards Stealthy Manipulation of Road Navigation Systems"
Yuanchao Shu, ... -- Usenix 2018
"Dominance as a New Trusted Computing Primitive for the Internet of Things"
Paul England, Marcus Peinado, Sangho Lee, Andrey Marochko, Dennis Mattoon, ... -- Oakland 2019
"Formally Verified Cryptographic Web Applications in WebAssembly"
Jonathan Protzenko, ... -- Oakland 2019
"Theory and Practice of Finding Eviction Sets"
Boris Kopf, ... -- Oakland 2019
"Efficient Multi-Key Homomorphic Encryption with Packed Ciphertexts with Application to Oblivious Neural Network Inference"
Hao Chen (2), Wei Dai, Yongsoo Song, ... -- CCS 2019
"Onion Ring ORAM: Efficient Constant Bandwidth Oblivious RAM from (Leveled) TFHE"
Hao Chen (2), ... -- CCS 2019
"Power Adjusting and Bribery Racing: Novel Mining Attacks in the Bitcoin System"
Shang Gao, ... -- CCS 2019
"SEEMless: Secure End-to-End Encrypted Messaging with less Trust"
Melissa Chase, Esha Ghosh, ... -- CCS 2019
"All Your Clicks Belong to Me: Investigating Click Interception on the Web"
Sangho Lee, ... -- Usenix 2019
"EverParse: Verified Secure Zero-Copy Parsers for Authenticated Message Formats"
Tahina Ramananandro, Antoine Delignat-Lavaud, Cedric Fournet, Nikhil Swamy, Jonathan Protzenko, ... -- Usenix 2019
"XONN: XNOR-based Oblivious Deep Neural Network Inference"
Hao Chen (2), Kim Laine, Kristin Lauter, ... -- Usenix 2019
"Are We Susceptible to Rowhammer? An End-to-End Methodology for Cloud Providers"
Lucian Cojocar, Stefan Saroiu, Alec Wolman, ... -- Oakland 2020
"Cornucopia: Temporal Safety for CHERI Heaps"
David Chisnall, ... -- Oakland 2020
"EverCrypt: A Fast, Verified, Cross-Platform Crytographic Provider"
Jonathan Protzenko, Chris Hawblitzel, Joonwon Choi, Antione Delignat-Lavaud, Cedric Fournet, Tahina Ramananandro, Nikhil Swamy, ... -- Oakland 2020
"Replicated State Machines Without Replicated Execution"
Jonathan Lee, Srinath Setty, ... -- Oakland 2020
"Spectector: Principled Detection of Speculative Information Flows"
Boris Kopf, ... -- Oakland 2020
"CrypTFlow2: Practical 2-Party Secure Inference"
Deevashwer Rathee, Mayank Rathee, Nishant Kumar, Nishanth Chandran, Divya Gupta, Aseem Rastogi, Rahul Sharma, ... -- CCS 2020
"HACL×N: Verified Generic SIMD Crypto (for all your favourite platforms)"
Jonathan Protzenko, Santiago Zanella-Beguelin, ... -- CCS 2020
"Analyzing Information Leakage of Updates to Natural Language Models"
Santiago Zanella-Beguelin, Lukas Wutschitz, Shruti Tople, Victor Ruhle, Andrew Paverd, Boris Kopf, Marc Brockschmidt, ... -- CCS 2020
"The Signal Private Group System and Anonymous Credentials Supporting Efficient Verifiable Encryption"
Melissa Chase, Greg Zaverucha, ... -- CCS 2020
"Visor: Privacy-Preserving Video Analytics as a Cloud Service"
Rishabh Poddar, Ganesh Ananthanarayanan, Srinath Setty, Stavros Volos, ... -- Usenix 2020
"SANNS: Scaling Up Secure Approximate k-Nearest Neighbors Search"
Hao Chen, Ilya Razenshteyn, ... -- Usenix 2020
"A Security Model and Fully Verified Implementation for the IETF QUIC Record Layer"
Antoine Delignat-Lavaud, Cedric Fournet, Jonathan Protzenko, Tahina Ramananandro, ... -- Oakland 2021
"Hardware-Software Contracts for Secure Speculation"
Boris Kopf, ... -- Oakland 2021
"SmartPulse: Automated Checking of Temporal Properties in Smart Contracts"
Shuvendu K. Lahiri, ... -- Oakland 2021
"HyperFuzzer: An Efficient Hybrid Fuzzer For Virtual CPUs"
Xinyang Ge, Patrice Godefroid, Weidong Cui, ... -- CCS 2021
"Labeled PSI from Homomorphic Encryption with Reduced Computation and Communication"
Radames Cruz Moreno, Wei Dai, Kim Laine, ... -- CCS 2021
"DICE*: A Formally Verified Implementation of DICE Measured Boot"
Aseem Rastogi, Naman Gupta, Kapil Vaswani, ... -- Usenix 2021
"CACTI: Captcha Avoidance via Client-side TEE Integration"
Andrew Paverd, ... -- Usenix 2021
"Leakage of Dataset Properties in Multi-Party Machine Learning"
Shruti Tople, ... -- Usenix 2021
"Stars Can Tell: A Robust Method to Defend against GPS Spoofing Attacks using Off-the-shelf Chipset"
Yuanchao Shu, ... -- Usenix 2021
"Transparency Dictionaries with Succinct Proofs of Correct Operation"
Srinath Setty, ... -- NDSS 2022
"A Secret-Free Hypervisor: Rethinking Isolation in the Age of Speculative Vulnerabilities"
Hongyan Xia, Istvan Haller, David Chisnall, ... -- Oakland 2022
"HardLog: Practical Tamper-Proof System Auditing Using a Novel Audit Device"
Sangho Lee, Marcus Peinado, ... -- Oakland 2022
"Noise: A Library of Verified High-Performance Secure Channel Protocol Implementations"
Jonathan Protzenko, ... -- Oakland 2022
"Property Inference from Poisoning"
Esha Ghosh, Melissa Chase, ... -- Oakland 2022
"Hecate: Lifting and Shifting On-Premises Workloads to an Untrusted Cloud"
Xinyang Ge, Weidong Cui, ... -- CCS 2022
"Ibex: Privacy-preserving Ad Conversion Tracking and Bidding"
Sebastian Angel, ... -- CCS 2022
"Proof-of-Possession for KEM Certificates using Verifiable Generation"
Greg Zaverucha, ... -- CCS 2022
"Shorter Signatures Based on Tailor-Made Minimalist Symmetric-Key Crypto"
Greg Zaverucha, ... -- CCS 2022
"Incremental Offline/Online PIR"
Sebastian Angel, ... -- Usenix 2022
"SIMC: ML Inference Secure Against Malicious Clients at Semi-Honest Cost"
Nishanth Chandran, Divya Gupta, Sai Lakshmi Bhavana Obbattu, ... -- Usenix 2022
"Counting in Regexes Considered Harmful: Exposing ReDoS Vulnerability of Nonbacktracking Matchers"
Margus Veanes, ... -- Usenix 2022
"Automated Detection of Automated Traffic"
Cormac Herley, ... -- Usenix 2022
"Efficient Representation of Numerical Optimization Problems for SNARKs"
Sebastian Angel, ... -- Usenix 2022