2014
- Muhammad Naveed,Shashank Agrawal,Manoj Prabhakaran,XiaoFeng Wang,Erman Ayday,Jean-Pierre Hubaux,Carl A. Gunter,Controlled Functional Encryption.
- Gorkem Kar,Hossen A. Mustafa,Yan Wang,Yingying Chen,Wenyuan Xu,Marco Gruteser,Tam Vu,Detection of On-Road Vehicles Emanating GPS Interference.
- Drew Springall,Travis Finkenauer,Zakir Durumeric,Jason Kitcat,Harri Hursti,Margaret MacAlpine,J. Alex Halderman,Security Analysis of the Estonian Internet Voting System.
- Minh-Thai Trinh,Duc-Hiep Chu,Joxan Jaffar,S3: A Symbolic String Solver for Vulnerability Detection in Web Applications.
- Tongxin Li,Xiao-yong Zhou,Luyi Xing,Yeonjoon Lee,Muhammad Naveed,XiaoFeng Wang,Xinhui Han,Mayhem in the Push Clouds: Understanding and Mitigating Security Hazards in Mobile Push-Messaging Services.
- Martin Emms,Budi Arief,Leo Freitas,Joseph Hannon,Aad P. A. van Moorsel,Harvesting High Value Foreign Currency Transactions from EMV Contactless Credit Cards Without the PIN.
- Arthur Gervais,Reza Shokri,Adish Singla,Srdjan Capkun,Vincent Lenders,Quantifying Web-Search Privacy.
- Paul Pearce,Vacha Dave,Chris Grier,Kirill Levchenko,Saikat Guha,Damon McCoy,Vern Paxson,Stefan Savage,Geoffrey M. Voelker,Characterizing Large-Scale Click Fraud in ZeroAccess.
- Dario Fiore,Rosario Gennaro,Valerio Pastro,Efficiently Verifiable Computation on Encrypted Data.
- Serge Egelman,Sakshi Jain,Rebecca S. Portnoff,Kerwell Liao,Sunny Consolvo,David Wagner,Are You Ready to Lock?
- Michael D. Ernst,René Just,Suzanne Millstein,Werner Dietl,Stuart Pernsteiner,Franziska Roesner,Karl Koscher,Paulo Barros Barros,Ravi Bhoraskar,Seungyeop Han,Paul Vines,Edward XueJun Wu,Collaborative Verification of Information Flow for a High-Assurance App Store.
- Musard Balliu,Mads Dam,Roberto Guanciale,Automating Information Flow Analysis of Low Level Code.
- David Cock,Qian Ge,Toby C. Murray,Gernot Heiser,The Last Mile: An Empirical Study of Timing Channels on seL4.
- Erik-Oliver Blass,Travis Mayberry,Guevara Noubir,Kaan Onarlioglu,Toward Robust Hidden Volumes Using Write-Only Oblivious RAM.
- Warren He,Devdatta Akhawe,Sumeet Jain,Elaine Shi,Dawn Xiaodong Song,ShadowCrypt: Encrypted Web Applications for Everyone.
- Alexey Reznichenko,Paul Francis,Private-by-Design Advertising Meets the Real World.
- Shouling Ji,Weiqing Li,Mudhakar Srivatsa,Raheem A. Beyah,Structural Data De-anonymization: Quantification, Practice, and Implications.
- Frederik Armknecht,Jens-Matthias Bohli,Ghassan O. Karame,Zongren Liu,Christian A. Reuter,Outsourced Proofs of Retrievability.
- Diksha Shukla,Rajesh Kumar,Abdul Serwadda,Vir V. Phoha,Beware, Your Hands Reveal Your Secrets!
- Frederico Araujo,Kevin W. Hamlen,Sebastian Biedermann,Stefan Katzenbeisser,From Patches to Honey-Patches: Lightweight Attacker Misdirection, Deception, and Disinformation.
- Markus Miettinen,N. Asokan,Thien Duc Nguyen,Ahmad-Reza Sadeghi,Majid Sobhani,Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices.
- Benjamin Mood,Debayan Gupta,Kevin R. B. Butler,Joan Feigenbaum,Reuse It Or Lose It: More Efficient Secure Computation Through Reuse of Encrypted Values.
- Prabhanjan Vijendra Ananth,Divya Gupta,Yuval Ishai,Amit Sahai,Optimizing Obfuscation: Avoiding Barrington's Theorem.
- Devin Lundberg,Brown Farinholt,Edward Sullivan,Ryan Mast,Stephen Checkoway,Stefan Savage,Alex C. Snoeren,Kirill Levchenko,On The Security of Mobile Cockpit Information Systems.
- Eric Y. Chen,Yutong Pei,Shuo Chen,Yuan Tian,Robert Kotcher,Patrick Tague,OAuth Demystified for Mobile Application Developers.
- Marc Fischlin,Felix Günther,Multi-Stage Key Exchange and the Case of Google's QUIC Protocol.
- Florian Kerschbaum,Axel Schröpfer,Optimal Average-Complexity Ideal-Security Order-Preserving Encryption.
- Alex Biryukov,Dmitry Khovratovich,Ivan Pustogarov,Deanonymisation of Clients in Bitcoin P2P Network.
- Daniel Luchaup,Thomas Shrimpton,Thomas Ristenpart,Somesh Jha,Formatted Encryption Beyond Regular Languages.
- Yeongjin Jang,Chengyu Song,Simon P. Chung,Tielei Wang,Wenke Lee,A11y Attacks: Exploiting Accessibility in Operating Systems.
- Michael Backes,Thorsten Holz,Benjamin Kollenda,Philipp Koppe,Stefan Nürnberger,Jannik Pewny,You Can Run but You Can't Read: Preventing Disclosure Exploits in Executable Code.
- Kurt Thomas,Dmytro Iatskiv,Elie Bursztein,Tadek Pietraszek,Chris Grier,Damon McCoy,Dialing Back Abuse on Phone Verified Accounts.
- Qinggang Yue,Zhen Ling,Xinwen Fu,Benyuan Liu,Kui Ren,Wei Zhao,Blind Recognition of Touched Keys on Mobile Devices.
- Tom van Goethem,Frank Piessens,Wouter Joosen,Nick Nikiforakis,Clubbing Seals: Exploring the Ecosystem of Third-party Security Seals.
- Gilles Barthe,François Dupressoir,Pierre-Alain Fouque,Benjamin Grégoire,Jean-Christophe Zapalowicz,Synthesis of Fault Attacks on Cryptographic Implementations.
- Hemant Sengar,VoIP Fraud: Identifying a Wolf in Sheep's Clothing.
- Fuyuan Zhang,Limin Jia,Cristina Basescu,Tiffany Hyun-Jin Kim,Yih-Chun Hu,Adrian Perrig,Mechanized Network Origin and Path Authenticity Proofs.
- Nektarios Leontiadis,Tyler Moore,Nicolas Christin,A Nearly Four-Year Longitudinal Study of Search-Engine Poisoning.
- Gilles Barthe,Gustavo Betarte,Juan Diego Campo,Carlos Daniel Luna,David Pichardie,System-level Non-interference for Constant-time Cryptography.
- Maliheh Monshizadeh,Prasad Naldurg,V. N. Venkatakrishnan,MACE: Detecting Privilege Escalation Vulnerabilities in Web Applications.
- Zhengyang Qu,Vaibhav Rastogi,Xinyi Zhang,Yan Chen,Tiantian Zhu,Zhong Chen,AutoCog: Measuring the Description-to-permission Fidelity in Android Applications.
- Franziska Roesner,David Molnar,Alexander Moshchuk,Tadayoshi Kohno,Helen J. Wang,World-Driven Access Control for Continuous Sensing.
- Marc Juárez,Sadia Afroz,Gunes Acar,Claudia Díaz,Rachel Greenstadt,A Critical Evaluation of Website Fingerprinting Attacks.
- Tong Zhu,Qiang Ma,Shanfeng Zhang,Yunhao Liu,Context-free Attacks Using Keyboard Acoustic Emanations.
- Abhinav Narain,Nick Feamster,Alex C. Snoeren,Deniable Liaisons.
- Jung Hee Cheon,Hyung Tae Lee,Jae Hong Seo,A New Additive Homomorphic Encryption based on the co-ACD Problem.
- Fengguo Wei,Sankardas Roy,Xinming Ou,Robby,Amandroid: A Precise and General Inter-component Data Flow Analysis Framework for Security Vetting of Android Apps.
- Yi Xu,Jan-Michael Frahm,Fabian Monrose,Watching the Watchers: Automatically Inferring TV Content From Outdoor Light Effusions.
- Mu Zhang,Yue Duan,Heng Yin,Zhiruo Zhao,Semantics-Aware Android Malware Classification Using Weighted Contextual API Dependency Graphs.
- Qiang Cao,Xiaowei Yang,Jieqi Yu,Christopher Palow,Uncovering Large Groups of Active Malicious Accounts in Online Social Networks.
- Kassem Fawaz,Kang G. Shin,Location Privacy Protection for Smartphone Users.
- Gergei Bana,Hubert Comon-Lundh,A Computationally Complete Symbolic Attacker for Equivalence Properties.
- Iasonas Polakis,Panagiotis Ilia,Federico Maggi,Marco Lancini,Georgios Kontaxis,Stefano Zanero,Sotiris Ioannidis,Angelos D. Keromytis,Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication.
- Anil Kurmus,Robby Zippel,A Tale of Two Kernels: Towards Ending Kernel Hardening Wars with Split Kernel.
- Zhaoyan Xu,Antonio Nappa,Robert Baykov,Guangliang Yang,Juan Caballero,Guofei Gu,AUTOPROBE: Towards Automatic Active Malicious Server Probing Using Dynamic Binary Analysis.
- Gunes Acar,Christian Eubank,Steven Englehardt,Marc Juárez,Arvind Narayanan,Claudia Díaz,The Web Never Forgets: Persistent Tracking Mechanisms in the Wild.
- Ran Canetti,Abhishek Jain,Alessandra Scafuro,Practical UC security with a Global Random Oracle.
- Maliheh Shirvanian,Nitesh Saxena,Wiretapping via Mimicry: Short Voice Imitation Man-in-the-Middle Attacks on Crypto Phones.
- Adam M. Bates,Joe Pletcher,Tyler Nichols,Braden Hollembaek,Dave Tian,Kevin R. B. Butler,Abdulrahman Alkhelaifi,Securing SSL Certificate Verification through Dynamic Linking.
- Florian Bergsma,Benjamin Dowling,Florian Kohlar,Jörg Schwenk,Douglas Stebila,Multi-Ciphersuite Security of the Secure Shell (SSH) Protocol.
- Sauvik Das,Adam D. I. Kramer,Laura A. Dabbish,Jason I. Hong,Increasing Security Sensitivity With Social Proof: A Large-Scale Experimental Confirmation.
- Wen Zhang,You Chen,Thaddeus Cybulski,Daniel Fabbri,Carl A. Gunter,Patrick Lawlor,David M. Liebovitz,Bradley Malin,Decide Now or Decide Later?: Quantifying the Tradeoff between Prospective and Retrospective Access Decisions.
- Sandy Clark,Michael Collis,Matt Blaze,Jonathan M. Smith,Moving Targets: Security and Rapid-Release in Firefox.
- Omer Tripp,Salvatore Guarnieri,Marco Pistoia,Aleksandr Y. Aravkin,ALETHEIA: Improving the Usability of Static Security Analysis.
- Anupam Das,Nikita Borisov,Matthew Caesar,Do You Hear What I Hear?: Fingerprinting Smart Devices Through Embedded Acoustic Components.
- Lorenzo De Carli,Robin Sommer,Somesh Jha,Beyond Pattern Matching: A Concurrency Model for Stateful Deep Packet Inspection.
- Tariq Elahi,George Danezis,Ian Goldberg,PrivEx: Private Collection of Traffic Statistics for Anonymous Communication Networks.
- Bin B. Zhu,Jeff Yan,Dongchen Wei,Maowei Yang,Security Analyses of Click-based Graphical Passwords via Image Point Memorability.
- Nicolás Emilio Bordenabe,Konstantinos Chatzikokolakis,Catuscia Palamidessi,Optimal Geo-Indistinguishable Mechanisms for Location Privacy.
- Xiang Cai,Rishab Nithyanand,Tao Wang,Rob Johnson,Ian Goldberg,A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses.
- Markus Kammerstetter,Markus Muellner,Daniel Burian,Christian Platzer,Wolfgang Kastner,Breaking Integrated Circuit Device Security through Test Mode Silicon Reverse Engineering.
- Pawel Szalachowski,Stephanos Matsumoto,Adrian Perrig,PoliCert: Secure and Flexible TLS Certificate Management.
- David A. Basin,Cas J. F. Cremers,Tiffany Hyun-Jin Kim,Adrian Perrig,Ralf Sasse,Pawel Szalachowski,ARPKI: Attack Resilient Public-Key Infrastructure.
- Yu-Chih Tung,Sihui Han,Dongyao Chen,Kang G. Shin,Vulnerability and Protection of Channel State Information in Multiuser MIMO Networks.
- Aaron Schulman,Dave Levin,Neil Spring,RevCast: Fast, Private Certificate Revocation over FM Radio.
- Johannes Dahse,Nikolai Krein,Thorsten Holz,Code Reuse Attacks in PHP: Automated POP Chain Generation.
- Min Suk Kang,Virgil D. Gligor,Routing Bottlenecks in the Internet: Causes, Exploits, and Countermeasures.
- Yu-Fang Chen,Chang-Hong Hsu,Hsin-Hung Lin,Peter Schwabe,Ming-Hsien Tsai,Bow-Yaw Wang,Bo-Yin Yang,Shang-Yi Yang,Verifying Curve25519 Software.
- Ranjit Kumaresan,Iddo Bentov,How to Use Bitcoin to Incentivize Correct Computations.
- Ben Niu,Gang Tan,RockJIT: Securing Just-In-Time Compilation Using Modular Control-Flow Integrity.
- Michael Backes,Aniket Kate,Sebastian Meiser,Esfandiar Mohammadi,(Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection.
- Wei Meng,Xinyu Xing,Anmol Sheth,Udi Weinsberg,Wenke Lee,Your Online Interests: Pwned! A Pollution Attack Against Targeted Advertising.
- Christopher Neasbitt,Roberto Perdisci,Kang Li,Terry Nelms,ClickMiner: Towards Forensic Reconstruction of User-Browser Interactions from Network Traces.
- Xiao Shaun Wang,Yan Huang,T.-H. Hubert Chan,Abhi Shelat,Elaine Shi,SCORAM: Oblivious RAM for Secure Computation.
- Chunyi Peng,Chi-Yu Li,Hongyi Wang,Guan-Hua Tu,Songwu Lu,Real Threats to Your Data Bills: Security Loopholes and Defenses in Mobile Data Charging.
- Yajin Zhou,Xiaoguang Wang,Yue Chen,Zhi Wang,ARMlock: Hardware-based Fault Isolation for ARM.
- Seungwon Shin,YongJoo Song,Taekyung Lee,Sangho Lee,Jaewoong Chung,Phillip A. Porras,Vinod Yegneswaran,Jiseong Noh,Brent Byunghoon Kang,Rosemary: A Robust, Secure, and High-performance Network Operating System.
- Vireshwar Kumar,Jung-Min Park,Kaigui Bian,Blind Transmitter Authentication for Spectrum Security and Enforcement.
- Sascha Fahl,Sergej Dechand,Henning Perl,Felix Fischer,Jaromir Smrcek,Matthew Smith,Hey, NSA: Stay Away from my Market! Future Proofing App Markets against Powerful Attackers.
- Jelle van den Hooff,M. Frans Kaashoek,Nickolai Zeldovich,VerSum: Verifiable Computations over Large Public Logs.
- Zhe Zhou,Wenrui Diao,Xiangyu Liu,Kehuan Zhang,Acoustic Fingerprinting Revisited: Generate Stable Device ID Stealthily with Inaudible Sound.
- Petar Tsankov,Srdjan Marinovic,Mohammad Torabi Dashti,David A. Basin,Fail-Secure Access Control.
- Mario Cornejo,Sylvain Ruhault,Characterization of Real-Life PRNGs under Partial State Corruption.
- Florian Hahn,Florian Kerschbaum,Searchable Encryption with Secure and Efficient Updates.
- Xiao Shaun Wang,Kartik Nayak,Chang Liu,T.-H. Hubert Chan,Elaine Shi,Emil Stefanov,Yan Huang,Oblivious Data Structures.
- Xing Jin,Xuchao Hu,Kailiang Ying,Wenliang Du,Heng Yin,Gautam Nagesh Peri,Code Injection Attacks on HTML5-based Mobile Apps: Characterization, Detection and Mitigation.
- Úlfar Erlingsson,Vasyl Pihur,Aleksandra Korolova,RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response.
- Yu-ichi Hayashi,Naofumi Homma,Mamoru Miura,Takafumi Aoki,Hideaki Sone,A Threat for Tablet PCs in Public Space: Remote Visualization of Screen Images Using EM Emanation.
- Kurt Thomas,Frank Li,Chris Grier,Vern Paxson,Consequences of Connectivity: Characterizing Account Hijacking on Twitter.
- Dimitrios Papadopoulos,Stavros Papadopoulos,Nikos Triandopoulos,Taking Authenticated Range Queries to Arbitrary Dimensions.
- Ting-Fang Yen,Victor Heorhiadi,Alina Oprea,Michael K. Reiter,Ari Juels,An Epidemiological Study of Malware Encounters in a Large Enterprise.
- WonJun Song,John Kim,Jae W. Lee,Dennis Abts,Security Vulnerability in Processor-Interconnect Router Design.
- Yinqian Zhang,Ari Juels,Michael K. Reiter,Thomas Ristenpart,Cross-Tenant Side-Channel Attacks in PaaS Clouds.
- Karim El Defrawy,Joshua Lampkins,Founding Digital Currency on Secure Computation.
- Jeff Seibert,Hamed Okkhravi,Eric Söderström,Information Leaks Without Memory Disclosures: Remote Side Channel Attacks on Diversified Code.
- Giorgos Vasiliadis,Elias Athanasopoulos,Michalis Polychronakis,Sotiris Ioannidis,PixelVault: Using GPUs for Securing Cryptographic Operations.
- Mark S. Dittmer,Mahesh V. Tripunitara,The UNIX Process Identity Crisis: A Standards-Driven Approach to Setuid.
- Shirin Nilizadeh,Apu Kapadia,Yong-Yeol Ahn,Community-Enhanced De-anonymization of Online Social Networks.
- Kim Ramchen,Brent Waters,Fully Secure and Fast Signing from Obfuscation.
- Ahmed M. Azab,Peng Ning,Jitesh Shah,Quan Chen,Rohan Bhutkar,Guruprasad Ganesh,Jia Ma,Wenbo Shen,Hypervision Across Worlds: Real-time Kernel Protection from the ARM TrustZone Secure World.
- Yupeng Zhang,Charalampos Papamanthou,Jonathan Katz,ALITHEIA: Towards Practical Verifiable Graph Processing.
- Jie Zhang,Feng Yuan,Qiang Xu,DeTrust: Defeating Hardware Trust Verification with Stealthy Implicitly-Triggered Hardware Trojans.
- Melissa Chase,Sarah Meiklejohn,Greg Zaverucha,Algebraic MACs and Keyed-Verification Anonymous Credentials.
- DaeHee Jang,Hojoon Lee,Minsu Kim,Daehyeok Kim,Daegyeong Kim,Brent ByungHoon Kang,ATRA: Address Translation Redirection Attack against Hardware-based External Monitors.
2013
- Yinqian Zhang,Michael K. Reiter,Düppel: retrofitting commodity operating systems to mitigate cache side channels in the cloud.
- Yuan Zhang,Min Yang,Bingquan Xu,Zhemin Yang,Guofei Gu,Peng Ning,Xiaoyang Sean Wang,Binyu Zang,Vetting undesirable behaviors in android apps with permission use analysis.
- Christina Brzuska,Nigel P. Smart,Bogdan Warinschi,Gaven J. Watson,An analysis of the EMV channel establishment protocol.
- Lei Wu,Michael C. Grace,Yajin Zhou,Chiachih Wu,Xuxian Jiang,The impact of vendor customizations on android security.
- Michelle L. Mazurek,Saranga Komanduri,Timothy Vidas,Lujo Bauer,Nicolas Christin,Lorrie Faith Cranor,Patrick Gage Kelley,Richard Shay,Blase Ur,Measuring password guessability for an entire university.
- Clemens Helfmeier,Dmitry Nedospasov,Christopher Tarnovsky,Jan Starbug Krissler,Christian Boit,Jean-Pierre Seifert,Breaking and entering through the silicon.
- Brendan Dolan-Gavitt,Tim Leek,Josh Hodosh,Wenke Lee,Tappan Zee (north) bridge: mining memory accesses for introspection.
- Valeria Nikolaenko,Stratis Ioannidis,Udi Weinsberg,Marc Joye,Nina Taft,Dan Boneh,Privacy-preserving matrix factorization.
- Seungwon Shin,Vinod Yegneswaran,Phillip A. Porras,Guofei Gu,AVANT-GUARD: scalable and vigilant switch flow management in software-defined networks.
- Philip W. L. Fong,Pooya Mehregan,Ram Krishnan,Relational abstraction in community-based secure collaboration.
- Yi Xu,Jared Heinly,Andrew M. White,Fabian Monrose,Jan-Michael Frahm,Seeing double: reconstructing obscured typed input from repeated compromising reflections.
- Mashael AlSabah,Ian Goldberg,PCTCP: per-circuit TCP-over-IPsec transport for anonymous communication overlay networks.
- Aggelos Kiayias,Qiang Tang,How to keep a secret: leakage deterring public-key cryptosystems.
- Adam Doupé,Weidong Cui,Mariusz H. Jakubowski,Marcus Peinado,Christopher Kruegel,Giovanni Vigna,deDacota: toward preventing server-side XSS via automatic code and data separation.
- Michael Weiner,Maurice Massar,Erik Tews,Dennis Giese,Wolfgang Wieser,Security analysis of a widely deployed locking system.
- Fanny Lalonde Lévesque,Jude Nsiempba,José M. Fernandez,Sonia Chiasson,Anil Somayaji,A clinical study of risk factors related to malware infections.
- Kangkook Jee,Vasileios P. Kemerlis,Angelos D. Keromytis,Georgios Portokalidis,ShadowReplica: efficient parallelization of dynamic data flow tracking.
- Soo Hyeon Kim,Daewan Han,Dong Hoon Lee,Predictability of Android OpenSSL's pseudo random number generator.
- Andrew K. Hirsch,Michael R. Clarkson,Belief semantics of authorization logic.
- Liqun Chen,Jiangtao Li,Flexible and scalable digital signatures in TPM 2.0.
- Emil Stefanov,Marten van Dijk,Elaine Shi,Christopher W. Fletcher,Ling Ren,Xiangyao Yu,Srinivas Devadas,Path ORAM: an extremely simple oblivious RAM protocol.
- Yihua Zhang,Aaron Steele,Marina Blanton,PICCO: a general-purpose compiler for private distributed computation.
- Mathias Humbert,Erman Ayday,Jean-Pierre Hubaux,Amalio Telenti,Addressing the concerns of the lacks family: quantification of kin genomic privacy.
- Henry Corrigan-Gibbs,Wendy Mu,Dan Boneh,Bryan Ford,Ensuring high-quality randomness in cryptographic key generation.
- Haichang Gao,Wei Wang,Jiao Qi,Xuqin Wang,Xiyang Liu,Jeff Yan,The robustness of hollow CAPTCHAs.
- Frederik Armknecht,Ahmad-Reza Sadeghi,Steffen Schulz,Christian Wachsmann,A security framework for the analysis and design of software attestation.
- John Geddes,Max Schuchard,Nicholas Hopper,Cover your ACKs: pitfalls of covert channel censorship circumvention.
- Joseph A. Akinyele,Matthew Green,Susan Hohenberger,Using SMT solvers to automate design tasks for encryption and signature schemes.
- Muhammad Qasim Ali,Ehab Al-Shaer,Configuration-based IDS for advanced metering infrastructure.
- Gilles Barthe,Juan Manuel Crespo,Benjamin Grégoire,César Kunz,Yassine Lakhnech,Benedikt Schmidt,Santiago Zanella Béguelin,Fully automated analysis of padding-based encryption in the computational model.
- Robert Kotcher,Yutong Pei,Pranjal Jumde,Collin Jackson,Cross-origin pixel stealing: timing attacks using CSS filters.
- Xinshu Dong,Zhaofeng Chen,Hossein Siadati,Shruti Tople,Prateek Saxena,Zhenkai Liang,Protecting sensitive web content from client-side vulnerabilities with CRYPTONS.
- Zhen Liu,Zhenfu Cao,Duncan S. Wong,Blackbox traceable CP-ABE: how to catch people leaking their keys by selling decryption devices on ebay.
- Ari Juels,Ronald L. Rivest,Honeywords: making password-cracking detectable.
- Gilad Asharov,Yehuda Lindell,Thomas Schneider,Michael Zohner,More efficient oblivious transfer and extensions for faster secure computation.
- Sooel Son,Kathryn S. McKinley,Vitaly Shmatikov,Diglossia: detecting code injection attacks with precision and efficiency.
- Masoud Rostami,Ari Juels,Farinaz Koushanfar,Heart-to-heart (H2H): authentication for implanted medical devices.
- Ninghui Li,Wahbeh H. Qardaji,Dong Su,Yi Wu,Weining Yang,Membership privacy: a unifying framework for privacy definitions.
- Jonas Magazinius,Billy K. Rios,Andrei Sabelfeld,Polyglots: crossing origins by crossing formats.
- Miguel E. Andrés,Nicolás Emilio Bordenabe,Konstantinos Chatzikokolakis,Catuscia Palamidessi,Geo-indistinguishability: differential privacy for location-based systems.
- Gianluca Stringhini,Christopher Kruegel,Giovanni Vigna,Shady paths: leveraging surfing crowds to detect malicious web pages.
- Jeyavijayan Rajendran,Michael Sam,Ozgur Sinanoglu,Ramesh Karri,Security analysis of integrated circuit camouflaging.
- Daniel J. Bernstein,Mike Hamburg,Anna Krasnova,Tanja Lange,Elligator: elliptic-curve points indistinguishable from uniform random strings.
- Adam Waksman,Matthew Suozzo,Simha Sethumadhavan,FANCI: identification of stealthy malicious logic using boolean functional analysis.
- Georgios Kontaxis,Elias Athanasopoulos,Georgios Portokalidis,Angelos D. Keromytis,SAuth: protecting user accounts from password database leaks.
- Bruno Blanchet,Miriam Paiola,Automatic verification of protocols with lists of unbounded length.
- Tamara Denning,Adam Lerner,Adam Shostack,Tadayoshi Kohno,Control-Alt-Hack: the design and evaluation of a card game for computer security awareness and education.
- Florian Giesen,Florian Kohlar,Douglas Stebila,On the security of TLS renegotiation.
- Aggelos Kiayias,Stavros Papadopoulos,Nikos Triandopoulos,Thomas Zacharias,Delegatable pseudorandom functions and applications.
- Albert Kwon,Udit Dhawan,Jonathan M. Smith,Thomas F. Knight Jr.,André DeHon,Low-fat pointers: compact encoding and efficient gate-level implementation of fat pointers for spatial safety and capability-based security.
- W. Michael Petullo,Xu Zhang,Jon A. Solworth,Daniel J. Bernstein,Tanja Lange,MinimaLT: minimal-latency networking through better security.
- Manuel Egele,David Brumley,Yanick Fratantonio,Christopher Kruegel,An empirical study of cryptographic misuse in android applications.
- Andrew Chi-Chih Yao,Yunlei Zhao,OAKE: a new family of implicitly authenticated diffie-hellman protocols.
- Yannis Rouselakis,Brent Waters,Practical constructions and new proof methods for large universe attribute-based encryption.
- Abdul Serwadda,Vir V. Phoha,When kids' toys breach mobile phone security.
- Ben Niu,Gang Tan,Monitor integrity protection with space efficiency and separate compilation.
- Adwait Nadkarni,William Enck,Preventing accidental data disclosure in modern operating systems.
- Fabian Yamaguchi,Christian Wressnegger,Hugo Gascon,Konrad Rieck,Chucky: exposing missing checks in source code for vulnerability discovery.
- Kevin Borgolte,Christopher Kruegel,Giovanni Vigna,Delta: automatic identification of unknown web-based infection campaigns.
- Christian Cachin,Kristiyan Haralambiev,Hsu-Chun Hsiao,Alessandro Sorniotti,Policy-based secure deletion.
- Sumeet Bajaj,Radu Sion,HIFS: history independence for file systems.
- Zhemin Yang,Min Yang,Yuan Zhang,Guofei Gu,Peng Ning,Xiaoyang Sean Wang,AppIntent: analyzing sensitive data transmission in android for privacy leakage detection.
- José Bacelar Almeida,Manuel Barbosa,Gilles Barthe,François Dupressoir,Certified computer-aided cryptography: efficient provably secure machine code from high-level implementations.
- Máté Kovács,Helmut Seidl,Bernd Finkbeiner,Relational abstract interpretation for the verification of 2-hypersafety properties.
- Mobin Javed,Vern Paxson,Detecting stealthy, distributed SSH brute-forcing.
- Aaron Johnson,Chris Wacek,Rob Jansen,Micah Sherr,Paul F. Syverson,Users get routed: traffic correlation on tor by realistic adversaries.
- Foteini Baldimtsi,Anna Lysyanskaya,Anonymous credentials light.
- Emil Stefanov,Elaine Shi,Multi-cloud oblivious storage.
- Xiao-yong Zhou,Soteris Demetriou,Dongjing He,Muhammad Naveed,Xiaorui Pan,XiaoFeng Wang,Carl A. Gunter,Klara Nahrstedt,Identity, location, disease and more: inferring your secrets from android public resources.
- Gergei Bana,Koji Hasebe,Mitsuhiro Okada,Computationally complete symbolic attacker and key exchange.
- Andrei Homescu,Stefan Brunthaler,Per Larsen,Michael Franz,Librando: transparent code randomization for just-in-time compilers.
- Rui Tan,Varun Badrinath Krishna,David K. Y. Yau,Zbigniew Kalbarczyk,Impact of integrity attacks on real-time pricing in smart grids.
- Marcel Keller,Peter Scholl,Nigel P. Smart,An architecture for practical actively secure MPC with dishonest majority.
- Mads Dam,Roberto Guanciale,Narges Khakpour,Hamed Nemati,Oliver Schwarz,Formal verification of information flow security for a simple arm-based separation kernel.
- Mario Heiderich,Jörg Schwenk,Tilman Frosch,Jonas Magazinius,Edward Z. Yang,mXSS attacks: attacking well-secured web-applications by using innerHTML mutations.
- Marek Jawurek,Florian Kerschbaum,Claudio Orlandi,Zero-knowledge using garbled circuits: how to prove non-algebraic statements efficiently.
- Yacin Nadji,Manos Antonakakis,Roberto Perdisci,David Dagon,Wenke Lee,Beheading hydras: performing effective botnet takedowns.
- Junyuan Zeng,Yangchun Fu,Kenneth A. Miller,Zhiqiang Lin,Xiangyu Zhang,Dongyan Xu,Obfuscation resilient binary code reuse through trace-oriented programming.
- Yevgeniy Dodis,David Pointcheval,Sylvain Ruhault,Damien Vergnaud,Daniel Wichs,Security analysis of pseudo-random number generators with input: /dev/random is not robust.
- Kyu Hyung Lee,Xiangyu Zhang,Dongyan Xu,LogGC: garbage collecting audit log.
- Rui Wang,Luyi Xing,XiaoFeng Wang,Shuo Chen,Unauthorized origin crossing on mobile platforms: threats and mitigation.
- Kelsey Cairns,Thoshitha Gamage,Carl Hauser,Efficient targeted key subset retrieval in fractal hash sequences.
- David Isaac Wolinsky,Ewa Syta,Bryan Ford,Hang with your buddies to resist intersection attacks.
- Elaine Shi,Emil Stefanov,Charalampos Papamanthou,Practical dynamic proofs of retrievability.
- Vacha Dave,Saikat Guha,Yin Zhang,ViceROI: catching click-spam in search ad networks.
- Sebastian Lekies,Ben Stock,Martin Johns,25 million flows later: large-scale detection of DOM-based XSS.
- Dan Dobre,Ghassan Karame,Wenting Li,Matthias Majuntke,Neeraj Suri,Marko Vukolic,PoWerStore: proofs of writing for efficient and robust storage.
- Felix Schuster,Thorsten Holz,Towards reducing the attack surface of software backdoors.
- Maverick Woo,Sang Kil Cha,Samantha Gottlieb,David Brumley,Scheduling black-box mutational fuzzing.
- Antonis Papadogiannakis,Laertis Loutsis,Vassilis Papaefstathiou,Sotiris Ioannidis,ASIST: architectural support for instruction set randomization.
- Emmanuel Owusu,Jorge Guajardo,Jonathan M. McCune,James Newsome,Adrian Perrig,Amit Vasudevan,OASIS: on achieving a sanctuary for integrity and secrecy on untrusted platforms.
- Martin Maas,Eric Love,Emil Stefanov,Mohit Tiwari,Elaine Shi,Krste Asanovic,John Kubiatowicz,Dawn Song,PHANTOM: practical oblivious computation in a secure processor.
- Sascha Fahl,Marian Harbach,Henning Perl,Markus Koetter,Matthew Smith,Rethinking SSL development in an appified world.
- Sebastian Uellenbeck,Markus Dürmuth,Christopher Wolf,Thorsten Holz,Quantifying the security of graphical passwords: the case of android unlock patterns.
- Kevin P. Dyer,Scott E. Coull,Thomas Ristenpart,Thomas Shrimpton,Protocol misidentification made easy with format-transforming encryption.
- John Butterworth,Corey Kallenberg,Xeno Kovah,Amy Herzog,BIOS chronomancy: fixing the core root of trust for measurement.
- Joel Reardon,Hubert Ritzdorf,David A. Basin,Srdjan Capkun,Secure data deletion from persistent media.
- Shruti Tople,Shweta Shinde,Zhaofeng Chen,Prateek Saxena,AUTOCRYPT: enabling homomorphic computation on servers to protect sensitive web content.
- Florian Böhl,Véronique Cortier,Bogdan Warinschi,Deduction soundness: prove one, get five for free.
- Gunes Acar,Marc Juárez,Nick Nikiforakis,Claudia Díaz,Seda F. Gürses,Frank Piessens,Bart Preneel,FPDetective: dusting the web for fingerprinters.
- Changyu Dong,Liqun Chen,Zikai Wen,When private set intersection meets big data: an efficient and scalable protocol.
- Michael Backes,Dario Fiore,Raphael M. Reischuk,Verifiable delegation of computation on outsourced data.
- Stanislaw Jarecki,Charanjit S. Jutla,Hugo Krawczyk,Marcel-Catalin Rosu,Michael Steiner,Outsourced symmetric private information retrieval.
- Alexander Moshchuk,Helen J. Wang,Yunxin Liu,Content-based isolation: rethinking isolation policy design on client systems.
- Abhi Shelat,Chih-Hao Shen,Fast two-party secure computation with minimal assumptions.
2012
- Muhammad Asim Jamshed,Jihyung Lee,Sangwoo Moon,Insu Yun,Deokjin Kim,Sungryoul Lee,Yung Yi,KyoungSoo Park,Kargus: a highly-scalable software-based intrusion detection system.
- Rui Chen,Gergely Ács,Claude Castelluccia,Differentially private sequential data publication via variable-length n-grams.
- Scott Moore,Aslan Askarov,Stephen Chong,Precise enforcement of progress-sensitive security.
- Hooman Mohajeri Moghaddam,Baiyu Li,Mohammad Derakhshani,Ian Goldberg,SkypeMorph: protocol obfuscation for Tor bridges.
- Mihhail Aizatulin,Andrew D. Gordon,Jan Jürjens,Computational verification of C protocol implementations by symbolic execution.
- Marten van Dijk,Ari Juels,Alina Oprea,Ronald L. Rivest,Emil Stefanov,Nikos Triandopoulos,Hourglass schemes: how to prove that cloud files are encrypted.
- Nigel Edwards,Liqun Chen,An historical examination of open source releases and their vulnerabilities.
- Max Schuchard,John Geddes,Christopher Thompson,Nicholas Hopper,Routing around decoys.
- Mihir Bellare,Viet Tung Hoang,Phillip Rogaway,Foundations of garbled circuits.
- Mudhakar Srivatsa,Mike Hicks,Deanonymizing mobility traces: using social network as a side-channel.
- Reza Shokri,George Theodorakopoulos,Carmela Troncoso,Jean-Pierre Hubaux,Jean-Yves Le Boudec,Protecting location privacy: optimal strategy against localization attacks.
- Stephen E. McLaughlin,Patrick McDaniel,SABOT: specification-based payload generation for programmable logic controllers.
- Nick Nikiforakis,Luca Invernizzi,Alexandros Kapravelos,Steven Van Acker,Wouter Joosen,Christopher Kruegel,Frank Piessens,Giovanni Vigna,You are what you include: large-scale evaluation of remote javascript inclusions.
- Yinqian Zhang,Ari Juels,Michael K. Reiter,Thomas Ristenpart,Cross-VM side channels and their use to extract private keys.
- Kathy Wain Yee Au,Yi Fan Zhou,Zhen Huang,David Lie,PScout: analyzing the Android permission specification.
- Seny Kamara,Charalampos Papamanthou,Tom Roeder,Dynamic searchable symmetric encryption.
- Long Lu,Zhichun Li,Zhenyu Wu,Wenke Lee,Guofei Jiang,CHEX: statically vetting Android apps for component hijacking vulnerabilities.
- Hao Peng,Christopher S. Gates,Bhaskar Pratim Sarma,Ninghui Li,Yuan Qi,Rahul Potharaju,Cristina Nita-Rotaru,Ian Molloy,Using probabilistic generative models for ranking risks of Android apps.
- Ishtiaq Rouf,Hossen A. Mustafa,Miao Xu,Wenyuan Xu,Robert D. Miller,Marco Gruteser,Neighborhood watch: security and privacy analysis of automatic meter reading systems.
- Jan Camenisch,Anna Lysyanskaya,Gregory Neven,Practical yet universally composable two-server password-authenticated secret sharing.
- Nikos Mavrogiannopoulos,Frederik Vercauteren,Vesselin Velichkov,Bart Preneel,A cross-protocol attack on the TLS protocol.
- Xiang Cai,Xin Cheng Zhang,Brijesh Joshi,Rob Johnson,Touching from a distance: website fingerprinting attacks and defenses.
- Gilles Barthe,David Pointcheval,Santiago Zanella Béguelin,Verified security of redundancy-free encryption from Rabin and RSA.
- Antonio Bianchi,Yan Shoshitaishvili,Christopher Kruegel,Giovanni Vigna,Blacksheep: detecting compromised hosts in homogeneous crowds.
- Mads Dam,Gurvan Le Guernic,Andreas Lundblad,TreeDroid: a tree automaton based approach to enforcing data processing policies.
- Haifeng Yu,Phillip B. Gibbons,Chenwei Shi,DCast: sustaining collaboration in overlay multicast despite rational collusion.
- Istemi Ekin Akkus,Ruichuan Chen,Michaela Hardt,Paul Francis,Johannes Gehrke,Non-tracking web analytics.
- Peter Williams,Radu Sion,Single round access privacy on outsourced storage.
- Tyler Nighswander,Brent M. Ledvina,Jonathan Diamond,Robert Brumley,David Brumley,GPS software attacks.
- Kai Engelhardt,Ron van der Meyden,Chenyi Zhang,Intransitive noninterference in nondeterministic systems.
- Weining Yang,Ninghui Li,Yuan Qi,Wahbeh H. Qardaji,Stephen E. McLaughlin,Patrick McDaniel,Minimizing private data disclosures in the smart grid.
- Ilya Mironov,On significance of the least significant bits for differential privacy.
- Man Ho Au,Apu Kapadia,PERM: practical reputation-based blacklisting without TTPS.
- José Bacelar Almeida,Manuel Barbosa,Endre Bangerter,Gilles Barthe,Stephan Krenn,Santiago Zanella Béguelin,Full proof cryptography: verifiable compilation of efficient zero-knowledge protocols.
- Michaela Hardt,Suman Nath,Privacy-aware personalization for mobile advertising.
- Dario Fiore,Rosario Gennaro,Publicly verifiable delegation of large polynomials and matrix computations, with applications.
- Peter Williams,Radu Sion,Alin Tomescu,PrivateFS: a parallel oblivious file system.
- Zhaoyan Xu,Lingfeng Chen,Guofei Gu,Christopher Kruegel,PeerPress: utilizing enemies' P2P strength against them.
- Markus Kammerstetter,Christian Platzer,Gilbert Wondracek,Vanity, cracks and malware: insights into the anti-copy protection ecosystem.
- Yinglian Xie,Fang Yu,Qifa Ke,Martín Abadi,Eliot Gillum,Krish Vitaldevaria,Jason Walter,Junxian Huang,Zhuoqing Morley Mao,Innocent by association: early recognition of legitimate users.
- Tiffany Hyun-Jin Kim,Payas Gupta,Jun Han,Emmanuel Owusu,Jason I. Hong,Adrian Perrig,Debin Gao,OTO: online trust oracle for user-centric trust establishment.
- Raoul Strackx,Frank Piessens,Fides: selectively hardening software application components against kernel-level or process-level malware.
- Qiyan Wang,Xun Gong,Giang T. K. Nguyen,Amir Houmansadr,Nikita Borisov,CensorSpoofer: asymmetric communication using IP spoofing for censorship-resistant web browsing.
- S. Dov Gordon,Jonathan Katz,Vladimir Kolesnikov,Fernando Krell,Tal Malkin,Mariana Raykova,Yevgeniy Vahlis,Secure two-party computation in sublinear (amortized) time.
- Myrto Arapinis,Loretta Ilaria Mancini,Eike Ritter,Mark Ryan,Nico Golde,Kevin Redon,Ravishankar Borgaonkar,New privacy issues in mobile telephony: fix and verification.
- Chris Grier,Lucas Ballard,Juan Caballero,Neha Chachra,Christian J. Dietrich,Kirill Levchenko,Panayiotis Mavrommatis,Damon McCoy,Antonio Nappa,Andreas Pitsillidis,Niels Provos,M. Zubair Rafique,Moheeb Abu Rajab,Christian Rossow,Kurt Thomas,Vern Paxson,Stefan Savage,Geoffrey M. Voelker,Manufacturing compromise: the emergence of exploit-as-a-service.
- Richard Wartell,Vishwath Mohan,Kevin W. Hamlen,Zhiqiang Lin,Binary stirring: self-randomizing instruction addresses of legacy x86 binary code.
- Zhou Li,Kehuan Zhang,Yinglian Xie,Fang Yu,XiaoFeng Wang,Knowing your enemy: understanding and detecting malicious web advertising.
- Chunyi Peng,Chi-Yu Li,Guan-Hua Tu,Songwu Lu,Lixia Zhang,Mobile data charging: new attacks and countermeasures.
- Zhiyun Qian,Zhuoqing Morley Mao,Yinglian Xie,Collaborative TCP sequence number inference attack: how to crack sequence number under a second.
- Alexandra Boldyreva,Robert Lychev,Provable security of S-BGP and other path vector protocols: model, analysis and extensions.
- Cristian Bravo-Lillo,Lorrie Faith Cranor,Julie S. Downs,Saranga Komanduri,Stuart E. Schechter,Manya Sleeper,Operating system framed in case of mistaken identity: measuring the success of web-based spoofing attacks on OS password-entry dialogs.
- Chi-Yao Hong,Fang Yu,Yinglian Xie,Populated IP addresses: classification and applications.
- Joseph A. Akinyele,Matthew Green,Susan Hohenberger,Matthew W. Pagano,Machine-generated algorithms, proofs and software for the batch verification of digital signature schemes.
- Yu-Yuan Chen,Pramod A. Jamkhedkar,Ruby B. Lee,A software-hardware architecture for self-protecting data.
- Shakeel Butt,H. Andrés Lagar-Cavilla,Abhinav Srivastava,Vinod Ganapathy,Self-service cloud computing.
- Martin Georgiev,Subodh Iyengar,Suman Jana,Rishita Anubhai,Dan Boneh,Vitaly Shmatikov,The most dangerous code in the world: validating SSL certificates in non-browser software.
- Jason Crampton,Gregory Gutin,Anders Yeo,On the parameterized complexity of the workflow satisfiability problem.
- David Bernhard,Véronique Cortier,Olivier Pereira,Bogdan Warinschi,Measuring vote privacy, revisited.
- Dominique Schröder,Heike Schröder,Verifiable data streaming.
- Seny Kamara,Payman Mohassel,Ben Riva,Salus: a system for server-aided secure function evaluation.
- Dimitris Geneiatakis,Georgios Portokalidis,Vasileios P. Kemerlis,Angelos D. Keromytis,Adaptive defenses for commodity software through virtual application partitioning.
- Guanhua Yan,Ritchie Lee,Alex Kent,David H. Wolpert,Towards a bayesian network game framework for evaluating DDoS attacks and defense.
- San-Tsai Sun,Konstantin Beznosov,The devil is in the (implementation) details: an empirical analysis of OAuth SSO systems.
- Mashael AlSabah,Kevin S. Bauer,Ian Goldberg,Enhancing Tor's performance using real-time traffic classification.
- Venkatanathan Varadarajan,Thawan Kooburat,Benjamin Farley,Thomas Ristenpart,Michael M. Swift,Resource-freeing attacks: improve your cloud performance (at your neighbor's expense).
- Ghassan Karame,Elli Androulaki,Srdjan Capkun,Double-spending fast payments in bitcoin.
- Willem De Groef,Dominique Devriese,Nick Nikiforakis,Frank Piessens,FlowFox: a web browser with flexible and precise information flow control.
- Wei-Hong Chuang,Ravi Garg,Min Wu,How secure are power network signature based time stamps?
- Mario Heiderich,Marcus Niemietz,Felix Schuster,Thorsten Holz,Jörg Schwenk,Scriptless attacks: stealing the pie without touching the sill.
- Hyungon Moon,Hojoon Lee,Jihoon Lee,Kihwan Kim,Yunheung Paek,Brent ByungHoon Kang,Vigilare: toward snoop-based kernel integrity monitor.
- Zachary Weinberg,Jeffrey Wang,Vinod Yegneswaran,Linda Briesemeister,Steven Cheung,Frank Wang,Dan Boneh,StegoTorus: a camouflage proxy for the Tor anonymity system.
- Sascha Fahl,Marian Harbach,Thomas Muders,Matthew Smith,Lars Baumgärtner,Bernd Freisleben,Why eve and mallory love android: an analysis of android SSL (in)security.
- Michael Backes,Ankit Malik,Dominique Unruh,Computational soundness without protocol restrictions.
- Divya Muthukumaran,Trent Jaeger,Vinod Ganapathy,Leveraging "choice" to automate authorization hook placement.
- Joan Calvet,José M. Fernandez,Jean-Yves Marion,Aligot: cryptographic function identification in obfuscated binary programs.
- Véronique Cortier,Graham Steel,Cyrille Wiedling,Revoke and let live: a secure key revocation api for cryptographic devices.
- Alexei Czeskis,Michael Dietz,Tadayoshi Kohno,Dan S. Wallach,Dirk Balfanz,Strengthening user authentication through opportunistic cryptographic identity assertions.
- Damon McCoy,Hitesh Dharmdasani,Christian Kreibich,Geoffrey M. Voelker,Stefan Savage,Priceless: the role of payments in abuse-advertised goods.
- Leyla Bilge,Tudor Dumitras,Before we knew it: an empirical study of zero-day attacks in the real world.
- Andreas Holzer,Martin Franz,Stefan Katzenbeisser,Helmut Veith,Secure two-party computations in ANSI C.
2011
- Florian Kerschbaum,Automatically optimizing secure computation.
- Elie Bursztein,Matthieu Martin,John C. Mitchell,Text-based CAPTCHA strengths and weaknesses.
- Long Lu,Roberto Perdisci,Wenke Lee,SURF: detecting and measuring search poisoning.
- Peter Hornyack,Seungyeop Han,Jaeyeon Jung,Stuart E. Schechter,David Wetherall,These aren't the droids you're looking for: retrofitting android to protect data from imperious applications.
- Nils Ole Tippenhauer,Christina Pöpper,Kasper Bonne Rasmussen,Srdjan Capkun,On the requirements for successful GPS spoofing attacks.
- Christina Brzuska,Marc Fischlin,Bogdan Warinschi,Stephen C. Williams,Composability of bellare-rogaway key exchange protocols.
- Ralf Küsters,Max Tuengerthal,Composition theorems without pre-established session identifiers.
- Philip Marquardt,Arunabh Verma,Henry Carter,Patrick Traynor,(sp)iPhone: decoding vibrations from nearby keyboards using mobile phone accelerometers.
- Swagatika Prusty,Brian Neil Levine,Marc Liberatore,Forensic investigation of the OneSwarm anonymous filesharing system.
- Shuo Tang,Nathan Dautenhahn,Samuel T. King,Fortifying web-based applications automatically.
- Ran Canetti,Ben Riva,Guy N. Rothblum,Practical delegation of computation using multiple servers.
- Mihir Bellare,David Cash,Sriram Keelveedhi,Ciphers that securely encipher their own keys.
- Prithvi Bisht,Timothy L. Hinrichs,Nazari Skrupsky,V. N. Venkatakrishnan,WAPTEC: whitebox analysis of web applications for parameter tampering exploit construction.
- Mihhail Aizatulin,Andrew D. Gordon,Jan Jürjens,Extracting and verifying cryptographic models from C protocol code by symbolic execution.
- Mario Heiderich,Tilman Frosch,Meiko Jensen,Thorsten Holz,Crouching tiger - hidden payload: security risks of scalable vectors graphics.
- Ashlesh Sharma,Lakshminarayanan Subramanian,Eric A. Brewer,PaperSpeckle: microscopic fingerprinting of paper.
- Jiyong Jang,David Brumley,Shobha Venkataraman,BitShred: feature hashing malware for scalable triage and semantic analysis.
- Raluca A. Popa,Andrew J. Blumberg,Hari Balakrishnan,Frank H. Li,Privacy and accountability for location-based aggregate statistics.
- Bin Zeng,Gang Tan,Greg Morrisett,Combining control-flow integrity and static analysis for efficient and validated data sandboxing.
- Giorgos Vasiliadis,Michalis Polychronakis,Sotiris Ioannidis,MIDeA: a multi-parallel intrusion detection architecture.
- Cédric Fournet,Markulf Kohlweiss,Pierre-Yves Strub,Modular code-based cryptographic verification.
- Eric Yawei Chen,Jason Bau,Charles Reis,Adam Barth,Collin Jackson,App isolation: get the security of multiple browsers with just one.
- Danfeng Zhang,Aslan Askarov,Andrew C. Myers,Predictive mitigation of timing channels in interactive systems.
- Ahmed M. Azab,Peng Ning,Xiaolan Zhang,SICE: a hardware-level strongly isolated computing environment for x86 multi-core platforms.
- Kehuan Zhang,Xiao-yong Zhou,Yangyi Chen,XiaoFeng Wang,Yaoping Ruan,Sedic: privacy-aware data intensive computing on hybrid clouds.
- Shai Halevi,Danny Harnik,Benny Pinkas,Alexandra Shulman-Peleg,Proofs of ownership in remote storage systems.
- Kevin D. Bowers,Marten van Dijk,Ari Juels,Alina Oprea,Ronald L. Rivest,How to tell if your cloud files are vulnerable to drive crashes.
- Adam Doupé,Bryce Boe,Christopher Kruegel,Giovanni Vigna,Fear the EAR: discovering and mitigating execution after redirect vulnerabilities.
- Prateek Saxena,David Molnar,Benjamin Livshits,SCRIPTGARD: automatic context-sensitive sanitization for large-scale legacy web applications.
- Peter Chapman,David Evans,Automated black-box detection of side-channel vulnerabilities in web applications.
- Vincent Cheval,Hubert Comon-Lundh,Stéphanie Delaune,Trace equivalence decision: negative tests and non-determinism.
- Rahul Raguram,Andrew M. White,Dibyendusekhar Goswami,Fabian Monrose,Jan-Michael Frahm,iSpy: automatic reconstruction of typed input from compromising reflections.
- Cédric Fournet,Jérémy Planul,Tamara Rezk,Information-flow types for homomorphic encryptions.
- Ali Bagherzandi,Stanislaw Jarecki,Nitesh Saxena,Yanbin Lu,Password-protected secret sharing.
- Miro Enev,Sidhant Gupta,Tadayoshi Kohno,Shwetak N. Patel,Televisions, video privacy, and powerline electromagnetic interference.
- Ryan Henry,Femi G. Olumofin,Ian Goldberg,Practical PIR for electronic commerce.
- Deepak Garg,Limin Jia,Anupam Datta,Policy auditing over incomplete logs: theory, implementation and applications.
- Karthick Jayaraman,Vijay Ganesh,Mahesh V. Tripunitara,Martin C. Rinard,Steve J. Chapin,Automatic error finding in access-control policies.
- Mike Samuel,Prateek Saxena,Dawn Song,Context-sensitive auto-sanitization in web templating languages using type qualifiers.
- Jakub Szefer,Eric Keller,Ruby B. Lee,Jennifer Rexford,Eliminating the hypervisor attack surface for a more secure cloud.
- Tyler Moore,Nektarios Leontiadis,Nicolas Christin,Fashion crimes: trending-term exploitation on the web.
- Sven Bugiel,Stefan Nürnberger,Thomas Pöppelmann,Ahmad-Reza Sadeghi,Thomas Schneider,AmazonIA: when elasticity snaps back.
- Nan Zheng,Aaron Paloski,Haining Wang,An efficient user verification system via mouse movements.
- Véronique Cortier,Bogdan Warinschi,A composable computational soundness notion.
- Yanlin Li,Jonathan M. McCune,Adrian Perrig,VIPER: verifying the integrity of PERipherals' firmware.
- Mohammad Mannan,Beom Heyn Kim,Afshar Ganjali,David Lie,Unicorn: two-factor attestation for data security.
- Pierre Baldi,Roberta Baronio,Emiliano De Cristofaro,Paolo Gasti,Gene Tsudik,Countering GATTACA: efficient and secure testing of fully-sequenced human genomes.
- David Y. Wang,Stefan Savage,Geoffrey M. Voelker,Cloak and dagger: dynamics of web search cloaking.
- Lior Malka,VMCrypt: modular software architecture for scalable secure computation.
- Alexey Reznichenko,Saikat Guha,Paul Francis,Auctions in do-not-track compliant internet advertising.
- Aaron Johnson,Paul F. Syverson,Roger Dingledine,Nick Mathewson,Trust-based anonymous communication: adversary models and routing algorithms.
- Adrienne Porter Felt,Erika Chin,Steve Hanna,Dawn Song,David Wagner,Android permissions demystified.
- Prateek Mittal,Ahmed Khurshid,Joshua Juen,Matthew Caesar,Nikita Borisov,Stealthy traffic analysis of low-latency anonymous communication using throughput fingerprinting.
- Deepa Srinivasan,Zhi Wang,Xuxian Jiang,Dongyan Xu,Process out-grafting: an efficient "out-of-VM" approach for fine-grained process execution monitoring.
- Clemens Kolbitsch,Engin Kirda,Christopher Kruegel,The power of procrastination: detection and mitigation of execution-stalling malicious code.
- Amir Moradi,Alessandro Barenghi,Timo Kasper,Christof Paar,On the vulnerability of FPGA bitstream encryption against power analysis attacks: extracting keys from xilinx Virtex-II FPGAs.
- Stephen E. McLaughlin,Patrick McDaniel,William Aiello,Protecting consumer privacy from electric load monitoring.
- Amir Houmansadr,Giang T. K. Nguyen,Matthew Caesar,Nikita Borisov,Cirripede: circumvention infrastructure using router redirection with plausible deniability.
- Kevin Coogan,Gen Lu,Saumya K. Debray,Deobfuscation of virtualization-obfuscated software: a semantics-based approach.
- Tibor Jager,Juraj Somorovsky,How to break XML encryption.
2010
- Flavio D. Garcia,Peter van Rossum,Roel Verdult,Ronny Wichers Schreur,Dismantling SecureMemory, CryptoMemory and CryptoRF.
- Matt Weir,Sudhir Aggarwal,Michael P. Collins,Henry Stern,Testing metrics for password creation policies by attacking large sets of revealed passwords.
- Matteo Bortolozzo,Matteo Centenaro,Riccardo Focardi,Graham Steel,Attacking and fixing PKCS#11 security tokens.
- Prithvi Bisht,Timothy L. Hinrichs,Nazari Skrupsky,Radoslaw Bobrowicz,V. N. Venkatakrishnan,NoTamper: automatic blackbox detection of parameter tampering opportunities in web applications.
- Qiyan Wang,Prateek Mittal,Nikita Borisov,In search of an anonymous and secure lookup: attacks on structured peer-to-peer anonymous communication systems.
- Kehuan Zhang,Zhou Li,Rui Wang,XiaoFeng Wang,Shuo Chen,Sidebuster: automated detection and quantification of side-channel leaks in web application development.
- Henry Corrigan-Gibbs,Bryan Ford,Dissent: accountable anonymous group messaging.
- Yinqian Zhang,Fabian Monrose,Michael K. Reiter,The security of modern password expiration: an algorithmic framework and empirical analysis.
- Rob Jansen,Nicholas Hopper,Yongdae Kim,Recruiting new tor relays with BRAIDS.
- Sang Kil Cha,Brian Pak,David Brumley,Richard Jay Lipton,Platform-independent programs.
- Dongseok Jang,Ranjit Jhala,Sorin Lerner,Hovav Shacham,An empirical study of privacy-violating information flows in JavaScript web applications.
- Jae Hyun Ahn,Matthew Green,Susan Hohenberger,Synchronized aggregate signatures: new definitions, constructions and applications.
- Lin-Shung Huang,Zack Weinberg,Chris Evans,Collin Jackson,Protecting browsers from cross-origin CSS attacks.
- Ralf Küsters,Tomasz Truderung,Andreas Vogt,Accountability: definition and relationship to verifiability.
- Aslan Askarov,Danfeng Zhang,Andrew C. Myers,Predictive black-box mitigation of timing channels.
- Ulrich Rührmair,Frank Sehnke,Jan Sölter,Gideon Dror,Srinivas Devadas,Jürgen Schmidhuber,Modeling attacks on physical unclonable functions.
- Nathaniel Husted,Steven Myers,Mobile location tracking in metro areas: malnets and others.
- Gene Novark,Emery D. Berger,DieHarder: securing the heap.
- Juan Caballero,Pongsin Poosankam,Stephen McCamant,Domagoj Babic,Dawn Song,Input generation via decomposition and re-stitching: finding bugs in Malware.
- Chris Grier,Kurt Thomas,Vern Paxson,Chao Michael Zhang,@spam: the underground on 140 characters or less.
- Dan Boneh,Hart William Montgomery,Ananth Raghunathan,Algebraic pseudorandom functions with improved efficiency from the augmented cascade.
- Bin B. Zhu,Jeff Yan,Qiujie Li,Chao Yang,Jia Liu,Ning Xu,Meng Yi,Kaiwei Cai,Attacks and design of image recognition CAPTCHAs.
- Yu Yu,François-Xavier Standaert,Olivier Pereira,Moti Yung,Practical leakage-resilient pseudorandom generators.
- Amit Sahai,Hakan Seyalioglu,Worry-free encryption: functional encryption with public keys.
- Long Lu,Vinod Yegneswaran,Phillip A. Porras,Wenke Lee,BLADE: an attack-agnostic approach for preventing drive-by malware infections.
- Sherman S. M. Chow,Yevgeniy Dodis,Yannis Rouselakis,Brent Waters,Practical leakage-resilient identity-based encryption from simple assumptions.
- David Barrera,Hilmi Günes Kayacik,Paul C. van Oorschot,Anil Somayaji,A methodology for empirical analysis of permission-based security models and its application to android.
- Wilko Henecka,Stefan Kögl,Ahmad-Reza Sadeghi,Thomas Schneider,Immo Wehrenberg,TASTY: tool for automating secure two-party computations.
- Vijay A. Balasubramaniyan,Aamir Poonawalla,Mustaque Ahamad,Michael T. Hunter,Patrick Traynor,PinDr0p: using single-ended audio features to determine call provenance.
- Michael Backes,Matteo Maffei,Dominique Unruh,Computationally sound verification of source code.
- William R. Harris,Somesh Jha,Thomas W. Reps,DIFC programs by automatic instrumentation.
- Avik Chaudhuri,Jeffrey S. Foster,Symbolic security analysis of ruby-on-rails web applications.
- Sebastian Mödersheim,Abstraction by set-membership: verifying security protocols and web services with databases.
- Chia Yuan Cho,Domagoj Babic,Eui Chul Richard Shin,Dawn Song,Inference and analysis of formal models of botnet command and control protocols.
- Ueli Maurer,Björn Tackmann,On the soundness of authenticate-then-encrypt: formalizing the malleability of symmetric encryption.
- Andrea Lanzi,Davide Balzarotti,Christopher Kruegel,Mihai Christodorescu,Engin Kirda,AccessMiner: using system-centric models for malware protection.
- Jean Paul Degabriele,Kenneth G. Paterson,On the (in)security of IPsec in MAC-then-encrypt configurations.
- Stephen Checkoway,Lucas Davi,Alexandra Dmitrienko,Ahmad-Reza Sadeghi,Hovav Shacham,Marcel Winandy,Return-oriented programming without returns.
- Christoph Sprenger,David A. Basin,Developing security protocols by refinement.
- Justin Samuel,Nick Mathewson,Justin Cappos,Roger Dingledine,Survivable key compromise in software update systems.
- Tzipora Halevi,Nitesh Saxena,On pairing constrained wireless devices based on secrecy of auxiliary channels: the case of acoustic eavesdropping.
- Srinivas Krishnan,Kevin Z. Snow,Fabian Monrose,Trail of bytes: efficient support for forensic analysis.
- Nicolas Christin,Sally S. Yanagihara,Keisuke Kamataki,Dissecting one click frauds.
- Justin Cappos,Armon Dadgar,Jeff Rasley,Justin Samuel,Ivan Beschastnikh,Cosmin Barsan,Arvind Krishnamurthy,Thomas E. Anderson,Retaining sandbox containment despite bugs in privileged memory-safe code.
- Adam Groce,Jonathan Katz,A new framework for efficient password-based authenticated key exchange.
- Scott Wolchok,Eric Wustrow,J. Alex Halderman,Hari K. Prasad,Arun Kankipati,Sai Krishna Sakhamuri,Vasavya Yagati,Rop Gonggrijp,Security analysis of India's electronic voting machines.
- Jonathan Katz,Lior Malka,Secure text processing with applications to private DNA matching.
- Ahmed M. Azab,Peng Ning,Zhi Wang,Xuxian Jiang,Xiaolan Zhang,Nathan C. Skalsky,HyperSentry: enabling stealthy in-context measurement of hypervisor integrity.
- Gilles Barthe,Marion Daubignard,Bruce M. Kapron,Yassine Lakhnech,Computational indistinguishability logic.
- Zhenyu Wu,Steven Gianvecchio,Mengjun Xie,Haining Wang,Mimimorphism: a new approach to binary code obfuscation.
- Can Tang,Ian Goldberg,An improved algorithm for tor circuit scheduling.
- Sanjam Garg,Abishek Kumarasubramanian,Amit Sahai,Brent Waters,Building efficient fully collusion-resilient traitor tracing and revocation schemes.
- Glenn Wurster,Paul C. van Oorschot,A control point for reducing root abuse of file-system privileges.
- Joseph Siefers,Gang Tan,Greg Morrisett,Robusta: taming the native beast of the JVM.
2009
- Toby Xu,Ying Cai,Feeling-based location privacy protection for location-based services.
- Mudhakar Srivatsa,Dakshi Agrawal,Steffen Reidt,A metadata calculus for secure information sharing.
- William Enck,Machigar Ongtang,Patrick Drew McDaniel,On lightweight mobile phone application certification.
- Yves Younan,Pieter Philippaerts,Frank Piessens,Wouter Joosen,Sven Lachmund,Thomas Walter,Filter-resistant code injection on ARM.
- Matthew Edman,Paul F. Syverson,As-awareness in Tor path selection.
- Steven Gianvecchio,Zhenyu Wu,Mengjun Xie,Haining Wang,Battle of Botcraft: fighting bots in online games with human observational proofs.
- Ralf Küsters,Max Tuengerthal,Computational soundness for key exchange protocols with symmetric encryption.
- Masana Murase,Kanna Shimizu,Wilfred Plouffe,Masaharu Sakamoto,Effective implementation of the cell broadband engineTM isolation loader.
- Cédric Fournet,Gurvan Le Guernic,Tamara Rezk,A security-preserving compiler for distributed programs: from information-flow policies to cryptographic mechanisms.
- Brendan Dolan-Gavitt,Abhinav Srivastava,Patrick Traynor,Jonathon T. Giffin,Robust signatures for kernel data structures.
- Justin Manweiler,Ryan Scudellari,Landon P. Cox,SMILE: encounter-based trust for mobile social services.
- Edward C. Kaiser,Wu-chang Feng,Travis Schluessler,Fides: remote anomaly-based cheat detection using client emulation.
- Dario Catalano,Dario Fiore,Rosario Gennaro,Certificateless onion routing.
- Martin R. Albrecht,Craig Gentry,Shai Halevi,Jonathan Katz,Attacking cryptographic schemes based on "perturbation polynomials".
- Jon McLachlan,Andrew Tran,Nicholas Hopper,Yongdae Kim,Scalable onion routing with torsk.
- Rui Wang,XiaoFeng Wang,Zhou Li,Haixu Tang,Michael K. Reiter,Zheng Dong,Privacy-preserving genomic computation through program specialization.
- Ian Goldberg,Berkant Ustaoglu,Matthew Van Gundy,Hao Chen,Multi-party off-the-record messaging.
- Patrick Traynor,Michael Lin,Machigar Ongtang,Vikhyath Rao,Trent Jaeger,Patrick Drew McDaniel,Thomas F. La Porta,On cellular botnets: measuring the impact of malicious devices on a cellular network core.
- Xin Hu,Tzi-cker Chiueh,Kang G. Shin,Large-scale malware indexing using function-call graphs.
- Kasper Bonne Rasmussen,Claude Castelluccia,Thomas S. Heydt-Benjamin,Srdjan Capkun,Proximity-based access control for implantable medical devices.
- Changshe Ma,Yingjiu Li,Robert H. Deng,Tieyan Li,RFID privacy: relation between two notions, minimal condition, and efficient construction.
- Juan Caballero,Pongsin Poosankam,Christian Kreibich,Dawn Xiaodong Song,Dispatcher: enabling active botnet infiltration using automatic protocol reverse-engineering.
- Martim Carbone,Weidong Cui,Long Lu,Wenke Lee,Marcus Peinado,Xuxian Jiang,Mapping kernel objects to enable systematic integrity checking.
- Cynthia Sturton,Susmit Jha,Sanjit A. Seshia,David Wagner,On voting machine design for verification and testability.
- Karl Koscher,Ari Juels,Vjekoslav Brajkovic,Tadayoshi Kohno,EPC RFID tag security weaknesses and defenses: passport cards, enhanced drivers licenses, and beyond.
- C. Christopher Erway,Alptekin Küpçü,Charalampos Papamanthou,Roberto Tamassia,Dynamic provable data possession.
- Aaron Bohannon,Benjamin C. Pierce,Vilhelm Sjöberg,Stephanie Weirich,Steve Zdancewic,Reactive noninterference.
- Rui Wang,Yong Fuga Li,XiaoFeng Wang,Haixu Tang,Xiao-yong Zhou,Learning your identity and disease from research papers: information leaks in genome wide association study.
- Julien Freudiger,Mohammad Hossein Manshaei,Jean-Pierre Hubaux,David C. Parkes,On non-cooperative location privacy: a game-theoretic analysis.
- Melissa Chase,Sherman S. M. Chow,Improving privacy and security in multi-authority attribute-based encryption.
- Patrik Bichsel,Jan Camenisch,Thomas Groß,Victor Shoup,Anonymous credentials on a standard java card.
- Prateek Mittal,Nikita Borisov,ShadowWalker: peer-to-peer anonymous communication using redundant structured topologies.
- Muhammad Qasim Ali,Hassan Khan,Ali Sajjad,Syed Ali Khayam,On achieving good operating points on an ROC plane using stochastic anomaly score prediction.
- K. Vikram,Abhishek Prateek,V. Benjamin Livshits,Ripley: automatically securing web 2.0 applications through replicated execution.
- Jan Camenisch,Maria Dubovitskaya,Gregory Neven,Oblivious transfer with access control.
- Xinran Wang,Yoon-chan Jhi,Sencun Zhu,Peng Liu,Behavior based software theft detection.
- Zhen Ling,Junzhou Luo,Wei Yu,Xinwen Fu,Dong Xuan,Weijia Jia,A new cell counter based attack against tor.
- Joshua Mason,Sam Small,Fabian Monrose,Greg MacManus,English shellcode.
- Kevin D. Bowers,Ari Juels,Alina Oprea,HAIL: a high-availability and integrity layer for cloud storage.
- Claude Castelluccia,Aurélien Francillon,Daniele Perito,Claudio Soriente,On the difficulty of software-based attestation of embedded devices.
- Eugene Y. Vasserman,Rob Jansen,James Tyra,Nicholas Hopper,Yongdae Kim,Membership-concealing overlay networks.
- Steffen Reidt,Mudhakar Srivatsa,Shane Balfe,The fable of the bees: incentivizing robust revocation decision making in ad hoc networks.
- Côme Berbain,Olivier Billet,Jonathan Etrog,Henri Gilbert,An efficient forward private RFID protocol.
- Monirul I. Sharif,Wenke Lee,Weidong Cui,Andrea Lanzi,Secure in-VM monitoring using hardware virtualization.
- Thomas Ristenpart,Eran Tromer,Hovav Shacham,Stefan Savage,Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds.
- Yao Liu,Michael K. Reiter,Peng Ning,False data injection attacks against state estimation in electric power grids.
- Zhi Wang,Xuxian Jiang,Weidong Cui,Peng Ning,Countering kernel rootkits with lightweight hook protection.
- Andrew Meneely,Laurie A. Williams,Secure open source collaboration: an empirical study of linus' law.
- Michael Backes,Dennis Hofheinz,Dominique Unruh,CoSP: a general framework for computational soundness proofs.
- Allison B. Lewko,Brent Waters,Efficient pseudorandom functions from the decisional linear assumption and weaker variants.
- Micah Sherr,Gaurav Shah,Eric Cronin,Sandy Clark,Matt Blaze,Can they hear me now?: a security analysis of law enforcement wiretaps.
- Andriy Panchenko,Stefan Richter,Arne Rache,NISAN: network information service for anonymization networks.
- Siliang Li,Gang Tan,Finding bugs in exceptional situations of JNI programs.
- Mario Frank,Andreas P. Streich,David A. Basin,Joachim M. Buhmann,A probabilistic approach to hybrid role mining.
- Brett Stone-Gross,Marco Cova,Lorenzo Cavallaro,Bob Gilbert,Martin Szydlowski,Richard A. Kemmerer,Christopher Kruegel,Giovanni Vigna,Your botnet is my botnet: analysis of a botnet takeover.
- Hristo Bojinov,Elie Bursztein,Dan Boneh,XCS: cross channel scripting and its impact on web applications.
- Sonia Chiasson,Alain Forget,Elizabeth Stobert,Paul C. van Oorschot,Robert Biddle,Multiple password interference in text passwords and click-based graphical passwords.
- Carmela Troncoso,George Danezis,The bayesian traffic analysis of mix networks.
2008
- Alexandra Boldyreva,Vipul Goyal,Virendra Kumar,Identity-based encryption with efficient revocation.
- Weidong Cui,Marcus Peinado,Karl Chen,Helen J. Wang,Luis Irún-Briz,Tupni: automatic reverse engineering of input formats.
- Prateek Mittal,Nikita Borisov,Information leaks in structured peer-to-peer anonymous communication systems.
- Mudhakar Srivatsa,Shane Balfe,Kenneth G. Paterson,Pankaj Rohatgi,Trust management for secure information flows.
- Lucas Ballard,Seny Kamara,Fabian Monrose,Michael K. Reiter,Towards practical biometric key generation with randomized biometric templates.
- Hubert Comon-Lundh,Véronique Cortier,Computational soundness of observational equivalence.
- Lars E. Olson,Carl A. Gunter,P. Madhusudan,A formal framework for reflective database access control policies.
- Philippe Golle,Machine learning attacks against the Asirra CAPTCHA.
- Hitesh Ballani,Paul Francis,Mitigating DNS DoS attacks.
- Michael Backes,Catalin Hritcu,Matteo Maffei,Type-checking zero-knowledge.
- Erik Buchanan,Ryan Roemer,Hovav Shacham,Stefan Savage,When good instructions go bad: generalizing return-oriented programming to RISC.
- Maxim Raya,Mohammad Hossein Manshaei,Márk Félegyházi,Jean-Pierre Hubaux,Revocation games in ephemeral networks.
- Benjamin Laxton,Kai Wang,Stefan Savage,Reconsidering physical key secrecy: teleduplication via optical decoding.
- Assaf Ben-David,Noam Nisan,Benny Pinkas,FairplayMP: a system for secure multi-party computation.
- Diptikalyan Saha,Extending logical attack graphs for efficient vulnerability analysis.
- Jeff Yan,Ahmad Salah El Ahmad,A low-cost attack on a Microsoft captcha.
- Benoît Libert,Damien Vergnaud,Multi-use unidirectional proxy re-signatures.
- Haowen Chan,Adrian Perrig,Efficient security primitives derived from a secure aggregation algorithm.
- Terri Oda,Glenn Wurster,Paul C. van Oorschot,Anil Somayaji,SOMA: mutual approval for included content in web pages.
- Karthikeyan Bhargavan,Cédric Fournet,Ricardo Corin,Eugen Zalinescu,Cryptographically verified implementations for TLS.
- Ali Bagherzandi,Jung Hee Cheon,Stanislaw Jarecki,Multisignatures secure under the discrete logarithm assumption and a generalized forking lemma.
- Rui Wang,XiaoFeng Wang,Kehuan Zhang,Zhuowei Li,Towards automatic reverse engineering of software security configurations.
- Jan Camenisch,Thomas Groß,Efficient attributes for anonymous credentials.
- Aurélien Francillon,Claude Castelluccia,Code injection attacks on harvard-architecture devices.
- Kasper Bonne Rasmussen,Srdjan Capkun,Location privacy of distance bounding protocols.
- Walter Chang,Brandon Streiff,Calvin Lin,Efficient and extensible security enforcement using dynamic data flow analysis.
- Ralf Küsters,Tomasz Truderung,Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach.
- Patrick P. Tsang,Man Ho Au,Apu Kapadia,Sean W. Smith,PEREA: towards practical TTP-free revocation in anonymous authentication.
- Chris Kanich,Christian Kreibich,Kirill Levchenko,Brandon Enright,Geoffrey M. Voelker,Vern Paxson,Stefan Savage,Spamalytics: an empirical analysis of spam marketing conversion.
- Jaeyeon Jung,Anmol Sheth,Ben Greenstein,David Wetherall,Gabriel Maganis,Tadayoshi Kohno,Privacy oracle: a system for finding application leaks with black box differential testing.
- Vipul Goyal,Steve Lu,Amit Sahai,Brent Waters,Black-box accountable authority identity-based encryption.
- Wei Wang,Mehul Motani,Vikram Srinivasan,Dependent link padding algorithms for low latency anonymity systems.
- Steven Crites,Francis Hsu,Hao Chen,OMash: enabling secure web mashups via object abstractions.
- Justin Cappos,Justin Samuel,Scott M. Baker,John H. Hartman,A look in the mirror: attacks on package managers.
- Carmit Hazay,Yehuda Lindell,Constructions of truly practical secure protocols using standardsmartcards.
- Mario Frank,David A. Basin,Joachim M. Buhmann,A class of probabilistic models for role engineering.
- Cas J. F. Cremers,Unbounded verification, falsification, and characterization of security protocols by pattern refinement.
- David Dagon,Manos Antonakakis,Paul Vixie,Tatuya Jinmei,Wenke Lee,Increased DNS forgery resistance through 0x20-bit encoding: security via leet queries.
- Avik Chaudhuri,Prasad Naldurg,Sriram K. Rajamani,G. Ramalingam,Lakshmisubrahmanyam Velaga,EON: modeling and analyzing dynamic access control systems with logic programs.
- Sabrina De Capitani di Vimercati,Sara Foresti,Sushil Jajodia,Stefano Paraboschi,Pierangela Samarati,Assessing query privileges via safe and efficient permission composition.
- Adam Barth,Collin Jackson,John C. Mitchell,Robust defenses for cross-site request forgery.
- Matthew Finifter,Adrian Mettler,Naveen Sastry,David Wagner,Verifiable functional purity in java.
- Kevin R. B. Butler,Stephen E. McLaughlin,Patrick Drew McDaniel,Rootkit-resistant disks.
- Charalampos Papamanthou,Roberto Tamassia,Nikos Triandopoulos,Authenticated hash tables.
- Alexei Czeskis,Karl Koscher,Joshua R. Smith,Tadayoshi Kohno,RFIDs and secret handshakes: defending against ghost-and-leech attacks and unauthorized reads with context-aware communications.
- Judicaël Courant,Marion Daubignard,Cristian Ene,Pascal Lafourcade,Yassine Lakhnech,Towards automated proofs for asymmetric encryption schemes in the random oracle model.
- Artem Dinaburg,Paul Royal,Monirul I. Sharif,Wenke Lee,Ether: malware analysis via hardware virtualization extensions.
- Dan Boneh,Moni Naor,Traitor tracing with constant size ciphertext.
- Ellick Chan,Jeffrey C. Carlyle,Francis M. David,Reza Farivar,Roy H. Campbell,BootJacker: compromising computers using forced restarts.
- Arnar Birgisson,Mohan Dhawan,Úlfar Erlingsson,Vinod Ganapathy,Liviu Iftode,Enforcing authorization policies using transactional memory introspection.
- Peter Williams,Radu Sion,Bogdan Carbunar,Building castles out of mud: practical access pattern privacy and correctness on untrusted storage.
2007
- Giuseppe Ateniese,Randal C. Burns,Reza Curtmola,Joseph Herring,Lea Kissner,Zachary N. J. Peterson,Dawn Xiaodong Song,Provable data possession at untrusted stores.
- Benoît Libert,Jean-Jacques Quisquater,Moti Yung,Forward-secure signatures in untrusted update environments: efficient and generic constructions.
- Fengjun Li,Bo Luo,Peng Liu,Dongwon Lee,Chao-Hsien Chu,Automaton segmentation: a new approach to preserve privacy in xml information brokering.
- Tal Moran,Moni Naor,Split-ballot voting: everlasting privacy with distributed trust.
- Stanislaw Jarecki,Jihye Kim,Gene Tsudik,Robust group key agreement using short broadcasts.
- Serdar Cabuk,Chris I. Dalton,HariGovind V. Ramasamy,Matthias Schunter,Towards automated provisioning of secure virtualized networks.
- Boris Köpf,David A. Basin,An information-theoretic model for adaptive side-channel attacks.
- Justin Brickell,Donald E. Porter,Vitaly Shmatikov,Emmett Witchel,Privacy-preserving remote diagnostics.
- Ling Cheung,Calvin C. Newport,Provably secure ciphertext policy ABE.
- Nicholas Hopper,Eugene Y. Vasserman,Eric Chan-Tin,How much anonymity does network latency leak?
- Paul Bunn,Rafail Ostrovsky,Secure two-party k-means clustering.
- Miroslav Ponec,Paul Giura,Hervé Brönnimann,Joel Wein,Highly efficient techniques for network forensics.
- Jedidiah R. Crandall,Daniel Zinn,Michael Byrd,Earl T. Barr,Rich East,ConceptDoppler: a weather tracker for internet censorship.
- Davide Balzarotti,Marco Cova,Viktoria Felmetsger,Giovanni Vigna,Multi-module vulnerability analysis of web-based applications.
- Patrick P. Tsang,Man Ho Au,Apu Kapadia,Sean W. Smith,Blacklistable anonymous credentials: blocking misbehaving users without ttps.
- Phillip Rogaway,Mihir Bellare,Robust computational secret sharing and a unified account of classical secret-sharing goals.
- Xuxian Jiang,Xinyuan Wang,Dongyan Xu,Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction.
- Anirudh Ramachandran,Nick Feamster,Santosh Vempala,Filtering spam with behavioral blacklisting.
- Juan Ramón Troncoso-Pastoriza,Stefan Katzenbeisser,Mehmet Utku Celik,Privacy preserving error resilient dna searching through oblivious automata.
- Chris Karlof,Umesh Shankar,J. Doug Tygar,David Wagner,Dynamic pharming attacks and locked same-origin policies for web browsers.
- Shuo Chen,David Ross,Yi-Min Wang,An analysis of browser domain-isolation bugs and a light-weight transparent defense mechanism.
- David John Zage,Cristina Nita-Rotaru,On the accuracy of decentralized virtual coordinate systems in adversarial networks.
- Ben Adida,Beamauth: two-factor web authentication with a bookmark.
- Bivas Mitra,Fernando Peruani,Sujoy Ghose,Niloy Ganguly,Analyzing the vulnerability of superpeer networks against attack.
- Hovav Shacham,The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86).
- Ari Juels,Burton S. Kaliski Jr.,Pors: proofs of retrievability for large files.
- Yingbo Song,Michael E. Locasto,Angelos Stavrou,Angelos D. Keromytis,Salvatore J. Stolfo,On the infeasibility of modeling polymorphic shellcode.
- Daniel V. Bailey,Dan Boneh,Eu-Jin Goh,Ari Juels,Covert channels in privacy-preserving identification systems.
- Collin Jackson,Adam Barth,Andrew Bortz,Weidong Shao,Dan Boneh,Protecting browsers from dns rebinding attacks.
- Jason Franklin,Adrian Perrig,Vern Paxson,Stefan Savage,An inquiry into the nature and causes of the wealth of internet miscreants.
- Nikita Borisov,George Danezis,Prateek Mittal,Parisa Tabriz,Denial of service or denial of security?
- Lei Zhang,Sushil Jajodia,Alexander Brodsky,Information disclosure under realistic assumptions: privacy versus optimality.
- Sruthi Bandhakavi,Prithvi Bisht,P. Madhusudan,V. N. Venkatakrishnan,CANDID: preventing sql injection attacks using dynamic candidate evaluations.
- J. Alex Halderman,Brent Waters,Harvesting verifiable challenges from oblivious online sources.
- Alexandra Boldyreva,Craig Gentry,Adam O'Neill,Dae Hyun Yum,Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing.
- Leo Dorrendorf,Zvi Gutterman,Benny Pinkas,Cryptanalysis of the windows random number generator.
- Ran Canetti,Susan Hohenberger,Chosen-ciphertext secure proxy re-encryption.
- Babak Azimi-Sadjadi,Aggelos Kiayias,Alejandra Mercado,Bülent Yener,Robust key generation from signal envelopes in wireless networks.
- Nick L. Petroni Jr.,Michael W. Hicks,Automated detection of persistent kernel control-flow attacks.
- Heng Yin,Dawn Xiaodong Song,Manuel Egele,Christopher Kruegel,Engin Kirda,Panorama: capturing system-wide information flow for malware detection and analysis.
- Steven Gianvecchio,Haining Wang,Detecting covert timing channels: an entropy-based approach.
- Paul Dunphy,Jeff Yan,Do background images improve "draw a secret" graphical passwords?
- Emre Can Sezer,Peng Ning,Chongkyung Kil,Jun Xu,Memsherlock: an automated debugger for unknown memory corruption vulnerabilities.
- Rinku Dewri,Nayot Poolsappasit,Indrajit Ray,Darrell Whitley,Optimal security hardening using multi-objective optimization on attack tree models of networks.
- Sujata Garera,Aviel D. Rubin,An independent audit framework for software dependent voting systems.
- Chris Lesniewski-Laas,Bryan Ford,Jacob Strauss,Robert Morris,M. Frans Kaashoek,Alpaca: extensible authorization for distributed services.
- José M. González,Vern Paxson,Nicholas Weaver,Shunting: a hardware/software architecture for flexible, high-performance network intrusion prevention.
- Shai Halevi,Hugo Krawczyk,Security under key-dependent inputs.
- Jeffrey S. Dwoskin,Ruby B. Lee,Hardware-rooted trust for secure key management and transient trust.
- Baik Hoh,Marco Gruteser,Hui Xiong,Ansaf Alrabady,Preserving privacy in gps traces via uncertainty-aware path cloaking.
- Scott D. Stoller,Ping Yang,C. R. Ramakrishnan,Mikhail I. Gofman,Efficient policy analysis for administrative role based access control.
- Stephan Neuhaus,Thomas Zimmermann,Christian Holler,Andreas Zeller,Predicting vulnerable software components.
- Rafail Ostrovsky,Amit Sahai,Brent Waters,Attribute-based encryption with non-monotonic access structures.
- Jeremy Elson,John R. Douceur,Jon Howell,Jared Saul,Asirra: a CAPTCHA that exploits interest-aligned manual image categorization.
- Juan Caballero,Heng Yin,Zhenkai Liang,Dawn Xiaodong Song,Polyglot: automatic extraction of protocol message format using dynamic binary analysis.
2006usa
- Kun Sun,Peng Ning,Cliff Wang,TinySeRSync: secure and resilient time synchronization in wireless sensor networks.
- Kevin R. B. Butler,Patrick McDaniel,William Aiello,Optimizing BGP security by exploiting path stability.
- John G. Brainard,Ari Juels,Ronald L. Rivest,Michael Szydlo,Moti Yung,Fourth-factor authentication: somebody you know.
- Ninghui Li,Qihua Wang,Beyond separation of duty: an algebra for specifying high-level security policies.
- Jaideep Vaidya,Vijayalakshmi Atluri,Janice Warner,RoleMiner: mining roles using subset enumeration.
- Dan Boneh,Brent Waters,A fully collusion resistant broadcast, trace, and revoke system.
- James Newsome,David Brumley,Jason Franklin,Dawn Xiaodong Song,Replayer: automatic protocol replay by binary analysis.
- Mihir Bellare,Tadayoshi Kohno,Victor Shoup,Stateful public-key cryptosystems: how to encrypt with one 160-bit exponentiation.
- Marc Liberatore,Brian Neil Levine,Inferring the source of encrypted HTTP connections.
- Xavier Boyen,Hovav Shacham,Emily Shen,Brent Waters,Forward-secure signatures with untrusted update.
- Matthew Pirretti,Patrick Traynor,Patrick McDaniel,Brent Waters,Secure attribute-based systems.
- Vipul Goyal,Omkant Pandey,Amit Sahai,Brent Waters,Attribute-based encryption for fine-grained access control of encrypted data.
- Shai Rubin,Somesh Jha,Barton P. Miller,Protomatching network traffic for high throughputnetwork intrusion detection.
- Steven J. Murdoch,Hot or not: revealing hidden services by their clock skew.
- Constance L. Heitmeyer,Myla Archer,Elizabeth I. Leonard,John D. McLean,Formal specification and verification of data separation in a separation kernel for an embedded system.
- Mihir Bellare,Gregory Neven,Multi-signatures in the plain public-Key model and a general forking lemma.
- Giuseppe Ateniese,Alfredo De Santis,Anna Lisa Ferrara,Barbara Masucci,Provably-secure time-bound hierarchical key assignment schemes.
- Arjun Nambiar,Matthew Wright,Salsa: a structured approach to large-scale anonymity.
- Haowen Chan,Adrian Perrig,Dawn Xiaodong Song,Secure hierarchical in-network aggregation in sensor networks.
- Michael Backes,Peeter Laud,Computationally sound secrecy proofs by mechanized flow analysis.
- Vinh The Lam,Spyros Antonatos,Periklis Akritidis,Kostas G. Anagnostakis,Puppetnets: misusing web browsers as a distributed attack infrastructure.
- Philippe Golle,Frank McSherry,Ilya Mironov,Data collection with self-enforcing privacy.
- Yigael Berger,Avishai Wool,Arie Yeredor,Dictionary attacks using keyboard acoustic emanations.
- Adam J. Lee,Marianne Winslett,Safety and consistency in policy-based authorization systems.
- Prahlad Fogla,Wenke Lee,Evading network anomaly detection systems: formal reasoning and practical techniques.
- Umesh Shankar,Chris Karlof,Doppelganger: Better browser privacy without the bother.
- XiaoFeng Wang,Zhuowei Li,Jun Xu,Michael K. Reiter,Chongkyung Kil,Jong Youl Choi,Packet vaccine: black-box exploit detection and signature generation.
- Xinming Ou,Wayne F. Boyer,Miles A. McQueen,A scalable approach to attack graph generation.
- Louis Kruger,Somesh Jha,Eu-Jin Goh,Dan Boneh,Secure function evaluation with ordered binary decision diagrams.
- Reza Curtmola,Juan A. Garay,Seny Kamara,Rafail Ostrovsky,Searchable symmetric encryption: improved definitions and efficient constructions.
- Bo Zhu,Sanjeev Setia,Sushil Jajodia,Providing witness anonymity in peer-to-peer systems.
- Cristian Cadar,Vijay Ganesh,Peter M. Pawlowski,David L. Dill,Dawson R. Engler,EXE: automatically generating inputs of death.
- Jan Camenisch,Susan Hohenberger,Markulf Kohlweiss,Anna Lysyanskaya,Mira Meyerovich,How to win the clonewars: efficient periodic n-times anonymous authentication.
- Mario Di Raimondo,Rosario Gennaro,Hugo Krawczyk,Deniable authentication and key exchange.
- Joshua Mason,Kathryn Watkins,Jason Eisner,Adam Stubblefield,A natural language approach to automated cryptanalysis of two-time pads.
- Mengjun Xie,Heng Yin,Haining Wang,An effective defense against email spam laundering.
- Keith Irwin,Ting Yu,William H. Winsborough,On the modeling and analysis of obligations.
- Ninghui Li,Mahesh V. Tripunitara,Qihua Wang,Resiliency policies in access control.
2005
- Jiangtao Li,Ninghui Li,William H. Winsborough,Automated trust negotiation using cryptographic credentials.
- Boaz Barak,Shai Halevi,A model and architecture for pseudo-random generation with applications to /dev/random.
- Onur Aciiçmez,Werner Schindler,Çetin Kaya Koç,Improving Brumley and Boneh timing attack on unprotected SSL implementations.
- Giuseppe Ateniese,Jan Camenisch,Breno de Medeiros,Untraceable RFID tags via insubvertible encryption.
- Shai Rubin,Mihai Christodorescu,Vinod Ganapathy,Jonathon T. Giffin,Louis Kruger,Hao Wang,Nicholas Kidd,An auctioning reputation system based on anomaly.
- Mudhakar Srivatsa,Ling Liu,Securing publish-subscribe overlay services with EventGuard.
- Peeter Laud,Secrecy types for a simulatable cryptographic library.
- Jonathan Katz,Ji Sun Shin,Modeling insider attacks on group key-exchange protocols.
- Martín Abadi,Mihai Budiu,Úlfar Erlingsson,Jay Ligatti,Control-flow integrity.
- Li Zhuang,Feng Zhou,J. D. Tygar,Keyboard acoustic emanations revisited.
- Meiyuan Zhao,Sean W. Smith,David M. Nicol,Aggregated path authentication for efficient BGP security.
- Marianne Winslett,Charles C. Zhang,Piero A. Bonatti,PeerAccess: a logic for distributed authorization.
- Kevin Borders,Xin Zhao,Atul Prakash,CPOL: high-performance policy evaluation.
- Changhua He,Mukund Sundararajan,Anupam Datta,Ante Derek,John C. Mitchell,A modular correctness proof of IEEE 802.11i and TLS.
- Michael F. Ringenburg,Dan Grossman,Preventing format-string attacks via automatic and efficient dynamic checking.
- Jun Xu,Peng Ning,Chongkyung Kil,Yan Zhai,Christopher Bookholt,Automatic diagnosis and response to memory corruption vulnerabilities.
- Arvind Narayanan,Vitaly Shmatikov,Fast dictionary attacks on passwords using time-space tradeoff.
- Karl Krukow,Mogens Nielsen,Vladimiro Sassone,A framework for concrete reputation-systems with applications to history-based access control.
- Mikhail J. Atallah,Keith B. Frikken,Marina Blanton,Dynamic and efficient key management for access hierarchies.
- Giuseppe Ateniese,Susan Hohenberger,Proxy re-signatures: new definitions, algorithms, and applications.
- Arvind Narayanan,Vitaly Shmatikov,Obfuscated databases and group privacy.
- Angelos Stavrou,Angelos D. Keromytis,Countering DoS attacks with stateless multipath overlays.
- Xinyuan Wang,Shiping Chen,Sushil Jajodia,Tracking anonymous peer-to-peer VoIP calls on the internet.
- William Enck,Patrick Traynor,Patrick McDaniel,Thomas F. La Porta,Exploiting open functionality in SMS-capable cellular networks.
- Jedidiah R. Crandall,Zhendong Su,Shyhtsun Felix Wu,Frederic T. Chong,On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits.
- Qiang Huang,David Jao,Helen J. Wang,Applications of secure electronic voting to automated privacy-preserving troubleshooting.
- Craig Gentry,Philip D. MacKenzie,Zulfikar Ramzan,Password authenticated key exchange using hidden smooth subgroups.
- Keith Irwin,Ting Yu,Preventing attribute information leakage in automated trust negotiation.
- Matthew Yurkewych,Brian Neil Levine,Arnold L. Rosenberg,On the cost-ineffectiveness of redundancy in commercial P2P computing.
- Mathieu Baudet,Deciding security of protocols against off-line guessing attacks.
- Vinod Ganapathy,Trent Jaeger,Somesh Jha,Automatic placement of authorization hooks in the linux security modules framework.
- Jason Crampton,Understanding and developing role-based administrative models.
- Jean-Pierre Seifert,On authenticated computing and RSA-based authentication.
- Mario Di Raimondo,Rosario Gennaro,New approaches for deniable authentication.
- Zhenkai Liang,R. Sekar,Fast and automated generation of attack signatures: a basis for building self-protecting servers.
- Xavier Boyen,Qixiang Mei,Brent Waters,Direct chosen ciphertext security from identity-based techniques.
- Mohamed Shehab,Elisa Bertino,Arif Ghafoor,Secure collaboration in mediator-free environments.
- Rob Sherwood,Bobby Bhattacharjee,Ryan Braud,Misbehaving TCP receivers can cause internet-wide congestion collapse.
2004p
- Yevgeniy Dodis,Michael J. Freedman,Stanislaw Jarecki,Shabsi Walfish,Versatile padding schemes for joint signature and encryption.
- Danfeng Yao,Nelly Fazio,Yevgeniy Dodis,Anna Lysyanskaya,ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption.
- Xavier Boyen,Reusable cryptographic fuzzy extractors.
- Volker Roth,Kai Richter,Rene Freidinger,A PIN-entry method resilient against shoulder surfing.
- Tadayoshi Kohno,Attacking and repairing the winZip encryption scheme.
- Adam J. O'Donnell,Harish Sethu,On achieving software diversity for improved network security using distributed coloring algorithms.
- David Molnar,David Wagner,Privacy and security in library RFID: issues, practices, and architectures.
- Dan Boneh,Hovav Shacham,Group signatures with verifier-local revocation.
- Giovanni Vigna,William K. Robertson,Davide Balzarotti,Testing network-based intrusion detection signatures using mutant exploits.
- XiaoFeng Wang,Michael K. Reiter,Mitigating bandwidth-exhaustion attacks using congestion puzzles.
- Mahesh V. Tripunitara,Ninghui Li,Comparing the expressive power of access control models.
- Shouhuai Xu,Moti Yung,k-anonymous secret handshakes with reusable credentials.
- Hao Chen,Jonathan S. Shapiro,Using build-integrated static checking to preserve correctness invariants.
- Neil Daswani,Hector Garcia-Molina,Pong-cache poisoning in GUESS.
- Serdar Cabuk,Carla E. Brodley,Clay Shields,IP covert timing channels: design and detection.
- Stéphanie Delaune,Florent Jacquemard,A decision procedure for the verification of security protocols with explicit destructors.
- Brent Waters,Ari Juels,J. Alex Halderman,Edward W. Felten,New client puzzle outsourcing techniques for DoS resistance.
- Debin Gao,Michael K. Reiter,Dawn Xiaodong Song,Gray-box extraction of execution graphs for anomaly detection.
- Michael K. Reiter,XiaoFeng Wang,Fragile mixing.
- David P. Woodruff,Jessica Staddon,Private inference control.
- Apu Kapadia,Geetanjali Sampemane,Roy H. Campbell,KNOW Why your access was denied: regulating feedback for usable security.
- Ninghui Li,Ziad Bizri,Mahesh V. Tripunitara,On mutually-exclusive roles and separation of duty.
- Philippe Golle,Ari Juels,Parallel mixing.
- Reiner Sailer,Trent Jaeger,Xiaolan Zhang,Leendert van Doorn,Attestation-based policy enforcement for remote access.
- Kevin Borders,Atul Prakash,Web tap: detecting covert web traffic.
- Holger Dreger,Anja Feldmann,Vern Paxson,Robin Sommer,Operational experiences with high-volume network intrusion detection.
- David Wagner,Cryptanalysis of a provably secure CRT-RSA algorithm.
- Ernest F. Brickell,Jan Camenisch,Liqun Chen,Direct anonymous attestation.
- Robert W. Bradshaw,Jason E. Holt,Kent E. Seamons,Concealing complex policies with hidden credentials.
- Kirill Levchenko,Ramamohan Paturi,George Varghese,On the difficulty of scalably detecting network attacks.
- Stephen Chong,Andrew C. Myers,Security policies for downgrading.
- Hovav Shacham,Matthew Page,Ben Pfaff,Eu-Jin Goh,Nagendra Modadugu,Dan Boneh,On the effectiveness of address-space randomization.
- Kulesh Shanmugasundaram,Hervé Brönnimann,Nasir D. Memon,Payload attribution via hierarchical bloom filters.
- Theodore Diament,Homin K. Lee,Angelos D. Keromytis,Moti Yung,The dual receiver cryptosystem and its applications.
- Karthikeyan Bhargavan,Cédric Fournet,Andrew D. Gordon,Verifying policy-based security for web services.
2003
- Peng Ning,Dingbang Xu,Learning attack strategies from intrusion alerts.
- Emmanuel Bresson,Olivier Chevassut,David Pointcheval,Security proofs for an efficient password-based key exchange.
- Xinyuan Wang,Douglas S. Reeves,Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays.
- Elena Gabriela Barrantes,David H. Ackley,Trek S. Palmer,Darko Stefanovic,Dino Dai Zovi,Randomized instruction set emulation to disrupt binary code injection attacks.
- Ernesto Damiani,Sabrina De Capitani di Vimercati,Sushil Jajodia,Stefano Paraboschi,Pierangela Samarati,Balancing confidentiality and efficiency in untrusted relational DBMSs.
- Luis von Ahn,Andrew Bortz,Nicholas J. Hopper,k-anonymous message transmission.
- Christopher Krügel,Giovanni Vigna,Anomaly detection of web-based attacks.
- Sencun Zhu,Sanjeev Setia,Sushil Jajodia,LEAP: efficient security mechanisms for large-scale distributed sensor networks.
- Cullen Linn,Saumya K. Debray,Obfuscation of executable code to improve resistance to static disassembly.
- Jonathan Katz,Nan Wang,Efficiency improvements for signature schemes with tight security reductions.
- Makoto Murata,Akihiko Tozawa,Michiharu Kudo,Satoshi Hada,XML access control using static analysis.
- Gaurav S. Kc,Angelos D. Keromytis,Vassilis Prevelakis,Countering code-injection attacks with instruction-set randomization.
- Baoshi Zhu,Jiankang Wu,Mohan S. Kankanhalli,Print signatures for document authentication.
- William G. Morein,Angelos Stavrou,Debra L. Cook,Angelos D. Keromytis,Vishal Misra,Dan Rubenstein,Using graphic turing tests to counter automated DDoS attacks against web servers.
- William Aiello,John Ioannidis,Patrick Drew McDaniel,Origin authentication in interdomain routing.
- Wenliang Du,Jing Deng,Yunghsiang S. Han,Pramod K. Varshney,A pairwise key pre-distribution scheme for wireless sensor networks.
- Robin Sommer,Vern Paxson,Enhancing byte-level network intrusion detection signatures with context.
- Peng Liu,Wanyu Zang,Incentive-based modeling and inference of attacker intent, objectives, and strategies.
- Philip D. MacKenzie,Alina Oprea,Michael K. Reiter,Automatic generation of two-party computations.
- Ari Juels,Ronald L. Rivest,Michael Szydlo,The blocker tag: selective blocking of RFID tags for consumer privacy.
- Junfeng Yang,Ted Kremenek,Yichen Xie,Dawson R. Engler,MECA: an extensible, expressive system and language for statically checking security properties.
- Vinod Ganapathy,Somesh Jha,David Chandler,David Melski,David Vitek,Buffer overrun detection using linear programming and static analysis.
- Cheng Jin,Haining Wang,Kang G. Shin,Hop-count filtering: an effective defense against spoofed DDoS traffic.
- Cliff Changchun Zou,Lixin Gao,Weibo Gong,Donald F. Towsley,Monitoring and early warning for internet worms.
- David A. Basin,Sebastian Mödersheim,Luca Viganò,CDiff: a new reduction technique for constraint-based analysis of security protocols.
- Michael Backes,Birgit Pfitzmann,Michael Waidner,A composable cryptographic library with nested operations.
- Johannes Blömer,Martin Otto,Jean-Pierre Seifert,A new CRT-RSA algorithm secure against bellcore attacks.
- Donggang Liu,Peng Ning,Establishing pairwise keys in distributed sensor networks.
- Eric Cronin,Sugih Jamin,Tal Malkin,Patrick Drew McDaniel,On the performance, feasibility, and use of forward-secure signatures.
- Brent R. Waters,Edward W. Felten,Amit Sahai,Receiver anonymity via incomparable public keys.
- Jason Crampton,On permissions, inheritance and role hierarchies.
- Beverly Yang,Hector Garcia-Molina,PPay: micropayments for peer-to-peer systems.
- Donggang Liu,Peng Ning,Kun Sun,Efficient self-healing group key distribution with revocation capability.
- Charlie Kaufman,Radia J. Perlman,Bill Sommerfeld,DoS protection for UDP-based protocols.
- Gene Itkis,Cryptographic tamper evidence.
2002
- Nils Gura,Hans Eberle,Sheueling Chang Shantz,Generic implementations of elliptic curve cryptography using partial reduction.
- L. Jean Camp,DRM: doesn't realy mean digital copyright management.
- Michael J. Freedman,Robert Morris,Tarzan: a peer-to-peer anonymizing network layer.
- Benny Pinkas,Tomas Sander,Securing passwords against dictionary attacks.
- Dan Boneh,Philippe Golle,Almost entirely correct mixing with applications to voting.
- Phillip Rogaway,Authenticated-encryption with associated-data.
- Paul Ammann,Duminda Wijesekera,Saket Kaushik,Scalable, graph-based network vulnerability analysis.
- William Aiello,Steven M. Bellovin,Matt Blaze,John Ioannidis,Omer Reingold,Ran Canetti,Angelos D. Keromytis,Efficient, DoS-resistant, secure key exchange for internet protocols.
- Antony Edwards,Trent Jaeger,Xiaolan Zhang,Runtime verification of authorization hook placement for the linux security modules framework.
- R. Sekar,Ajay K. Gupta,J. Frullo,T. Shanbhag,A. Tiwari,H. Yang,S. Zhou,Specification-based anomaly detection: a new approach for detecting network intrusions.
- Peng Ning,Yun Cui,Douglas S. Reeves,Constructing attack scenarios through correlation of intrusion alerts.
- Robert H. Deng,Jianying Zhou,Feng Bao,Defending against redirect attacks in mobile IP.
- Neil Daswani,Hector Garcia-Molina,Query-flood DoS attacks in gnutella.
- Blaise Gassend,Dwaine E. Clarke,Marten van Dijk,Srinivas Devadas,Silicon physical random functions.
- David Wagner,Paolo Soto,Mimicry attacks on host-based intrusion detection systems.
- Mihir Bellare,Tadayoshi Kohno,Chanathip Namprempre,Authenticated encryption in SSH: provably fixing the SSH binary packet protocol.
- Elisa Bertino,Barbara Carminati,Elena Ferrari,A temporal key management scheme for secure broadcasting of XML documents.
- Jan Camenisch,Els Van Herreweghen,Design and implementation of the idemix anonymous credential system.
- Vishal Mittal,Giovanni Vigna,Sensor-based intrusion detection for intra-domain distance-vector routing.
- Hao Chen,David Wagner,MOPS: an infrastructure for examining security properties of software.
- Michael T. Goodrich,Efficient packet marking for large-scale IP traceback.
- Cliff Changchun Zou,Weibo Gong,Donald F. Towsley,Code red worm propagation modeling and analysis.
- Duminda Wijesekera,Sushil Jajodia,Policy algebras for access control the predicate case.
- Laurent Eschenauer,Virgil D. Gligor,A key-management scheme for distributed sensor networks.
- Christian Cachin,Klaus Kursawe,Anna Lysyanskaya,Reto Strobl,Asynchronous verifiable secret sharing and proactive cryptosystems.
- Ernesto Damiani,Sabrina De Capitani di Vimercati,Stefano Paraboschi,Pierangela Samarati,Fabio Violante,A reputation-based approach for choosing reliable resources in peer-to-peer networks.
- Giampaolo Bella,Lawrence C. Paulson,Fabio Massacci,The verification of an industrial payment protocol: the SET purchase phase.
2001
- Adrian Perrig,The BiBa one-time signature and broadcast authentication protocol.
- David Naccache,David Pointcheval,Jacques Stern,Twin signatures: an alternative to the hash-and-sign paradigm.
- Ninghui Li,William H. Winsborough,John C. Mitchell,Distributed credential chain discovery in trust management: extended abstract.
- Stuart Haber,Benny Pinkas,Securely combining public-key cryptosystems.
- Rohit Chadha,Max I. Kanovich,Andre Scedrov,Inductive methods and contract-signing protocols.
- Giuseppe Ateniese,Stefan Mangard,A new approach to DNS security (DNSSEC).
- C. Andrew Neff,A verifiable secret shuffle and its application to e-voting.
- Duminda Wijesekera,Sushil Jajodia,Policy algebras for access control: the propositional case.
- Jonathan K. Millen,Vitaly Shmatikov,Constraint solving for bounded-process cryptographic protocol analysis.
- Catherine Meadows,Paul F. Syverson,Formalizing GDOI group key management requirements in NPATRL.
- Silvio Micali,Kazuo Ohta,Leonid Reyzin,Accountable-subgroup multisignatures: extended abstract.
- Dario Catalano,Rosario Gennaro,Nick Howgrave-Graham,Phong Q. Nguyen,Paillier's cryptosystem revisited.
- Emmanuel Bresson,Olivier Chevassut,David Pointcheval,Jean-Jacques Quisquater,Provably authenticated group Diffie-Hellman key exchange.
- Naoya Nitta,Yoshiaki Takata,Hiroyuki Seki,An efficient security verification method for programs with stack inspection.
- Dawn Xiaodong Song,Practical forward secure group signature schemes.
- Gustaf Neumann,Mark Strembeck,Design and implementation of a flexible RBAC-service in an object-oriented scripting language.
- Premkumar T. Devanbu,Michael Gertz,April Kwong,Charles U. Martel,Glen Nuckolls,Stuart G. Stubblebine,Flexible authentication of XML documents.
- Alan Harbitter,Daniel A. Menascé,The performance of public key-enabled kerberos authentication in mobile computing applications.
- Ting Yu,Marianne Winslett,Kent E. Seamons,Interoperable strategies in automated trust negotiation.
- Federico Crazzolara,Glynn Winskel,Events in security protocols.
- Joshua D. Guttman,F. Javier Thayer,Lenore D. Zuck,The faithfulness of abstract protocol analysis: message authentication.
- Joseph Y. Halpern,Riccardo Pucella,On the relationship between strand spaces and multi-agent systems.
- Marc Waldman,David Mazières,Tangler: a censorship-resistant publishing system based on document entanglements.
- Vijayalakshmi Atluri,Soon Ae Chun,Pietro Mazzoleni,A Chinese wall security model for decentralized workflow systems.
- Phillip Rogaway,Mihir Bellare,John Black,Ted Krovetz,OCB: a block-cipher mode of operation for efficient authenticated encryption.
- Philip D. MacKenzie,Michael K. Reiter,Delegation of cryptographic servers for capture-resilient devices.
- Niklas Frykholm,Ari Juels,Error-tolerant password recovery.
2000
- Vijay Varadharajan,Security enhanced mobile agents.
- Piero A. Bonatti,Sabrina De Capitani di Vimercati,Pierangela Samarati,A modular approach to composing access control policies.
- Johannes Merkle,Multi-round passive attacks on server-aided RSA protocols.
- Reihaneh Safavi-Naini,Huaxiong Wang,New constructions for multicast re-keying schemes using perfect hash families.
- Johan Håstad,Jakob Jonsson,Ari Juels,Moti Yung,Funkspiel schemes: an alternative to conventional tamper resistance.
- Clay Shields,Brian Neil Levine,A protocol for anonymous communication over the Internet.
- Sotiris Ioannidis,Angelos D. Keromytis,Steven M. Bellovin,Jonathan M. Smith,Implementing a distributed firewall.
- Yuji Watanabe,Hideki Imai,Reducing the round complexity of a sealed-bid auction protocol with an off-line TTP.
- Richard Au,Mark Looi,Paul Ashley,Cross-domain one-shot authorization using smart cards.
- Glenn Durfee,Matthew K. Franklin,Distribution chain security.
- Joachim Biskup,Ulrich Flegel,Threshold-based identity recovery for privacy enhanced applications.
- Manfred Hauswirth,Clemens Kerer,Roman Kurmanowytsch,A secure execution framework for Java.
- Ahto Buldas,Peeter Laud,Helger Lipmaa,Accountable certificate management using undeniable attestations.
- Pino Persiano,Ivan Visconti,User privacy issues regarding certificates and the TLS protocol: the design and implementation of the SPSL protocol.
- Jonathon Tidswell,Trent Jaeger,An access control model for simplifying constraint expression.
- Michiharu Kudo,Satoshi Hada,XML document security based on provisional authorization.
- Avigdor Gal,Vijayalakshmi Atluri,An authorization model for temporal data.
- Hugo Krawczyk,Simple forward-secure signatures from any signature scheme.
- Birgit Pfitzmann,Michael Waidner,Composition and integrity preservation of secure reactive systems.
- Massimo Bernaschi,Emanuele Gabrielli,Luigi V. Mancini,Operating system enhancements to prevent the misuse of system calls.
- Ting Yu,Xiaosong Ma,Marianne Winslett,PRUNES: an efficient and complete strategy for automated trust negotiation over the Internet.
- Edward W. Felten,Michael A. Schneider,Timing attacks on Web privacy.
- Yvo Desmedt,Tri Van Le,Moiré cryptography.
- Thomas W. Doeppner Jr.,Philip N. Klein,Andrew Koyfman,Using router stamping to identify the source of IP packets.
- John Iliadis,Diomidis Spinellis,Dimitris Gritzalis,Bart Preneel,Sokratis K. Katsikas,Evaluating certificate status information mechanisms.
- Rebecca N. Wright,Patrick Lincoln,Jonathan K. Millen,Efficient fault-tolerant certificate revocation.
- Piero A. Bonatti,Pierangela Samarati,Regulating service access and information release on the Web.
- Yongdae Kim,Adrian Perrig,Gene Tsudik,Simple and fault-tolerant key agreement for dynamic collaborative groups.
1999
- Dan Boneh,Matthew K. Franklin,Anonymous Authentication with Subset Queries (extended abstract).
- Fabian Monrose,Michael K. Reiter,Susanne Wetzel,Password Hardening Based on Keystroke Dynamics.
- Guillaume Poupard,Jacques Stern,On the Fly Signatures Based on Factoring.
- Maurizio Kliban Boyarsky,Public-Key Cryptography and Password Protocols: The Multi-User Case.
- R. Sekar,Y. Guang,S. Verma,T. Shanbhag,A High-Performance Network Intrusion Detection System.
- Andrew W. Appel,Edward W. Felten,Proof-Carrying Authentication.
- Giuseppe Ateniese,Efficient Verifiable Encryption (and Fair Exchange) of Digital Signatures.
- Juzar Motiwalla,Gene Tsudik,Stefan Axelsson,The Base-Rate Fallacy and Its Implications for the Difficulty of Intrusion Detection.
- William Aiello,Aviel D. Rubin,Martin Strauss,Using Smartcards to Secure a Personalized Gambling Device.
- Christian Cachin,Efficient Private Bidding and Auctions with an Oblivious Third Party.
- Boaz Barak,Amir Herzberg,Dalit Naor,Eldad Shai,The Proactive Security Toolkit and Applications.
- Pankaj Rohatgi,A Compact and Fast Hybrid Signature Scheme for Multicast Packet Authentication.
- Refik Molva,Alain Pannetrat,Scalable Multicast Security in Dynamic Groups.
- Alain J. Mayer,Moti Yung,Secure Protocol Transformation via "Expansion": From Two-Party to Groups.
- Ari Juels,Martin Wattenberg,A Fuzzy Commitment Scheme.
- Ronald Cramer,Victor Shoup,Signature Schemes Based on the Strong RSA Assumption.
1998
- Li Gong,Michael K. Reiter,Klaus Becker,Uta Wille,Communication Complexity of Group Key Distribution.
- Terran Lane,Carla E. Brodley,Temporal Sequence Learning and Data Reduction for Anomaly Detection.
- Eran Gabber,Avishai Wool,How to Prove Where You Are: Tracking the Location of Customer Equipment.
- David Naccache,Jacques Stern,A New Public Key Cryptosystem Based on Higher Residues.
- Markus Jakobsson,Elizabeth A. M. Shriver,Bruce Hillyer,Ari Juels,A Practical Secure Physical Random Bit Generator.
- Avishai Wool,Key Management for Encrypted broadcast.
- Guy Edjlali,Anurag Acharya,Vipin Chaudhary,History-Based Access Control for Mobile Code.
- Allen Goldberg,A Specification of Java Loading and Bytecode Verification.
- Patrick Lincoln,John C. Mitchell,Mark Mitchell,Andre Scedrov,A Probabilistic Poly-Time Framework for Protocol Analysis.
- David Mazières,M. Frans Kaashoek,The Design, Implementation and Operation of an Email Pseudonym Server.
- Alfredo De Santis,Giovanni Di Crescenzo,Giuseppe Persiano,Communication-Efficient Anonymous Group Identification.
- Ian T. Foster,Carl Kesselman,Gene Tsudik,Steven Tuecke,A Security Architecture for Computational Grids.
- Jun (Jim) Xu,Mukesh Singhal,Design of a High-Performance ATM Firewall.
- Bruce Schneier,Mudge,Cryptanalysis of Microsoft's Point-to-Point Tunneling Protocol (PPTP).
- Rosario Gennaro,Daniele Micciancio,Tal Rabin,An Efficient Non-Interactive Statistical Zero-Knowledge Proof System for Quasi-Safe Prime Products.
- Giuseppe Ateniese,Michael Steiner,Gene Tsudik,Authenticated Group Key Agreement and Friends.
- Shai Halevi,Hugo Krawczyk,Public-Key Cryptography and Password Protocols.
1997
- Fabian Monrose,Aviel D. Rubin,Authentication via Keystroke Dynamics.
- N. Asokan,Matthias Schunter,Michael Waidner,Optimistic Protocols for Fair Exchange.
- Mihir Bellare,Shafi Goldwasser,Verifiable Partial Key Escrow.
- Francesco Bergadano,Bruno Crispo,Giancarlo Ruffo,Proactive Password Checking with Decision Trees.
- Marc Joye,Jean-Jacques Quisquater,On the Importance of Securing Your Bins: The Garbage-man-in-the-middle Attack.
- Simon N. Foley,The Specification and Implementation of ``Commercial'' Security Requirements Including Dynamic Segregation of Duties.
- Michael K. Reiter,Stuart G. Stubblebine,Path Independence for Authentication in Large-Scale Systems.
- Jacques Patarin,Improved Security Bounds for Pseudorandom Permutations.
- Stuart Haber,W. Scott Stornetta,Secure Names for Bit-Strings.
- Amir Herzberg,Markus Jakobsson,Stanislaw Jarecki,Hugo Krawczyk,Moti Yung,Proactive Public Key and Signature Systems.
- Drew Dean,The Security of Static Typing with Dynamic Linking.
- Robert H. Deng,Yongfei Han,Albert B. Jeng,Teow-Hin Ngair,A New On-Line Cash Check Scheme.
- Martín Abadi,Andrew D. Gordon,A Calculus for Cryptographic Protocols: The Spi Calculus.
- Richard Graveman,Philippe A. Janson,Clifford Neumann,Li Gong,Matthew K. Franklin,Michael K. Reiter,Fair Exchange with a Semi-Trusted Third Party (extended abstract).
- Birgit Pfitzmann,Michael Waidner,Asymmetric Fingerprinting for Larger Collusions.
- John Kelsey,Bruce Schneier,Conditional Purchase Orders.
- David Pointcheval,Jacques Stern,New Blind Signatures Equivalent to Factorization (extended abstract).
1996
- Michael K. Reiter,Matthew K. Franklin,John B. Lacy,Rebecca N. Wright,The Omega Key Management Service.
- Rynson W. H. Lau,Kwok-Yan Lam,Siu Leung Chung,The Failure of Anti-Hacking Legislation: A Hong Kong Perspective.
- Stuart G. Stubblebine,Rebecca N. Wright,An Authentication Logic Supporting Synchronization, Revocation, and Recency.
- Burkhard Wiegel,Secure External References in Multimedia Email Messages.
- Markus Jakobsson,Moti Yung,Revokable and Versatile Electronic Money (extended abstract).
- Jan Camenisch,Jean-Marc Piveteau,Markus Stadler,An Efficient Fair Payment System.
- David M. Goldschlag,Several Secure Store and Forward Devices.
- Tsutomu Matsumoto,Human-Computer Cryptography: An Attempt.
- Michael Steiner,Gene Tsudik,Michael Waidner,Diffie-Hellman Key Distribution Extended to Group Communication.
- David M'Raïhi,David Naccache,Batch Exponentiation: A Fast DLP-Based Signature Generation Strategy.
- Shaw-Cheng Chuang,Securing ATM Networks.
- Elisa Bertino,Sushil Jajodia,Pierangela Samarati,A Non-Timestamped Authorization Model for Data Management Systems.
- Li Gong,Jacques Stearn,Vipin Samar,Unified Login with Pluggable Authentication Modules (PAM).
- Moni Naor,Avishai Wool,Access Control and Signatures via Quorum Secret Sharing.
- Masahiro Mambo,Keisuke Usuda,Eiji Okamoto,Proxy Signatures for Delegating Signing Operation.
- Serge Vaudenay,An Experiment on DES Statistical Cryptanalysis.
- Markus Michels,Holger Petersen,Patrick Horster,Breaking and Repairing a Convertible Undeniable Signature Scheme.
- Hung-Min Sun,Shiuh-Pyng Shieh,Cryptanalysis of Private-Key Encryption Schemes Based on Burst-Error-Correcting Codes.
- Dominique Bolignano,An Approach to the Formal Verification of Cryptographic Protocols.
- Indrajit Ray,Elisa Bertino,Sushil Jajodia,Luigi V. Mancini,An Advanced Commit Protocol for MLS Distributed Database Systems.
1994
- Li Gong,New Protocols for Third-Party-Based Authentication and Secure Broadcast.
- L. Tombak,Reihaneh Safavi-Naini,Authentication Codes That Are r-Fold Secure Against Spoofing.
- John P. Nestor,E. S. Lee,Prerequisite Confidentiality.
- P. Rolin,Laurent Toutain,Sylvain Gombault,Network Security Probe.
- Elisa Bertino,Claudio Bettini,Pierangela Samarati,A Temporal Authorization Model.
- Alison Anderson,Dennis Longley,Lam-for Kwok,Security Modelling for Organisations.
- Randy Browne,An Entropy Conservation Law for Testing the Completeness of Convert Channel Analysis.
- Vaduvur Bharghavan,Secure Wireless LANs.
- M. Zhang,Stafford E. Tavares,L. L. Campbell,Information Leakage of Boolean Functions and Its Relationship to Other Cryptographic Criteria.
- Thomas Beth,Hans-Joachim Knobloch,Marcus Otten,Gustavus J. Simmons,Peer Wichmann,Towards Acceptable Key Escrow Systems.
- Dorothy E. Denning,Raymond Pyle,Ravi Ganesan,Ravi S. Sandhu,Trent Jaeger,Atul Prakash,Support for the File System Security Requirements of Computational E-Mail Systems.
- Paul C. van Oorschot,Michael J. Wiener,Parallel Collision Search with Application to Hash Functions and Discrete Logarithms.
- Refik Molva,Erich Rütsche,Application Access Control at Network Level.
- Patrick Horster,Holger Petersen,Markus Michels,Meta-ElGamal Signature Schemes.
- Michael K. Reiter,Secure Agreement Protocols: Reliable and Atomic Group Multicast in Rampart.
- Mike Just,Evangelos Kranakis,Danny Krizanc,Paul C. van Oorschot,On Key Distribution via True Broadcasting.
- Pierangela Samarati,Paul Ammann,Sushil Jajodia,Propagation of Authorizations in Distributed Database Systems.
- Steven H. Low,Sanjoy Paul,Nicholas F. Maxemchuk,Anonymous Credit Cards.
- Tatsuaki Okamoto,Kazuo Ohta,How to Simultaneously Exchange Secrets by General Assumptions.
- Matt Blaze,Protocol Failure in the Escrowed Encryption Standard.
- Edward Amoroso,Carol Taylor,John Watson,Jonathan Weiss,A Process-Oriented Methodology for Assessing and Improving Software Trustworthiness.
- Howard M. Heys,Stafford E. Tavares,The Design of Substitution-Permutation Networks Resistant to Differential and Linear Cryptanalysis.
- Thomas R. Cain,Alan T. Sherman,How to Break Gifford's Cipher (extended abstract).
- Heather M. Hinton,E. Stewart Lee,The Compatibility of Policies.
- Gennady Medvinsky,Charlie Lai,B. Clifford Neuman,Endorsements, Licensing, and Insurance for Distributed System Services.
- Warwick Ford,Michael J. Wiener,A Key Distribution Method for Object-Based Protection.
- James W. Coyne,Norman C. Kluksdahl,``Mainstreaming'' Automated Information Systems Security Engineering (a case study in security run amok).
- Gene H. Kim,Eugene H. Spafford,The Design and Implementation of Tripwire: A File System Integrity Checker.
- Marjan Jurecic,Herbert Bunz,Exchange of Patient Records - Prototype Implementation of a Security Attributes Service in X.500.
- Chris Charnes,Josef Pieprzyk,Reihaneh Safavi-Naini,Conditionally Secure Secret Sharing Schemes with Disenrollment Capability.
- Paul Ammann,Sushil Jajodia,An Efficient Multiversion Algorithm for Secure Servicing of Transaction Reads.
1993
- Miguel Soriano,Jordi Forné,Francisco Recacha,José L. Melús,A Particular Solution to Provide Secure Communications in an Ethernet Environment.
- Hank M. Kluepfel,Securing a Global Village and Its Resources: Baseline Security for Interconnected Signaling System #7 Telecommunications Networks.
- Patrick W. Brown,Digital Signatures: Can They be Accepted as Legal Signatures in EDI?
- Paul C. van Oorschot,Extending Cryptographic Logics of Belief to Key Agreement Protocols.
- Paul F. Syverson,Adding Time to a Logic of Authentication.
- Birgit Pfitzmann,Sorting Out Signature Schemes.
- Donald Byron Johnson,Stephen M. Matyas,An V. Le,John D. Wilkins,Design of the Commercial Data Masking Facility Data Privacy Algorithm.
- Kaisa Nyberg,Rainer A. Rueppel,A New Signature Scheme Based on the DSA Giving Message Recovery.
- Calvin Ko,Deborah A. Frincke,Terrance Goan,Todd L. Heberlein,Karl N. Levitt,Biswanath Mukherjee,Christopher Wee,Analysis of an Algorithm for Distributed Recognition and Accountability.
- Bart Preneel,René Govaerts,Joos Vandewalle,Differential Cryptanalysis of Hash Functions Based on Block Ciphers.
- Elisa Bertino,Pierangela Samarati,Sushil Jajodia,Authorizations in Relational Database Management Systems.
- Steven M. Bellovin,Michael Merritt,Augmented Encrypted Key Exchange: A Password-Based Protocol Secure against Dictionary Attacks and Password File Compromise.
- Thomas Y. C. Woo,Simon S. Lam,A Framework for Distributed Authorization.
- Raphael Yahalom,Optimality of Multi-Domain Protocols.
- Myong H. Kang,Ira S. Moskowitz,A Pump for Rapid, Reliable, Secure Communication.
- Yvo Desmedt,Mike Burmester,Towards Practical ``Proven Secure'' Authenticated Key Distribution.
- Matt Blaze,A Cryptographic File System for UNIX.
- Ping Lin,C. Sekar Chandersekaran,Integration of DCE and Local Registries: Design Approaches.
- Gene Tsudik,Els Van Herreweghen,On Simple and Secure Key Distribution.
- Gennady Medvinsky,B. Clifford Neuman,NetCash: A Design for Practical Electronic Currency on the Internet.
- Jennifer Seberry,Xian-Mo Zhang,Yuliang Zheng,Systematic Generation of Cryptographically Robust S-Boxes.
- Dan Brown,Security Planning for Personal Communications.
- Elisa Bertino,Pierangela Samarati,Sushil Jajodia,High Assurance Discretionary Access Control for Object Bases.
- Thomas Beth,Hans-Joachim Knobloch,Marcus Otten,Verifiable Secret Sharing for Monotone Access Structures.
- Li Gong,Lower Bounds on Messages and Rounds for Network Authentication Protocols.
- Mihir Bellare,Phillip Rogaway,Random Oracles are Practical: A Paradigm for Designing Efficient Protocols.
- Ross J. Anderson,Why Cryptosystems Fail.
- Dorothy E. Denning,Raymond Pyle,Ravi Ganesan,Ravi S. Sandhu,Victoria Ashby,Ralf C. Hauser,Does Licensing Require New Access Control Techniques?