Below is a list of publications authored by current faculty members of SPR@I.
2018
- Bo Chen, Klara Nahrstedt,
and Carl A. Gunter.
Response: Real-time, secure, and privacy-aware video redaction system.
In MobiQuitous, pages 39–48. ACM, 2018.
- Qingrong Chen, Chong Xiang,
Minhui Xue, Bo Li, Nikita
Borisov, Dali Kaarfar, and Haojin Zhu.
Differentially private data
generative models.
CoRR, abs/1812.02274, 2018.
- Raymond Cheng, Fan Zhang,
Jernej Kos, Warren He, Nicholas
Hynes, Noah M. Johnson, Ari Juels,
Andrew Miller, and Dawn Song.
Ekiden: A platform for
confidentiality-preserving, trustworthy, and performant smart contract
execution.
CoRR, abs/1804.05141, 2018.
- Hussein Darir, Hussein Sibai,
Nikita Borisov, Geir E. Dullerud, and
Sayan Mitra.
Tightrope: Towards optimal
load-balancing of paths in anonymous networks.
In Proceedings of the 2018 Workshop on Privacy in the Electronic Society,
WPES@CCS 2018, Toronto, ON, Canada, October 15-19, 2018, pages 76–85,
2018.
(doi:10.1145/3267323.3268953)
- Anupam Das, Gunes Acar,
Nikita Borisov, and Amogh Pradeep.
The web's sixth sense: A
study of scripts accessing smartphone sensors.
In Proceedings of the 2018 ACM SIGSAC Conference on Computer and
Communications Security, CCS 2018, Toronto, ON, Canada, October 15-19,
2018, pages 1515–1532, 2018.
(doi:10.1145/3243734.3243860)
- Anupam Das, Nikita Borisov,
and Edward Chou.
Every move you make:
Exploring practical issues in smartphone motion sensor fingerprinting and
countermeasures.
PoPETs, 2018(1):88–108, 2018.
(doi:10.1515/popets-2018-0005)
- Sergi Delgado-Segura, Surya
Bakshi, Cristina Pérez-Solà,
James Litton, Andrew Pachulski,
Andrew Miller, and Bobby Bhattacharjee.
Txprobe: Discovering bitcoin's
network topology using orphan transactions.
CoRR, abs/1812.00942, 2018.
- Giulia C. Fanti,
Shaileshh Bojja Venkatakrishnan, Surya Bakshi,
Bradley Denby, Shruti Bhargava,
Andrew Miller, and Pramod Viswanath.
Dandelion++: Lightweight
cryptocurrency networking with formal anonymity guarantees.
POMACS, 2(2):29:1–29:35, 2018.
(doi:10.1145/3224424)
- Giulia C. Fanti,
Shaileshh Bojja Venkatakrishnan, Surya Bakshi,
Bradley Denby, Shruti Bhargava,
Andrew Miller, and Pramod Viswanath.
Dandelion++: Lightweight
cryptocurrency networking with formal anonymity guarantees.
In Abstracts of the 2018 ACM International Conference on Measurement
and Modeling of Computer Systems, SIGMETRICS 2018, Irvine, CA, USA, June
18-22, 2018, pages 5–7, 2018.
(doi:10.1145/3219617.3219620)
- Giulia C. Fanti,
Shaileshh Bojja Venkatakrishnan, Surya Bakshi,
Bradley Denby, Shruti Bhargava,
Andrew Miller, and Pramod Viswanath.
Dandelion++: Lightweight
cryptocurrency networking with formal anonymity guarantees.
CoRR, abs/1805.11060, 2018.
- Lucas Freire, Miguel C.
Neves, Lucas Leal, Kirill Levchenko,
Alberto E. Schaeffer Filho, and Marinho P.
Barcellos.
Uncovering bugs in P4
programs with assertion-based verification.
In Proceedings of the Symposium on SDN Research, SOSR 2018, Los
Angeles, CA, USA, March 28-29, 2018, pages 4:1–4:7, 2018.
(doi:10.1145/3185467.3185499)
- Sergey Frolov, Eric Wustrow,
Frederick Douglas, Will Scott,
Allison McDonald, Benjamin VanderSloot,
Rod Hynes, Adam Kruger, Michalis
Kallitsis, David G. Robinson, Steve Schultze,
Nikita Borisov, and J. Alex Halderman.
An isp-scale deployment of
tapdance.
In Proceedings of the Applied Networking Research Workshop, ANRW 2018,
Montreal, QC, Canada, July 16-16, 2018, page 22, 2018.
(doi:10.1145/3232755.3232787)
- Karan Ganju, Qi Wang,
Wei Yang, Carl A. Gunter, and
Nikita Borisov.
Property inference attacks on
fully connected neural networks using permutation invariant
representations.
In Proceedings of the 2018 ACM SIGSAC Conference on Computer and
Communications Security, CCS 2018, Toronto, ON, Canada, October 15-19,
2018, pages 619–633, 2018.
(doi:10.1145/3243734.3243834)
- Wajih Ul Hassan, Saad
Hussain, and Adam M. Bates.
Analysis
of privacy protections in fitness tracking social networks -or- you can run,
but can you hide?.
In 27th USENIX Security Symposium, USENIX Security 2018, Baltimore,
MD, USA, August 15-17, 2018., pages 497–512, 2018.
- Wajih Ul Hassan, Mark Lemay,
Nuraini Aguse, Adam M. Bates, and
Thomas Moyer.
Towards
scalable cluster auditing through grammatical inference over provenance
graphs.
In 25th Annual Network and Distributed System Security Symposium, NDSS
2018, San Diego, California, USA, February 18-21, 2018, 2018.
- Kartik Hegde, Rohit Agrawal,
Yulun Yao, and Christopher W. Fletcher.
Morph: Flexible acceleration
for 3d cnn-based video understanding.
In 51st Annual IEEE/ACM International Symposium on Microarchitecture,
MICRO 2018, Fukuoka, Japan, October 20-24, 2018, pages 933–946,
2018.
(doi:10.1109/MICRO.2018.00080)
- Kartik Hegde, Rohit Agrawal,
Yulun Yao, and Christopher W. Fletcher.
Morph: Flexible acceleration for 3d
cnn-based video understanding.
CoRR, abs/1810.06807, 2018.
- Kartik Hegde, Jiyong Yu,
Rohit Agrawal, Mengjia Yan,
Michael Pellauer, and Christopher W. Fletcher.
UCNN: exploiting
computational reuse in deep neural networks via weight repetition.
In 45th ACM/IEEE Annual International Symposium on Computer
Architecture, ISCA 2018, Los Angeles, CA, USA, June 1-6, 2018, pages
674–687, 2018.
(doi:10.1109/ISCA.2018.00062)
- Kartik Hegde, Jiyong Yu,
Rohit Agrawal, Mengjia Yan,
Michael Pellauer, and Christopher W. Fletcher.
UCNN: exploiting computational
reuse in deep neural networks via weight repetition.
CoRR, abs/1804.06508, 2018.
- Danny Yuxing Huang,
Maxwell Matthaios Aliapoulios, Vector Guo Li,
Luca Invernizzi, Elie Bursztein,
Kylie McRoberts, Jonathan Levin,
Kirill Levchenko, Alex C. Snoeren, and
Damon McCoy.
Tracking ransomware
end-to-end.
In 2018 IEEE Symposium on Security and Privacy, SP 2018, Proceedings,
21-23 May 2018, San Francisco, California, USA, pages 618–631,
2018.
(doi:10.1109/SP.2018.00047)
- Seoung Kyun Kim, Zane Ma,
Siddharth Murali, Joshua Mason,
Andrew Miller, and Michael Bailey.
Measuring ethereum network
peers.
In Proceedings of the Internet Measurement Conference 2018, IMC 2018,
Boston, MA, USA, October 31 - November 02, 2018, pages 91–104,
2018.
- Varun Badrinath Krishna,
Carl A. Gunter, and William H. Sanders.
Evaluating detectors on optimal attack vectors that enable electricity theft
and DER fraud.
J. Sel. Topics Signal Processing, 12(4):790–805, 2018.
- Deepak Kumar, Riccardo
Paccagnella, Paul Murley, Eric Hennenfent,
Joshua Mason, Adam M. Bates, and
Michael Bailey.
Skill
squatting attacks on amazon alexa.
In 27th USENIX Security Symposium, USENIX Security 2018, Baltimore,
MD, USA, August 15-17, 2018., pages 33–47, 2018.
- Deepak Kumar, Zhengping
Wang, Matthew Hyder, Joseph Dickinson,
Gabrielle Beck, David Adrian,
Joshua Mason, Zakir Durumeric,
J. Alex Halderman, and Michael Bailey.
Tracking certificate
misissuance in the wild.
In 2018 IEEE Symposium on Security and Privacy, SP 2018, Proceedings,
21-23 May 2018, San Francisco, California, USA, pages 785–798,
2018.
(doi:10.1109/SP.2018.00015)
- Kevin Lee and Andrew Miller.
Authenticated data
structures for privacy-preserving monero light clients.
In 2018 IEEE European Symposium on Security and Privacy Workshops,
EuroS&P Workshops 2018, London, United Kingdom, April 23-27, 2018,
pages 20–28, 2018.
(doi:10.1109/EuroSPW.2018.00010)
- Zhuotao Liu, Hao Jin,
Yih-Chun Hu, and Michael Bailey.
Practical
proactive ddos-attack mitigation via endpoint-driven in-network traffic
control.
IEEE/ACM Trans. Netw., 26(4):1948–1961, 2018.
(doi:10.1109/TNET.2018.2854795)
- Yunhui Long, Vincent
Bindschaedler, Lei Wang, Diyue Bu,
Xiaofeng Wang, Haixu Tang,
Carl A. Gunter, and Kai Chen.
Understanding membership inferences on well-generalized learning models.
CoRR, abs/1802.04889, 2018.
- Yunhui Long, Tanmay
Gangwani, Haris Mughees, and Carl A. Gunter.
Distributed and secure ML with self-tallying multi-party aggregation.
CoRR, abs/1811.10296, 2018.
- Sinisa Matetic, Moritz
Schneider, Andrew Miller, Ari Juels, and
Srdjan Capkun.
Delegatee:
Brokered delegation using trusted execution environments.
In 27th USENIX Security Symposium, USENIX Security 2018, Baltimore,
MD, USA, August 15-17, 2018., pages 1387–1403, 2018.
- Sinisa Matetic, Moritz
Schneider, Andrew Miller, Ari Juels, and
Srdjan Capkun.
Delegatee: Brokered delegation using
trusted execution environments.
IACR Cryptology ePrint Archive, 2018:160, 2018.
- Patrick McCorry, Surya
Bakshi, Iddo Bentov, Andrew Miller, and
Sarah Meiklejohn.
Pisa: Arbitration outsourcing for
state channels.
IACR Cryptology ePrint Archive, 2018:582, 2018.
- Andrew Miller and Kent
Marett.
Blame
distribution following information security breaches.
In 24th Americas Conference on Information Systems, AMCIS 2018, New
Orleans, LA, USA, August 16-18, 2018, 2018.
- Andrew Miller and Merrill
Warkentin.
Why lie?:
Deception of health information.
In 24th Americas Conference on Information Systems, AMCIS 2018, New
Orleans, LA, USA, August 16-18, 2018, 2018.
- Andrew Miller, Zhicheng Cai,
and Somesh Jha.
Smart contracts and
opportunities for formal methods.
In Leveraging Applications of Formal Methods, Verification and
Validation. Industrial Practice - 8th International Symposium, ISoLA 2018,
Limassol, Cyprus, November 5-9, 2018, Proceedings, Part IV, pages
280–299, 2018.
(doi:10.1007/978-3-030-03427-6_22)
- Malte Möser, Kyle
Soska, Ethan Heilman, Kevin Lee,
Henry Heffan, Shashvat Srivastava,
Kyle Hogan, Jason Hennessey,
Andrew Miller, Arvind Narayanan, and
Nicolas Christin.
An empirical analysis of
traceability in the monero blockchain.
PoPETs, 2018(3):143–163, 2018.
(doi:10.1515/popets-2018-0025)
- Thomas F. J.-M. Pasquier,
Xueyuan Han, Thomas Moyer,
Adam M. Bates, Olivier Hermant,
David M. Eyers, Jean Bacon, and
Margo Seltzer.
Runtime analysis of
whole-system provenance.
In Proceedings of the 2018 ACM SIGSAC Conference on Computer and
Communications Security, CCS 2018, Toronto, ON, Canada, October 15-19,
2018, pages 1601–1616, 2018.
(doi:10.1145/3243734.3243776)
- Thomas F. J.-M. Pasquier,
Xueyuan Han, Thomas Moyer,
Adam M. Bates, Olivier Hermant,
David M. Eyers, Jean Bacon, and
Margo Seltzer.
Runtime analysis of whole-system
provenance.
CoRR, abs/1808.06049, 2018.
- Mohammad Rezaeirad, Brown
Farinholt, Hitesh Dharmdasani, Paul Pearce,
Kirill Levchenko, and Damon McCoy.
Schrödinger's
RAT: profiling the stakeholders in the remote access trojan ecosystem.
In 27th USENIX Security Symposium, USENIX Security 2018, Baltimore,
MD, USA, August 15-17, 2018., pages 1043–1060, 2018.
- Shubhra Kanti Karmaker Santu,
Vincent Bindschaedler, ChengXiang Zhai, and
Carl A. Gunter.
NRF: A naive re-identification framework.
In WPES@CCS, pages 121–132. ACM, 2018.
- Sajin Sasy, Sergey Gorbunov,
and Christopher W. Fletcher.
Zerotrace
: Oblivious memory primitives from intel SGX.
In 25th Annual Network and Distributed System Security Symposium, NDSS
2018, San Diego, California, USA, February 18-21, 2018, 2018.
- Emil Stefanov, Marten van
Dijk, Elaine Shi, T.-H. Hubert Chan,
Christopher W. Fletcher, Ling Ren,
Xiangyao Yu, and Srinivas Devadas.
Path ORAM: an extremely simple
oblivious RAM protocol.
J. ACM, 65(4):18:1–18:26, 2018.
(doi:10.1145/3177872)
- Gary F. Templeton, Andrew
Miller, and Martin Ndicu.
The
changing liability structures of information technology firms.
In 24th Americas Conference on Information Systems, AMCIS 2018, New
Orleans, LA, USA, August 16-18, 2018, 2018.
- Jing (Dave) Tian, Nolen
Scaife, Deepak Kumar, Michael Bailey,
Adam M. Bates, and Kevin R. B. Butler.
Sok: "plug & pray" today -
understanding USB insecurity in versions 1 through C.
In 2018 IEEE Symposium on Security and Privacy, SP 2018, Proceedings,
21-23 May 2018, San Francisco, California, USA, pages 1032–1047,
2018.
(doi:10.1109/SP.2018.00037)
- Güliz Seray Tuncay,
Soteris Demetriou, Karan Ganju, and
Carl A. Gunter.
Resolving the predicament of android custom permissions.
In NDSS. The Internet Society, 2018.
- Qi Wang, Wajih Ul Hassan,
Adam M. Bates, and Carl A. Gunter.
Fear and logging in the internet of things.
In NDSS. The Internet Society, 2018.
- Mengjia Yan, Jiho Choi,
Dimitrios Skarlatos, Adam Morrison,
Christopher W. Fletcher, and Josep Torrellas.
Invisispec: Making
speculative execution invisible in the cache hierarchy.
In 51st Annual IEEE/ACM International Symposium on Microarchitecture,
MICRO 2018, Fukuoka, Japan, October 20-24, 2018, pages 428–441,
2018.
(doi:10.1109/MICRO.2018.00042)
- Mengjia Yan, Christopher W.
Fletcher, and Josep Torrellas.
Cache telepathy: Leveraging shared
resource attacks to learn DNN architectures.
CoRR, abs/1808.04761, 2018.
- Jiyong Yu, Lucas Hsiung,
Mohamad El Hajj, and Christopher W. Fletcher.
Data oblivious ISA extensions for
side channel-resistant and high performance computing.
IACR Cryptology ePrint Archive, 2018:808, 2018.
- Xuejing Yuan, Yuxuan Chen,
Yue Zhao, Yunhui Long, Xiaokang
Liu, Kai Chen, Shengzhi Zhang,
Heqing Huang, Xiaofeng Wang, and
Carl A. Gunter.
Commandersong: A systematic approach for practical adversarial voice
recognition.
In USENIX Security Symposium, pages 49–64. USENIX
Association, 2018.
- Xuejing Yuan, Yuxuan Chen,
Yue Zhao, Yunhui Long, Xiaokang
Liu, Kai Chen, Shengzhi Zhang,
Heqing Huang, Xiaofeng Wang, and
Carl A. Gunter.
Commandersong: A systematic approach for practical adversarial voice
recognition.
CoRR, abs/1801.08535, 2018.
- Yi Zhou, Deepak Kumar,
Surya Bakshi, Joshua Mason,
Andrew Miller, and Michael Bailey.
Erays:
Reverse engineering ethereum's opaque smart contracts.
In 27th USENIX Security Symposium, USENIX Security 2018, Baltimore,
MD, USA, August 15-17, 2018., pages 1371–1385, 2018.
2017
- Ittai Abraham, Christopher W.
Fletcher, Kartik Nayak, Benny Pinkas, and
Ling Ren.
Asymptotically tight
bounds for composing ORAM with PIR.
In Public-Key Cryptography - PKC 2017 - 20th IACR International
Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The
Netherlands, March 28-31, 2017, Proceedings, Part I, pages 91–120,
2017.
(doi:10.1007/978-3-662-54365-8_5)
- Manos Antonakakis, Tim April,
Michael Bailey, Matt Bernhard,
Elie Bursztein, Jaime Cochran,
Zakir Durumeric, J. Alex Halderman,
Luca Invernizzi, Michalis Kallitsis,
Deepak Kumar, Chaz Lever, Zane
Ma, Joshua Mason, Damian Menscher,
Chad Seaman, Nick Sullivan, Kurt
Thomas, and Yi Zhou.
Understanding
the mirai botnet.
In 26th USENIX Security Symposium, USENIX Security 2017, Vancouver,
BC, Canada, August 16-18, 2017., pages 1093–1110, 2017.
- Peter Bailis, Arvind
Narayanan, Andrew Miller, and Song Han.
Research for practice:
cryptocurrencies, blockchains, and smart contracts; hardware for deep
learning.
Commun. ACM, 60(5):48–51, 2017.
(doi:10.1145/3024928)
- Adam M. Bates, Wajih Ul
Hassan, Kevin R. B. Butler, Alin Dobra,
Bradley Reaves, Patrick T. Cable II,
Thomas Moyer, and Nabil Schear.
Transparent web service
auditing via network provenance functions.
In Proceedings of the 26th International Conference on World Wide Web,
WWW 2017, Perth, Australia, April 3-7, 2017, pages 887–895, 2017.
(doi:10.1145/3038912.3052640)
- Adam M. Bates, Dave (Jing)
Tian, Grant Hernandez, Thomas Moyer,
Kevin R. B. Butler, and Trent Jaeger.
Taming the costs of trustworthy
provenance through policy reduction.
ACM Trans. Internet Techn., 17(4):34:1–34:21, 2017.
(doi:10.1145/3062180)
- Iddo Bentov, Ranjit
Kumaresan, and Andrew Miller.
Instantaneous
decentralized poker.
In Advances in Cryptology - ASIACRYPT 2017 - 23rd International
Conference on the Theory and Applications of Cryptology and Information
Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part
II, pages 410–440, 2017.
(doi:10.1007/978-3-319-70697-9_15)
- Iddo Bentov, Ranjit
Kumaresan, and Andrew Miller.
Instantaneous decentralized
poker.
CoRR, abs/1701.06726, 2017.
- Iddo Bentov, Ranjit
Kumaresan, and Andrew Miller.
Instantaneous decentralized
poker.
IACR Cryptology ePrint Archive, 2017:875, 2017.
- Vincent Bindschaedler, Reza
Shokri, and Carl A. Gunter.
Plausible deniability for privacy-preserving data synthesis.
PVLDB, 10(5):481–492, 2017.
- Vincent Bindschaedler, Reza
Shokri, and Carl A. Gunter.
Plausible deniability for privacy-preserving data synthesis.
CoRR, abs/1708.07975, 2017.
- Moritz Contag, Vector Guo Li,
Andre Pawlowski, Felix Domke,
Kirill Levchenko, Thorsten Holz, and
Stefan Savage.
How they did it: An analysis of
emission defeat devices in modern automobiles.
In 2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose,
CA, USA, May 22-26, 2017, pages 231–250, 2017.
(doi:10.1109/SP.2017.66)
- Soteris Demetriou, Nan
Zhang, Yeonjoon Lee, XiaoFeng Wang,
Carl A. Gunter, Xiao-yong Zhou, and
Michael Grace.
Guardian of the HAN: thwarting mobile attacks on smart-home devices using
os-level situation awareness.
CoRR, abs/1703.01537, 2017.
- Soteris Demetriou, Nan
Zhang, Yeonjoon Lee, XiaoFeng Wang,
Carl A. Gunter, Xiao-yong Zhou, and
Michael Grace.
Hanguard: Sdn-driven protection of smart home wifi devices from malicious
mobile apps.
In WISEC, pages 122–133. ACM, 2017.
- Greg Durrett, Jonathan K.
Kummerfeld, Taylor Berg-Kirkpatrick,
Rebecca S. Portnoff, Sadia Afroz,
Damon McCoy, Kirill Levchenko, and
Vern Paxson.
Identifying
products in online cybercrime marketplaces: A dataset for fine-grained
domain adaptation.
In Proceedings of the 2017 Conference on Empirical Methods in Natural
Language Processing, EMNLP 2017, Copenhagen, Denmark, September 9-11,
2017, pages 2598–2607, 2017.
- Greg Durrett, Jonathan K.
Kummerfeld, Taylor Berg-Kirkpatrick,
Rebecca S. Portnoff, Sadia Afroz,
Damon McCoy, Kirill Levchenko, and
Vern Paxson.
Identifying products in online
cybercrime marketplaces: A dataset for fine-grained domain adaptation.
CoRR, abs/1708.09609, 2017.
- Zakir Durumeric, Zane Ma,
Drew Springall, Richard Barnes,
Nick Sullivan, Elie Bursztein,
Michael Bailey, J. Alex Halderman, and
Vern Paxson.
The
security impact of HTTPS interception.
In 24th Annual Network and Distributed System Security Symposium, NDSS
2017, San Diego, California, USA, February 26 - March 1, 2017,
2017.
- Brown Farinholt, Mohammad
Rezaeirad, Paul Pearce, Hitesh Dharmdasani,
Haikuo Yin, Stevens Le Blond,
Damon McCoy, and Kirill Levchenko.
To catch a ratter: Monitoring the
behavior of amateur darkcomet RAT operators in the wild.
In 2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose,
CA, USA, May 22-26, 2017, pages 770–787, 2017.
(doi:10.1109/SP.2017.48)
- Sergey Frolov, Frederick
Douglas, Will Scott, Allison McDonald,
Benjamin VanderSloot, Rod Hynes,
Adam Kruger, Michalis Kallitsis,
David G. Robinson, Steve Schultze,
Nikita Borisov, J. Alex Halderman, and
Eric Wustrow.
An
isp-scale deployment of tapdance.
In 7th USENIX Workshop on Free and Open Communications on the Internet,
FOCI 2017, Vancouver, BC, Canada, August 14, 2017., 2017.
- Alexander Gamero-Garrido,
Stefan Savage, Kirill Levchenko, and
Alex C. Snoeren.
Quantifying the pressure of
legal risks on third-party vulnerability research.
In Proceedings of the 2017 ACM SIGSAC Conference on Computer and
Communications Security, CCS 2017, Dallas, TX, USA, October 30 - November
03, 2017, pages 1501–1513, 2017.
(doi:10.1145/3133956.3134047)
- Amir Houmansadr, Wenxuan
Zhou, Matthew Caesar, and Nikita Borisov.
SWEET: serving the web by
exploiting email tunnels.
IEEE/ACM Trans. Netw., 25(3):1517–1527, 2017.
(doi:10.1109/TNET.2016.2640238)
- Danny Yuxing Huang, Doug
Grundman, Kurt Thomas, Abhishek Kumar,
Elie Bursztein, Kirill Levchenko, and
Alex C. Snoeren.
Pinning down abuse on google
maps.
In Proceedings of the 26th International Conference on World Wide Web,
WWW 2017, Perth, Australia, April 3-7, 2017, pages 1471–1479, 2017.
(doi:10.1145/3038912.3052590)
- Hyemin Jeon, Jeff Linderoth,
and Andrew Miller.
Quadratic cone cutting
surfaces for quadratic programs with on-off constraints.
Discrete Optimization, 24:32–50, 2017.
(doi:10.1016/j.disopt.2016.04.008)
- Yamini Karanam, Andrew
Miller, and Erin Brady.
Needs and challenges of
post-acute brain injury patients in understanding personal recovery.
In Proceedings of the 19th International ACM SIGACCESS Conference on
Computers and Accessibility, ASSETS 2017, Baltimore, MD, USA, October 29 -
November 01, 2017, pages 381–382, 2017.
(doi:10.1145/3132525.3134794)
- Aggelos Kiayias, Andrew
Miller, and Dionysis Zindros.
Non-interactive proofs of
proof-of-work.
IACR Cryptology ePrint Archive, 2017:963, 2017.
- Abhiram Kothapalli, Andrew
Miller, and Nikita Borisov.
Smartcast: An incentive
compatible consensus protocol using smart contracts.
In Financial Cryptography and Data Security - FC 2017 International
Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017,
Revised Selected Papers, pages 536–552, 2017.
(doi:10.1007/978-3-319-70278-0_34)
- Deepak Kumar, Zane Ma,
Zakir Durumeric, Ariana Mirian,
Joshua Mason, J. Alex Halderman, and
Michael Bailey.
Security challenges in an
increasingly tangled web.
In Proceedings of the 26th International Conference on World Wide Web,
WWW 2017, Perth, Australia, April 3-7, 2017, pages 677–684, 2017.
(doi:10.1145/3038912.3052686)
- Kirill Levchenko, Amogh
Dhamdhere, Bradley Huffaker, kc claffy,
Mark Allman, and Vern Paxson.
Packetlab: a universal
measurement endpoint interface.
In Proceedings of the 2017 Internet Measurement Conference, IMC 2017,
London, United Kingdom, November 1-3, 2017, pages 254–260, 2017.
(doi:10.1145/3131365.3131396)
- Zhuotao Liu, Hao Jin,
Yih-Chun Hu, and Michael Bailey.
Middlepolice: Fine-grained
endpoint-driven in-network traffic control for proactive ddos attack
mitigation.
CoRR, abs/1709.05710, 2017.
- Yunhui Long, Vincent
Bindschaedler, and Carl A. Gunter.
Towards measuring membership privacy.
CoRR, abs/1712.09136, 2017.
- Patrick McCorry, Ethan
Heilman, and Andrew Miller.
Atomically trading with
roger: Gambling on the success of a hardfork.
In Data Privacy Management, Cryptocurrencies and Blockchain Technology -
ESORICS 2017 International Workshops, DPM 2017 and CBT 2017, Oslo,
Norway, September 14-15, 2017, Proceedings, pages 334–353, 2017.
(doi:10.1007/978-3-319-67816-0_19)
- Patrick McCorry, Ethan
Heilman, and Andrew Miller.
Atomically trading with roger:
Gambling on the success of a hardfork.
IACR Cryptology ePrint Archive, 2017:694, 2017.
- Andrew Miller and Iddo
Bentov.
Zero-collateral lotteries in
bitcoin and ethereum.
In 2017 IEEE European Symposium on Security and Privacy Workshops,
EuroS&P Workshops 2017, Paris, France, April 26-28, 2017, pages
4–13, 2017.
(doi:10.1109/EuroSPW.2017.44)
- Andrew Miller, Iddo Bentov,
Ranjit Kumaresan, and Patrick McCorry.
Sprites: Payment channels that go
faster than lightning.
CoRR, abs/1702.05812, 2017.
- Andrew Miller, Malte
Möser, Kevin Lee, and Arvind Narayanan.
An empirical analysis of linkability
in the monero blockchain.
CoRR, abs/1704.04299, 2017.
- Kartik Nayak, Christopher W.
Fletcher, Ling Ren, Nishanth Chandran,
Satya V. Lokam, Elaine Shi, and
Vipul Goyal.
HOP:
hardware makes obfuscation practical.
In 24th Annual Network and Distributed System Security Symposium, NDSS
2017, San Diego, California, USA, February 26 - March 1, 2017,
2017.
- Miguel C. Neves, Kirill
Levchenko, and Marinho P. Barcellos.
Sandboxing data plane
programs for fun and profit.
In Posters and Demos Proceedings of the Conference of the ACM Special
Interest Group on Data Communication, SIGCOMM 2017, Los Angeles, CA, USA,
August 21-25, 2017, pages 103–104, 2017.
(doi:10.1145/3123878.3132001)
- Dimitris P. Papamichail,
Angela Huang, E. Kennedy, J.-L.
Ott, Andrew Miller, and Georgios Papamichail.
Live phylogeny
with polytomies: Finding the most compact parsimonious trees.
Computational Biology and Chemistry, 69:171–177, 2017.
(doi:10.1016/j.compbiolchem.2017.03.013)
- Rebecca S. Portnoff, Sadia
Afroz, Greg Durrett, Jonathan K. Kummerfeld,
Taylor Berg-Kirkpatrick, Damon McCoy,
Kirill Levchenko, and Vern Paxson.
Tools for automated analysis
of cybercriminal markets.
In Proceedings of the 26th International Conference on World Wide Web,
WWW 2017, Perth, Australia, April 3-7, 2017, pages 657–666, 2017.
(doi:10.1145/3038912.3052600)
- Bradley Reaves, Jasmine
Bowers, Nolen Scaife, Adam M. Bates,
Arnav Bhartiya, Patrick Traynor, and
Kevin R. B. Butler.
Mo(bile) money, mo(bile) problems:
Analysis of branchless banking applications.
ACM Trans. Priv. Secur., 20(3):11:1–11:31, 2017.
(doi:10.1145/3092368)
- Sajin Sasy, Sergey Gorbunov,
and Christopher W. Fletcher.
Zerotrace : Oblivious memory
primitives from intel SGX.
IACR Cryptology ePrint Archive, 2017:549, 2017.
- Rashid Tahir, Muhammad
Huzaifa, Anupam Das, Mohammad Ahmad,
Carl A. Gunter, Fareed Zaffar,
Matthew Caesar, and Nikita Borisov.
Mining on someone
else's dime: Mitigating covert mining operations in clouds and
enterprises.
In Research in Attacks, Intrusions, and Defenses - 20th International
Symposium, RAID 2017, Atlanta, GA, USA, September 18-20, 2017,
Proceedings, pages 287–310, 2017.
(doi:10.1007/978-3-319-66332-6_13)
- Matthew Tischer, Zakir
Durumeric, Elie Bursztein, and Michael Bailey.
The danger of USB drives.
IEEE Security & Privacy, 15(2):62–69, 2017.
(doi:10.1109/MSP.2017.41)
- Wenhao Wang, Guoxing Chen,
Xiaorui Pan, Yinqian Zhang,
XiaoFeng Wang, Vincent Bindschaedler,
Haixu Tang, and Carl A. Gunter.
Leaky cauldron on the dark land: Understanding memory side-channel hazards in
SGX.
In ACM Conference on Computer and Communications Security, pages
2421–2434. ACM, 2017.
- Wenhao Wang, Guoxing Chen,
Xiaorui Pan, Yinqian Zhang,
XiaoFeng Wang, Vincent Bindschaedler,
Haixu Tang, and Carl A. Gunter.
Leaky cauldron on the dark land: Understanding memory side-channel hazards in
SGX.
CoRR, abs/1705.07289, 2017.
- Zhaomo Yang and Kirill
Levchenko.
Securing web
applications with predicate access control.
In Data and Applications Security and Privacy XXXI - 31st Annual IFIP
WG 11.3 Conference, DBSec 2017, Philadelphia, PA, USA, July 19-21, 2017,
Proceedings, pages 541–554, 2017.
(doi:10.1007/978-3-319-61176-1_30)
- Wei Yang, Deguang Kong,
Tao Xie, and Carl A. Gunter.
Malware detection in adversarial settings: Exploiting feature evolutions and
confusions in android apps.
In ACSAC, pages 288–302. ACM, 2017.
- Zhaomo Yang, Brian
Johannesmeyer, Anders Trier Olesen, Sorin
Lerner, and Kirill Levchenko.
Dead
store elimination (still) considered harmful.
In 26th USENIX Security Symposium, USENIX Security 2017, Vancouver,
BC, Canada, August 16-18, 2017., pages 1025–1040, 2017.
- Nan Zhang, Soteris Demetriou,
Xianghang Mi, Wenrui Diao, Kan
Yuan, Peiyuan Zong, Feng Qian,
XiaoFeng Wang, Kai Chen, Yuan
Tian, Carl A. Gunter, Kehuan Zhang,
Patrick Tague, and Yue-Hsun Lin.
Understanding iot security through the data crystal ball: Where we are now and
where we are going to be.
CoRR, abs/1703.09809, 2017.
2016
- Peter Bailis, Arvind
Narayanan, Andrew Miller, and Song Han.
Research for practice:
Cryptocurrencies, blockchains, and smart contracts; hardware for deep
learning.
ACM Queue, 14(6):43–55, 2016.
(doi:10.1145/3028687.3043967)
- Adam M. Bates, Devin J.
Pohly, and Kevin R. B. Butler.
Secure and trustworthy
provenance collection for digital forensics.
In Digital Fingerprinting, pages 141–176. 2016.
(doi:10.1007/978-1-4939-6601-1_8)
- Dominic Coey and Michael
Bailey.
People and cookies: Imperfect
treatment assignment in online experiments.
In Proceedings of the 25th International Conference on World Wide Web,
WWW 2016, Montreal, Canada, April 11 - 15, 2016, pages 1103–1111,
2016.
(doi:10.1145/2872427.2882984)
- Kyle Croman, Christian
Decker, Ittay Eyal, Adem Efe Gencer,
Ari Juels, Ahmed E. Kosba, Andrew
Miller, Prateek Saxena, Elaine Shi,
Emin Gün Sirer, Dawn Song, and
Roger Wattenhofer.
On scaling decentralized
blockchains - (A position paper).
In Financial Cryptography and Data Security - FC 2016 International
Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26,
2016, Revised Selected Papers, pages 106–125, 2016.
(doi:10.1007/978-3-662-53357-4_8)
- Jakub Czyz, Matthew J.
Luckie, Mark Allman, and Michael Bailey.
Don't
forget to lock the back door! A characterization of ipv6 network security
policy.
In 23rd Annual Network and Distributed System Security Symposium, NDSS
2016, San Diego, California, USA, February 21-24, 2016, 2016.
- Anupam Das, Nikita Borisov,
and Matthew Caesar.
Tracking
mobile web users through motion sensors: Attacks and defenses.
In 23rd Annual Network and Distributed System Security Symposium, NDSS
2016, San Diego, California, USA, February 21-24, 2016, 2016.
- Anupam Das, Nikita Borisov,
Edward Chou, and Muhammad Haris Mughees.
Smartphone fingerprinting via motion
sensors: Analyzing feasiblity at large-scale and studing real usage
patterns.
CoRR, abs/1605.08763, 2016.
- Kevin Delmolino, Mitchell
Arnett, Ahmed E. Kosba, Andrew Miller, and
Elaine Shi.
Step by step towards
creating a safe smart contract: Lessons and insights from a cryptocurrency
lab.
In Financial Cryptography and Data Security - FC 2016 International
Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26,
2016, Revised Selected Papers, pages 79–94, 2016.
(doi:10.1007/978-3-662-53357-4_6)
- Soteris Demetriou, Whitney
Merrill, Wei Yang, Aston Zhang, and
Carl A. Gunter.
Free for all! assessing user data exposure to advertising libraries on android.
In NDSS. The Internet Society, 2016.
- Srinivas Devadas, Marten van
Dijk, Christopher W. Fletcher, Ling Ren,
Elaine Shi, and Daniel Wichs.
Onion ORAM: A
constant bandwidth blowup oblivious RAM.
In Theory of Cryptography - 13th International Conference, TCC 2016-A,
Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part II, pages
145–174, 2016.
(doi:10.1007/978-3-662-49099-0_6)
- Avesta Hojjati, Anku
Adhikari, Katarina Struckmann, Edward Chou,
Thi Ngoc Tho Nguyen, Kushagra Madan,
Marianne S. Winslett, Carl A. Gunter, and
William P. King.
Leave your phone at the door: Side channels that reveal factory floor secrets.
In ACM Conference on Computer and Communications Security, pages
883–894. ACM, 2016.
- Haiming Jin, Lu Su,
Bolin Ding, Klara Nahrstedt, and
Nikita Borisov.
Enabling privacy-preserving
incentives for mobile crowd sensing systems.
In 36th IEEE International Conference on Distributed Computing Systems,
ICDCS 2016, Nara, Japan, June 27-30, 2016, pages 344–353, 2016.
(doi:10.1109/ICDCS.2016.50)
- Ahmed E. Kosba, Andrew
Miller, Elaine Shi, Zikai Wen, and
Charalampos Papamanthou.
Hawk: The blockchain model of
cryptography and privacy-preserving smart contracts.
In IEEE Symposium on Security and Privacy, SP 2016, San Jose, CA,
USA, May 22-26, 2016, pages 839–858, 2016.
(doi:10.1109/SP.2016.55)
- David Kotz, Carl A. Gunter,
Santosh Kumar, and Jonathan P. Weiner.
Privacy and security in mobile health: A research agenda.
IEEE Computer, 49(6):22–30, 2016.
- Frank Li, Zakir Durumeric,
Jakub Czyz, Mohammad Karami,
Michael Bailey, Damon McCoy,
Stefan Savage, and Vern Paxson.
You've
got vulnerability: Exploring effective vulnerability notifications.
In 25th USENIX Security Symposium, USENIX Security 16, Austin, TX,
USA, August 10-12, 2016., pages 1033–1050, 2016.
- Junshan Michael Li, Michael
Friend, Andrew Miller, and Shannon Stone.
A SDD and PCM solution
for vaccine storage and outreach.
In IEEE Global Humanitarian Technology Conference, GHTC 2016,
Seattle, WA, USA, October 13-16, 2016, pages 555–562, 2016.
(doi:10.1109/GHTC.2016.7857335)
- Zhuotao Liu, Hao Jin,
Yih-Chun Hu, and Michael Bailey.
Middlepolice: Toward
enforcing destination-defined policies in the middle of the internet.
In Proceedings of the 2016 ACM SIGSAC Conference on Computer and
Communications Security, Vienna, Austria, October 24-28, 2016, pages
1268–1279, 2016.
(doi:10.1145/2976749.2978306)
- Sarah Meiklejohn, Marjori
Pomarole, Grant Jordan, Kirill Levchenko,
Damon McCoy, Geoffrey M. Voelker, and
Stefan Savage.
A fistful of bitcoins: characterizing
payments among men with no names.
Commun. ACM, 59(4):86–93, 2016.
(doi:10.1145/2896384)
- Andrew Miller and Iddo
Bentov.
Zero-collateral lotteries in bitcoin
and ethereum.
CoRR, abs/1612.05390, 2016.
- Andrew Miller, Yu Xia,
Kyle Croman, Elaine Shi, and Dawn
Song.
The honey badger of BFT
protocols.
In Proceedings of the 2016 ACM SIGSAC Conference on Computer and
Communications Security, Vienna, Austria, October 24-28, 2016, pages
31–42, 2016.
(doi:10.1145/2976749.2978399)
- Andrew Miller, Yu Xia,
Kyle Croman, Elaine Shi, and Dawn
Song.
The honey badger of BFT
protocols.
IACR Cryptology ePrint Archive, 2016:199, 2016.
- Ariana Mirian, Zane Ma,
David Adrian, Matthew Tischer,
Thasphon Chuenchujit, Tim Yardley,
Robin Berthier, Joshua Mason,
Zakir Durumeric, J. Alex Halderman, and
Michael Bailey.
An internet-wide view of
ICS devices.
In 14th Annual Conference on Privacy, Security and Trust, PST 2016,
Auckland, New Zealand, December 12-14, 2016, pages 96–103, 2016.
(doi:10.1109/PST.2016.7906943)
- Thomas Moyer, Karishma
Chadha, Robert K. Cunningham, Nabil Schear,
Warren Smith, Adam M. Bates,
Kevin R. B. Butler, Frank Capobianco,
Trent Jaeger, and Patrick T. Cable II.
Leveraging data provenance to
enhance cyber resilience.
In IEEE Cybersecurity Development, SecDev 2016, Boston, MA, USA,
November 3-4, 2016, pages 107–114, 2016.
(doi:10.1109/SecDev.2016.034)
- Kartik Nayak, Srijan Kumar,
Andrew Miller, and Elaine Shi.
Stubborn mining: Generalizing
selfish mining and combining with an eclipse attack.
In IEEE European Symposium on Security and Privacy, EuroS&P 2016,
Saarbrücken, Germany, March 21-24, 2016, pages 305–320, 2016.
(doi:10.1109/EuroSP.2016.32)
- Dimitris P. Papamichail,
Angela Huang, Andrew Miller,
Nathan Gould, and Georgios Papamichail.
Most compact parsimonious trees.
CoRR, abs/1603.03315, 2016.
- Kurt Thomas, Rony Amira,
Adi Ben-Yoash, Ori Folger, Amir
Hardon, Ari Berger, Elie Bursztein, and
Michael Bailey.
The abuse sharing
economy: Understanding the limits of threat exchanges.
In Research in Attacks, Intrusions, and Defenses - 19th International
Symposium, RAID 2016, Paris, France, September 19-21, 2016,
Proceedings, pages 143–164, 2016.
(doi:10.1007/978-3-319-45719-2_7)
- Dave (Jing) Tian, Adam M.
Bates, Kevin R. B. Butler, and Raju
Rangaswami.
Provusb: Block-level
provenance-based data protection for USB storage devices.
In Proceedings of the 2016 ACM SIGSAC Conference on Computer and
Communications Security, Vienna, Austria, October 24-28, 2016, pages
242–253, 2016.
(doi:10.1145/2976749.2978398)
- Dave (Jing) Tian, Nolen
Scaife, Adam M. Bates, Kevin R. B. Butler, and
Patrick Traynor.
Making
USB great again with USBFILTER.
In 25th USENIX Security Symposium, USENIX Security 16, Austin, TX,
USA, August 10-12, 2016., pages 415–430, 2016.
- Matthew Tischer, Zakir
Durumeric, Sam Foster, Sunny Duan,
Alec Mori, Elie Bursztein, and
Michael Bailey.
Users really do plug in USB
drives they find.
In IEEE Symposium on Security and Privacy, SP 2016, San Jose, CA,
USA, May 22-26, 2016, pages 306–319, 2016.
(doi:10.1109/SP.2016.26)
- Güliz Seray Tuncay,
Soteris Demetriou, and Carl A. Gunter.
Draco: A system for uniform and fine-grained access control for web code on
android.
In ACM Conference on Computer and Communications Security, pages
104–115. ACM, 2016.
- Benjamin VanderSloot, Johanna
Amann, Matthew Bernhard, Zakir Durumeric,
Michael Bailey, and J. Alex Halderman.
Towards a complete view of
the certificate ecosystem.
In Proceedings of the 2016 ACM on Internet Measurement Conference,
IMC 2016, Santa Monica, CA, USA, November 14-16, 2016, pages
543–549, 2016.
- Aston Zhang, Amit Goyal,
Ricardo A. Baeza-Yates, Yi Chang,
Jiawei Han, Carl A. Gunter, and
Hongbo Deng.
Towards mobile query auto-completion: An efficient mobile application-aware
approach.
In WWW, pages 579–590. ACM, 2016.
2015 and Before
- Adam M. Bates, Kevin R. B.
Butler, and Thomas Moyer.
Take
only what you need: Leveraging mandatory access control policy to reduce
provenance storage costs.
In 7th USENIX Workshop on the Theory and Practice of Provenance, TaPP
2015, Edinburgh, Scotland, UK, July 8-9, 2015., 2015.
- Adam M. Bates, Kevin R. B.
Butler, Micah Sherr, Clay Shields,
Patrick Traynor, and Dan S. Wallach.
Accountable wiretapping - or - I
know they can hear you now.
Journal of Computer Security, 23(2):167–195, 2015.
(doi:10.3233/JCS-140515)
- Adam M. Bates, Dave Tian,
Kevin R. B. Butler, and Thomas Moyer.
Trustworthy
whole-system provenance for the linux kernel.
In 24th USENIX Security Symposium, USENIX Security 15, Washington,
D.C., USA, August 12-14, 2015., pages 319–334, 2015.
- Joseph Bonneau, Andrew
Miller, Jeremy Clark, Arvind Narayanan,
Joshua A. Kroll, and Edward W. Felten.
Research perspectives and challenges
for bitcoin and cryptocurrencies.
IACR Cryptology ePrint Archive, 2015:261, 2015.
- Joseph Bonneau, Andrew
Miller, Jeremy Clark, Arvind Narayanan,
Joshua A. Kroll, and Edward W. Felten.
Sok: Research perspectives and
challenges for bitcoin and cryptocurrencies.
In 2015 IEEE Symposium on Security and Privacy, SP 2015, San Jose,
CA, USA, May 17-21, 2015, pages 104–121, 2015.
(doi:10.1109/SP.2015.14)
- Nikita Borisov, George
Danezis, and Ian Goldberg.
DP5:
A private presence service.
PoPETs, 2015(2):4–24, 2015.
- You Chen, Joydeep Ghosh,
Cosmin Adrian Bejan, Carl A. Gunter,
Siddharth Gupta, Abel N. Kho,
David M. Liebovitz, Jimeng Sun,
Joshua C. Denny, and Bradley Malin.
Building bridges across electronic health record systems through inferred
phenotypic topics.
Journal of Biomedical Informatics, 55:82–93, 2015.
- You Chen, Wei Xie,
Carl A. Gunter, David M. Liebovitz,
Sanjay Mehrotra, He Zhang, and
Bradley Malin.
Inferring clinical workflow efficiency via electronic medical record
utilization.
In AMIA. AMIA, 2015.
- Anupam Das, Nikita Borisov,
and Matthew Caesar.
Exploring ways to mitigate
sensor-based smartphone fingerprinting.
CoRR, abs/1503.01874, 2015.
- Kevin Delmolino, Mitchell
Arnett, Ahmed E. Kosba, Andrew Miller, and
Elaine Shi.
Step by step towards creating a safe
smart contract: Lessons and insights from a cryptocurrency lab.
IACR Cryptology ePrint Archive, 2015:460, 2015.
- Soteris Demetriou, Xiao-yong
Zhou, Muhammad Naveed, Yeonjoon Lee,
Kan Yuan, XiaoFeng Wang, and
Carl A. Gunter.
What's in your dongle and bank account? mandatory and discretionary protection
of android external resources.
In NDSS. The Internet Society, 2015.
- Srinivas Devadas, Marten van
Dijk, Christopher W. Fletcher, and Ling Ren.
Onion ORAM: A constant bandwidth
and constant client storage ORAM (without FHE or SWHE).
IACR Cryptology ePrint Archive, 2015:5, 2015.
- Zakir Durumeric, David
Adrian, Ariana Mirian, Michael Bailey, and
J. Alex Halderman.
A search engine backed by
internet-wide scanning.
In Proceedings of the 22nd ACM SIGSAC Conference on Computer and
Communications Security, Denver, CO, USA, October 12-16, 2015, pages
542–553, 2015.
(doi:10.1145/2810103.2813703)
- Zakir Durumeric, David
Adrian, Ariana Mirian, James Kasten,
Elie Bursztein, Nicolas Lidzborski,
Kurt Thomas, Vijay Eranti,
Michael Bailey, and J. Alex Halderman.
Neither snow nor rain nor
MITM...: an empirical analysis of email delivery security.
In Proceedings of the 2015 ACM Internet Measurement Conference, IMC
2015, Tokyo, Japan, October 28-30, 2015, pages 27–39, 2015.
(doi:10.1145/2815675.2815695)
- Seyed Kaveh Fayaz, Yoshiaki
Tobioka, Vyas Sekar, and Michael Bailey.
Bohatei:
Flexible and elastic ddos defense.
In 24th USENIX Security Symposium, USENIX Security 15, Washington,
D.C., USA, August 12-14, 2015., pages 817–832, 2015.
- Seyed Kaveh Fayaz, Yoshiaki
Tobioka, Vyas Sekar, and Michael Bailey.
Bohatei: Flexible and elastic ddos
defense.
CoRR, abs/1506.08501, 2015.
- Christopher W. Fletcher,
Muhammad Naveed, Ling Ren, Elaine
Shi, and Emil Stefanov.
Bucket ORAM: single online
roundtrip, constant bandwidth oblivious RAM.
IACR Cryptology ePrint Archive, 2015:1065, 2015.
- Christopher W. Fletcher, Ling
Ren, Albert Kwon, Marten van Dijk, and
Srinivas Devadas.
Freecursive ORAM: [nearly]
free recursion and integrity verification for position-based oblivious
RAM.
In Proceedings of the Twentieth International Conference on Architectural
Support for Programming Languages and Operating Systems, ASPLOS '15,
Istanbul, Turkey, March 14-18, 2015, pages 103–116, 2015.
(doi:10.1145/2694344.2694353)
- Christopher W. Fletcher, Ling
Ren, Albert Kwon, Marten van Dijk,
Emil Stefanov, Dimitrios N. Serpanos, and
Srinivas Devadas.
A low-latency, low-area hardware
oblivious RAM controller.
In 23rd IEEE Annual International Symposium on Field-Programmable
Custom Computing Machines, FCCM 2015, Vancouver, BC, Canada, May 2-6,
2015, pages 215–222, 2015.
(doi:10.1109/FCCM.2015.58)
- Ian D. Foster, Jon Larson,
Max Masich, Alex C. Snoeren,
Stefan Savage, and Kirill Levchenko.
Security by any other name:
On the effectiveness of provider based email security.
In Proceedings of the 22nd ACM SIGSAC Conference on Computer and
Communications Security, Denver, CO, USA, October 12-16, 2015, pages
450–464, 2015.
(doi:10.1145/2810103.2813607)
- Charles P. Friedman, Joshua
Rubin, Jeffrey S. Brown, Melinda Buntin,
Milton Corn, Lynn Etheredge,
Carl A. Gunter, Mark A. Musen,
Richard Platt, William W. Stead,
Kevin Sullivan, and Douglas Van Houweling.
Toward a science of learning systems: a research agenda for the
high-functioning learning health system.
JAMIA, 22(1):43–50, 2015.
- Qiao Jin, Jiayi Duan,
Shobha Vasudevan, and Michael Bailey.
Packer classifier based on
PE header information.
In Proceedings of the 2015 Symposium and Bootcamp on the Science of
Security, HotSoS 2015, Urbana, IL, USA, April 21-22, 2015, pages
19:1–19:2, 2015.
(doi:10.1145/2746194.2746213)
- Joshua Juen, Aaron Johnson,
Anupam Das, Nikita Borisov, and
Matthew Caesar.
Defending
tor from network adversaries: A case study of network path prediction.
PoPETs, 2015(2):171–187, 2015.
- Ahmed E. Kosba, Andrew
Miller, Elaine Shi, Zikai Wen, and
Charalampos Papamanthou.
Hawk: The blockchain model of
cryptography and privacy-preserving smart contracts.
IACR Cryptology ePrint Archive, 2015:675, 2015.
- Ahmed E. Kosba, Zhichao
Zhao, Andrew Miller, Yi Qian,
T.-H. Hubert Chan, Charalampos Papamanthou,
Rafael Pass, Abhi Shelat, and
Elaine Shi.
How to use snarks in universally
composable protocols.
IACR Cryptology ePrint Archive, 2015:1093, 2015.
- David Kotz, Kevin Fu,
Carl A. Gunter, and Aviel D. Rubin.
Security for mobile and cloud frontiers in healthcare.
Commun. ACM, 58(8):21–23, 2015.
- Michael LeMay and Carl A.
Gunter.
Network-on-chip firewall: Countering defective and malicious system-on-chip
hardware.
In Logic, Rewriting, and Concurrency, volume 9200 of Lecture
Notes in Computer Science, pages 404–426. Springer, 2015.
- Yang Liu, Armin Sarabi,
Jing Zhang, Parinaz Naghizadeh,
Manish Karir, Michael Bailey, and
Mingyan Liu.
Cloudy
with a chance of breach: Forecasting cyber security incidents.
In 24th USENIX Security Symposium, USENIX Security 15, Washington,
D.C., USA, August 12-14, 2015., pages 1009–1024, 2015.
- Yang Liu, Jing Zhang,
Armin Sarabi, Mingyan Liu, Manish
Karir, and Michael Bailey.
Predicting cyber security
incidents using feature-based characterization of network-level malicious
activities.
In Proceedings of the 2015 ACM International Workshop on International
Workshop on Security and Privacy Analytics, IWSPA@CODASPY 2015, San Antonio,
TX, USA, March 4, 2015, pages 3–9, 2015.
(doi:10.1145/2713579.2713582)
- Xun Lu, Aston Zhang,
Carl A. Gunter, Daniel Fabbri,
David M. Liebovitz, and Bradley Malin.
Discovering de facto diagnosis specialties.
In BCB, pages 7–16. ACM, 2015.
- Andrew Miller and Rob Jansen.
Shadow-bitcoin: Scalable simulation
via direct execution of multi-threaded applications.
IACR Cryptology ePrint Archive, 2015:469, 2015.
- Andrew Miller, Michael W.
Hicks, Jonathan Katz, and Elaine Shi.
How to
authenticate any data structure.
TinyToCS, 3, 2015.
- Andrew Miller, Ahmed E.
Kosba, Jonathan Katz, and Elaine Shi.
Nonoutsourceable scratch-off
puzzles to discourage bitcoin mining coalitions.
In Proceedings of the 22nd ACM SIGSAC Conference on Computer and
Communications Security, Denver, CO, USA, October 12-16, 2015, pages
680–691, 2015.
(doi:10.1145/2810103.2813621)
- Muhammad Naveed, Erman
Ayday, Ellen Wright Clayton, Jacques Fellay,
Carl A. Gunter, Jean-Pierre Hubaux,
Bradley A. Malin, and XiaoFeng Wang.
Privacy in the genomic era.
ACM Comput. Surv., 48(1):6:1–6:44, 2015.
- Muhammad Naveed, Erman
Ayday, Ellen Wright Clayton, Jacques Fellay,
Carl A. Gunter, Jean-Pierre Hubaux,
Bradley A. Malin, and XiaoFeng Wang.
Privacy in the genomic era.
IACR Cryptology ePrint Archive, 2015:563, 2015.
- Kartik Nayak, Srijan Kumar,
Andrew Miller, and Elaine Shi.
Stubborn mining: Generalizing selfish
mining and combining with an eclipse attack.
IACR Cryptology ePrint Archive, 2015:796, 2015.
- Bradley Reaves, Nolen
Scaife, Adam M. Bates, Patrick Traynor, and
Kevin R. B. Butler.
Mo(bile)
money, mo(bile) problems: Analysis of branchless banking applications in the
developing world.
In 24th USENIX Security Symposium, USENIX Security 15, Washington,
D.C., USA, August 12-14, 2015., pages 17–32, 2015.
- Bradley Reaves, Ethan
Shernan, Adam M. Bates, Henry Carter, and
Patrick Traynor.
Boxed
out: Blocking cellular interconnect bypass fraud at the network edge.
In 24th USENIX Security Symposium, USENIX Security 15, Washington,
D.C., USA, August 12-14, 2015., pages 833–848, 2015.
- Ling Ren, Christopher W.
Fletcher, Albert Kwon, Emil Stefanov,
Elaine Shi, Marten van Dijk, and
Srinivas Devadas.
Constants
count: Practical improvements to oblivious RAM.
In 24th USENIX Security Symposium, USENIX Security 15, Washington,
D.C., USA, August 12-14, 2015., pages 415–430, 2015.
- Matthew Sargent, Jakub Czyz,
Mark Allman, and Michael Bailey.
On the power and
limitations of detecting network filtering via passive observation.
In Passive and Active Measurement - 16th International Conference, PAM
2015, New York, NY, USA, March 19-20, 2015, Proceedings, pages
165–178, 2015.
(doi:10.1007/978-3-319-15509-8_13)
- Nagesh Shukla, Rohan
Wickramasuriya, Andrew Miller, and Pascal
Perez.
An approach to plan and
evaluate the location of radiotherapy services and its application in the new
south wales, australia.
Computer Methods and Programs in Biomedicine, 122(2):245–256,
2015.
(doi:10.1016/j.cmpb.2015.08.005)
- Jing (Dave) Tian, Adam M.
Bates, and Kevin R. B. Butler.
Defending against malicious
USB firmware with goodusb.
In Proceedings of the 31st Annual Computer Security Applications
Conference, Los Angeles, CA, USA, December 7-11, 2015, pages 261–270,
2015.
(doi:10.1145/2818000.2818040)
- Xiangyao Yu, Syed Kamran
Haider, Ling Ren, Christopher W. Fletcher,
Albert Kwon, Marten van Dijk, and
Srinivas Devadas.
Proram: dynamic prefetcher
for oblivious RAM.
In Proceedings of the 42nd Annual International Symposium on Computer
Architecture, Portland, OR, USA, June 13-17, 2015, pages 616–628,
2015.
(doi:10.1145/2749469.2750413)
- Aston Zhang, Amit Goyal,
Weize Kong, Hongbo Deng, Anlei
Dong, Yi Chang, Carl A. Gunter, and
Jiawei Han.
adaqac: Adaptive query auto-completion via implicit negative feedback.
In SIGIR, pages 143–152. ACM, 2015.
- Adam M. Bates, Ryan Leonard,
Hannah Pruse, Daniel Lowd, and
Kevin R. B. Butler.
Leveraging
USB to establish host identity using commodity devices.
In 21st Annual Network and Distributed System Security Symposium, NDSS
2014, San Diego, California, USA, February 23-26, 2014, 2014.
- Adam M. Bates, Benjamin
Mood, Joe Pletcher, Hannah Pruse,
Masoud Valafar, and Kevin R. B. Butler.
On detecting co-resident
cloud instances using network flow watermarking techniques.
Int. J. Inf. Sec., 13(2):171–189, 2014.
(doi:10.1007/s10207-013-0210-0)
- Adam M. Bates, Joe Pletcher,
Tyler Nichols, Braden Hollembaek, and
Kevin R. B. Butler.
Forced perspectives:
Evaluating an SSL trust enhancement at scale.
In Proceedings of the 2014 Internet Measurement Conference, IMC 2014,
Vancouver, BC, Canada, November 5-7, 2014, pages 503–510, 2014.
(doi:10.1145/2663716.2663759)
- Adam M. Bates, Joe Pletcher,
Tyler Nichols, Braden Hollembaek,
Dave Tian, Kevin R. B. Butler, and
Abdulrahman Alkhelaifi.
Securing SSL certificate
verification through dynamic linking.
In Proceedings of the 2014 ACM SIGSAC Conference on Computer and
Communications Security, Scottsdale, AZ, USA, November 3-7, 2014,
pages 394–405, 2014.
(doi:10.1145/2660267.2660338)
- Joseph Bonneau and Andrew
Miller.
Fawkescoin - A
cryptocurrency without public-key cryptography.
In Security Protocols XXII - 22nd International Workshop Cambridge, UK,
March 19-21, 2014 Revised Selected Papers, pages 350–358, 2014.
(doi:10.1007/978-3-319-12400-1_35)
- Joseph Bonneau, Arvind
Narayanan, Andrew Miller, Jeremy Clark,
Joshua A. Kroll, and Edward W. Felten.
Mixcoin: Anonymity for
bitcoin with accountable mixes.
In Financial Cryptography and Data Security - 18th International
Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised
Selected Papers, pages 486–504, 2014.
(doi:10.1007/978-3-662-45472-5_31)
- Joseph Bonneau, Arvind
Narayanan, Andrew Miller, Jeremy Clark,
Joshua A. Kroll, and Edward W. Felten.
Mixcoin: Anonymity for bitcoin with
accountable mixes.
IACR Cryptology ePrint Archive, 2014:77, 2014.
- Jakub Czyz, Mark Allman,
Jing Zhang, Scott Iekel-Johnson,
Eric Osterweil, and Michael Bailey.
Measuring ipv6 adoption.
In ACM SIGCOMM 2014 Conference, SIGCOMM'14, Chicago, IL, USA, August
17-22, 2014, pages 87–98, 2014.
(doi:10.1145/2619239.2626295)
- Jakub Czyz, Michael
Kallitsis, Manaf Gharaibeh, Christos
Papadopoulos, Michael Bailey, and Manish
Karir.
Taming the 800 pound gorilla:
The rise and decline of NTP ddos attacks.
In Proceedings of the 2014 Internet Measurement Conference, IMC 2014,
Vancouver, BC, Canada, November 5-7, 2014, pages 435–448, 2014.
(doi:10.1145/2663716.2663717)
- Anupam Das, Joseph Bonneau,
Matthew Caesar, Nikita Borisov, and
XiaoFeng Wang.
The
tangled web of password reuse.
In 21st Annual Network and Distributed System Security Symposium, NDSS
2014, San Diego, California, USA, February 23-26, 2014, 2014.
- Anupam Das, Nikita Borisov,
and Matthew Caesar.
Analyzing an adaptive
reputation metric for anonymity systems.
In Proceedings of the 2014 Symposium and Bootcamp on the Science of
Security, HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014, page 11,
2014.
(doi:10.1145/2600176.2600187)
- Anupam Das, Nikita Borisov,
and Matthew Caesar.
Do you hear what I hear?:
Fingerprinting smart devices through embedded acoustic components.
In Proceedings of the 2014 ACM SIGSAC Conference on Computer and
Communications Security, Scottsdale, AZ, USA, November 3-7, 2014,
pages 441–452, 2014.
(doi:10.1145/2660267.2660325)
- Anupam Das, Nikita Borisov,
and Matthew Caesar.
Fingerprinting smart devices through
embedded acoustic components.
CoRR, abs/1403.3366, 2014.
- Anupam Das, Nikita Borisov,
Prateek Mittal, and Matthew Caesar.
Re3: relay
reliability reputation for anonymity systems.
In 9th ACM Symposium on Information, Computer and Communications
Security, ASIA CCS '14, Kyoto, Japan - June 03 - 06, 2014, pages
63–74, 2014.
(doi:10.1145/2590296.2590338)
- Zakir Durumeric, Michael
Bailey, and J. Alex Halderman.
An
internet-wide view of internet-wide scanning.
In Proceedings of the 23rd USENIX Security Symposium, San Diego, CA,
USA, August 20-22, 2014., pages 65–78, 2014.
- Zakir Durumeric, James
Kasten, David Adrian, J. Alex Halderman,
Michael Bailey, Frank Li,
Nicholas Weaver, Johanna Amann,
Jethro Beekman, Mathias Payer, and
Vern Paxson.
The matter of heartbleed.
In Proceedings of the 2014 Internet Measurement Conference, IMC 2014,
Vancouver, BC, Canada, November 5-7, 2014, pages 475–488, 2014.
(doi:10.1145/2663716.2663755)
- Christopher W. Fletcher, Ling
Ren, Albert Kwon, Marten van Dijk,
Emil Stefanov, and Srinivas Devadas.
RAW path ORAM: A low-latency,
low-area hardware ORAM controller with integrity verification.
IACR Cryptology ePrint Archive, 2014:431, 2014.
- Christopher W. Fletcher, Ling
Ren, Xiangyao Yu, Marten van Dijk,
Omer Khan, and Srinivas Devadas.
Suppressing the oblivious
RAM timing channel while making information leakage and program efficiency
trade-offs.
In 20th IEEE International Symposium on High Performance Computer
Architecture, HPCA 2014, Orlando, FL, USA, February 15-19, 2014,
pages 213–224, 2014.
(doi:10.1109/HPCA.2014.6835932)
- Wojciech Fraczak, Loukas
Georgiadis, Andrew Miller, and Robert Endre
Tarjan.
Corrections to "finding
dominators via disjoint set union" [J. discrete algorithms 23 (2013)
2-20].
J. Discrete Algorithms, 26:106–110, 2014.
(doi:10.1016/j.jda.2014.01.002)
- Yingzhi Gou, Aditya K. Ghose,
Chee Fon Chang, Hoa Khanh Dam, and
Andrew Miller.
Semantic monitoring and
compensation in socio-technical processes.
In Advances in Conceptual Modeling - ER 2014 Workshops, ENMO, MoBiD,
MReBA, QMMQ, SeCoGIS, WISM, and ER Demos, Atlanta, GA, USA, October 27-29,
2014. Proceedings, pages 117–126, 2014.
(doi:10.1007/978-3-319-12256-4_12)
- Carl A. Gunter.
Detecting roles and anomalies in hospital access audit logs.
In SafeConfig, page 1. ACM, 2014.
- Tristan Halvorson, Kirill
Levchenko, Stefan Savage, and Geoffrey M.
Voelker.
Xxxtortion?: inferring
registration intent in the .xxx TLD.
In 23rd International World Wide Web Conference, WWW '14, Seoul,
Republic of Korea, April 7-11, 2014, pages 901–912, 2014.
(doi:10.1145/2566486.2567995)
- Dongjing He, Muhammad Naveed,
Carl A. Gunter, and Klara Nahrstedt.
Security concerns in android mhealth apps.
In AMIA. AMIA, 2014.
- Amir Houmansadr, Negar
Kiyavash, and Nikita Borisov.
Non-blind watermarking of
network flows.
IEEE/ACM Trans. Netw., 22(4):1232–1244, 2014.
(doi:10.1109/TNET.2013.2272740)
- Danny Yuxing Huang, Hitesh
Dharmdasani, Sarah Meiklejohn, Vacha Dave,
Chris Grier, Damon McCoy, Stefan
Savage, Nicholas Weaver, Alex C. Snoeren, and
Kirill Levchenko.
Botcoin:
Monetizing stolen cycles.
In 21st Annual Network and Distributed System Security Symposium, NDSS
2014, San Diego, California, USA, February 23-26, 2014, 2014.
- Prateek Jindal, Carl A.
Gunter, and Dan Roth.
Detecting privacy-sensitive events in medical text.
In BCB, pages 617–620. ACM, 2014.
- Prateek Jindal, Dan Roth,
and Carl A. Gunter.
Joint inference for end-to-end coreference resolution for clinical notes.
In BCB, pages 192–201. ACM, 2014.
- Joshua Juen, Anupam Das,
Aaron Johnson, Nikita Borisov, and
Matthew Caesar.
Defending tor from network
adversaries: A case study of network path prediction.
CoRR, abs/1410.1823, 2014.
- Jonathan Katz, Andrew Miller,
and Elaine Shi.
Pseudonymous secure computation from
time-lock puzzles.
IACR Cryptology ePrint Archive, 2014:857, 2014.
- Erin Kenneally and Michael
Bailey.
Cyber-security research
ethics dialogue & strategy workshop.
Computer Communication Review, 44(2):76–79, 2014.
(doi:10.1145/2602204.2602217)
- Bui Minh Khuong, Kiyoshi
Kiyokawa, Andrew Miller, Joseph J. La Viola,
Tomohiro Mashita, and Haruo Takemura.
The effectiveness of an
ar-based context-aware assembly support system in object assembly.
In 2014 IEEE Virtual Reality, VR 2014, Minneapolis, MN, USA, March 29
- April 2, 2014, pages 57–62, 2014.
(doi:10.1109/VR.2014.6802051)
- Mustafa R. Kilinç,
Jeff T. Linderoth, James R. Luedtke, and
Andrew Miller.
Strong-branching
inequalities for convex mixed integer nonlinear programs.
Comp. Opt. and Appl., 59(3):639–665, 2014.
(doi:10.1007/s10589-014-9690-8)
- Michael LeMay and Carl A.
Gunter.
Network-on-chip firewall: Countering defective and malicious system-on-chip
hardware.
CoRR, abs/1404.3465, 2014.
- Devin Lundberg, Brown
Farinholt, Edward Sullivan, Ryan Mast,
Stephen Checkoway, Stefan Savage,
Alex C. Snoeren, and Kirill Levchenko.
On the security of mobile
cockpit information systems.
In Proceedings of the 2014 ACM SIGSAC Conference on Computer and
Communications Security, Scottsdale, AZ, USA, November 3-7, 2014,
pages 633–645, 2014.
(doi:10.1145/2660267.2660375)
- Andrew Miller, Michael
Hicks, Jonathan Katz, and Elaine Shi.
Authenticated data
structures, generically.
In The 41st Annual ACM SIGPLAN-SIGACT Symposium on Principles of
Programming Languages, POPL '14, San Diego, CA, USA, January 20-21,
2014, pages 411–424, 2014.
(doi:10.1145/2535838.2535851)
- Andrew Miller, Ari Juels,
Elaine Shi, Bryan Parno, and
Jonathan Katz.
Permacoin: Repurposing bitcoin
work for data preservation.
In 2014 IEEE Symposium on Security and Privacy, SP 2014, Berkeley,
CA, USA, May 18-21, 2014, pages 475–490, 2014.
(doi:10.1109/SP.2014.37)
- Muhammad Naveed, Shashank
Agrawal, Manoj Prabhakaran, XiaoFeng Wang,
Erman Ayday, Jean-Pierre Hubaux, and
Carl A. Gunter.
Controlled functional encryption.
In ACM Conference on Computer and Communications Security, pages
1280–1291. ACM, 2014.
- Muhammad Naveed, Erman
Ayday, Ellen Wright Clayton, Jacques Fellay,
Carl A. Gunter, Jean-Pierre Hubaux,
Bradley A. Malin, and XiaoFeng Wang.
Privacy and security in the genomic era.
CoRR, abs/1405.1891, 2014.
- Muhammad Naveed, Manoj
Prabhakaran, and Carl A. Gunter.
Dynamic searchable encryption via blind storage.
In IEEE Symposium on Security and Privacy, pages 639–654.
IEEE Computer Society, 2014.
- Muhammad Naveed, Manoj
Prabhakaran, and Carl A. Gunter.
Dynamic searchable encryption via blind storage.
IACR Cryptology ePrint Archive, 2014:219, 2014.
- Muhammad Naveed, Xiao-yong
Zhou, Soteris Demetriou, XiaoFeng Wang, and
Carl A. Gunter.
Inside job: Understanding and mitigating the threat of external device
mis-binding on android.
In NDSS. The Internet Society, 2014.
- Se Eun Oh, Ji Young Chun,
Limin Jia, Deepak Garg, Carl A.
Gunter, and Anupam Datta.
Privacy-preserving audit for broker-based health information exchange.
In CODASPY, pages 313–320. ACM, 2014.
- Paul Pearce, Vacha Dave,
Chris Grier, Kirill Levchenko,
Saikat Guha, Damon McCoy, Vern
Paxson, Stefan Savage, and Geoffrey M.
Voelker.
Characterizing large-scale
click fraud in zeroaccess.
In Proceedings of the 2014 ACM SIGSAC Conference on Computer and
Communications Security, Scottsdale, AZ, USA, November 3-7, 2014,
pages 141–152, 2014.
(doi:10.1145/2660267.2660369)
- Ling Ren, Christopher W.
Fletcher, Albert Kwon, Emil Stefanov,
Elaine Shi, Marten van Dijk, and
Srinivas Devadas.
Ring ORAM: closing the gap between
small and large client storage oblivious RAM.
IACR Cryptology ePrint Archive, 2014:997, 2014.
- Ling Ren, Christopher W.
Fletcher, Xiangyao Yu, Albert Kwon,
Marten van Dijk, and Srinivas Devadas.
Unified oblivious-ram: Improving
recursive ORAM with locality and pseudorandomness.
IACR Cryptology ePrint Archive, 2014:205, 2014.
- G. Edward Suh, Christopher W.
Fletcher, Dwaine E. Clarke, Blaise Gassend,
Marten van Dijk, and Srinivas Devadas.
Author retrospective AEGIS:
architecture for tamper-evident and tamper-resistant processing.
In ACM International Conference on Supercomputing 25th Anniversary
Volume, pages 68–70, 2014.
(doi:10.1145/2591635.2591665)
- Yunjing Xu, Zachary Musgrave,
Brian Noble, and Michael Bailey.
Workload-aware provisioning in
public clouds.
IEEE Internet Computing, 18(4):15–21, 2014.
(doi:10.1109/MIC.2014.38)
- Xiangyao Yu, Ling Ren,
Christopher W. Fletcher, Albert Kwon,
Marten van Dijk, and Srinivas Devadas.
Enhancing oblivious RAM performance
using dynamic prefetching.
IACR Cryptology ePrint Archive, 2014:234, 2014.
- Aston Zhang, Xing Xie,
Kevin Chen-Chuan Chang, Carl A. Gunter,
Jiawei Han, and XiaoFeng Wang.
Privacy risk in anonymized heterogeneous information networks.
In EDBT, pages 595–606. OpenProceedings.org, 2014.
- Jing Zhang, Zakir Durumeric,
Michael Bailey, Mingyan Liu, and
Manish Karir.
On
the mismanagement and maliciousness of networks.
In 21st Annual Network and Distributed System Security Symposium, NDSS
2014, San Diego, California, USA, February 23-26, 2014, 2014.
- Wen Zhang, You Chen,
Thaddeus Cybulski, Daniel Fabbri,
Carl A. Gunter, Patrick Lawlor,
David M. Liebovitz, and Bradley Malin.
Decide now or decide later?: Quantifying the tradeoff between prospective and
retrospective access decisions.
In ACM Conference on Computer and Communications Security, pages
1182–1192. ACM, 2014.
- Denise Anthony, Andrew T.
Campbell, Thomas Candon, Andrew Gettinger,
David Kotz, Lisa A. Marsch,
Andres Molina-Markham, Karen Page,
Sean W. Smith, Carl A. Gunter, and
M. Eric Johnson.
Securing information technology in healthcare.
IEEE Security & Privacy, 11(6):25–33, 2013.
- Adam M. Bates, Benjamin Mood,
Masoud Valafar, and Kevin R. B. Butler.
Towards secure
provenance-based access control in cloud environments.
In Third ACM Conference on Data and Application Security and Privacy,
CODASPY'13, San Antonio, TX, USA, February 18-20, 2013, pages
277–284, 2013.
(doi:10.1145/2435349.2435389)
- Denis Bueno, Kevin J.
Compton, Karem A. Sakallah, and Michael
Bailey.
Detecting traditional
packers, decisively.
In Research in Attacks, Intrusions, and Defenses - 16th International
Symposium, RAID 2013, Rodney Bay, St. Lucia, October 23-25, 2013.
Proceedings, pages 184–203, 2013.
(doi:10.1007/978-3-642-41284-4_10)
- Jakub Czyz, Kyle Lady,
Sam G. Miller, Michael Bailey,
Michael Kallitsis, and Manish Karir.
Understanding ipv6 internet
background radiation.
In Proceedings of the 2013 Internet Measurement Conference, IMC 2013,
Barcelona, Spain, October 23-25, 2013, pages 105–118, 2013.
(doi:10.1145/2504730.2504732)
- Anupam Das and Nikita
Borisov.
Securing anonymous
communication channels under the selective dos attack.
In Financial Cryptography and Data Security - 17th International
Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected
Papers, pages 362–370, 2013.
(doi:10.1007/978-3-642-39884-1_31)
- Eric Duffy, Steve Nyemba,
Carl A. Gunter, David M. Liebovitz, and
Bradley Malin.
Requirements and design for an extensible toolkit for analyzing EMR audit
logs.
In HealthTech. USENIX Association, 2013.
- Zakir Durumeric, James
Kasten, Michael Bailey, and J. Alex Halderman.
Analysis of the HTTPS
certificate ecosystem.
In Proceedings of the 2013 Internet Measurement Conference, IMC 2013,
Barcelona, Spain, October 23-25, 2013, pages 291–304, 2013.
(doi:10.1145/2504730.2504755)
- Christopher W. Fletcher,
Rachael Harding, Omer Khan, and
Srinivas Devadas.
A framework to
accelerate sequential programs on homogeneous multicores.
In 21st IEEE/IFIP International Conference on VLSI and
System-on-Chip, VLSI-SoC 2013, Istanbul, Turkey, October 7-9, 2013,
pages 344–347, 2013.
(doi:10.1109/VLSI-SoC.2013.6673306)
- Wojciech Fraczak, Loukas
Georgiadis, Andrew Miller, and Robert Endre
Tarjan.
Finding dominators via
disjoint set union.
J. Discrete Algorithms, 23:2–20, 2013.
(doi:10.1016/j.jda.2013.10.003)
- Wojciech Fraczak, Loukas
Georgiadis, Andrew Miller, and Robert Endre
Tarjan.
Finding dominators via disjoint set
union.
CoRR, abs/1310.2118, 2013.
- Siddharth Gupta, Casey
Hanson, Carl A. Gunter, Mario Frank,
David M. Liebovitz, and Bradley Malin.
Modeling and detecting anomalous topic access.
In ISI, pages 100–105. IEEE, 2013.
- Amir Houmansadr and Nikita
Borisov.
Botmosaic: Collaborative
network watermark for the detection of irc-based botnets.
Journal of Systems and Software, 86(3):707–715, 2013.
(doi:10.1016/j.jss.2012.11.005)
- Amir Houmansadr and Nikita
Borisov.
The need for flow
fingerprints to link correlated network flows.
In Privacy Enhancing Technologies - 13th International Symposium, PETS
2013, Bloomington, IN, USA, July 10-12, 2013. Proceedings, pages
205–224, 2013.
(doi:10.1007/978-3-642-39077-7_11)
- Amir Houmansadr, Thomas J.
Riedl, Nikita Borisov, and Andrew C. Singer.
I
want my voice to be heard: IP over voice-over-ip for unobservable
censorship circumvention.
In 20th Annual Network and Distributed System Security Symposium, NDSS
2013, San Diego, California, USA, February 24-27, 2013, 2013.
- Vishal Jain, Andrew Miller,
and Joseph L. Mundy.
A multi-sensor fusion framework
in 3-d.
In IEEE Conference on Computer Vision and Pattern Recognition, CVPR
Workshops 2013, Portland, OR, USA, June 23-28, 2013, pages 314–319,
2013.
(doi:10.1109/CVPRW.2013.54)
- Manish Karir, Geoff Huston,
George Michaelson, and Michael Bailey.
Understanding ipv6
populations in the wild.
In Passive and Active Measurement - 14th International Conference, PAM
2013, Hong Kong, China, March 18-19, 2013. Proceedings, pages
256–259, 2013.
(doi:10.1007/978-3-642-36516-4_27)
- Sarah Meiklejohn, Marjori
Pomarole, Grant Jordan, Kirill Levchenko,
Damon McCoy, Geoffrey M. Voelker, and
Stefan Savage.
A
fistful of bitcoins: Characterizing payments among men with no names.
;login:, 38(6), 2013.
- Sarah Meiklejohn, Marjori
Pomarole, Grant Jordan, Kirill Levchenko,
Damon McCoy, Geoffrey M. Voelker, and
Stefan Savage.
A fistful of bitcoins:
characterizing payments among men with no names.
In Proceedings of the 2013 Internet Measurement Conference, IMC 2013,
Barcelona, Spain, October 23-25, 2013, pages 127–140, 2013.
(doi:10.1145/2504730.2504747)
- Andrew Miller.
Fitness trackers.
ACM Crossroads, 20(2):24–26, 2013.
(doi:10.1145/2543611)
- Prateek Mittal, Matthew K.
Wright, and Nikita Borisov.
Pisces:
Anonymous communication using social networks.
In 20th Annual Network and Distributed System Security Symposium, NDSS
2013, San Diego, California, USA, February 24-27, 2013, pages 1–18,
2013.
- Giang T. K. Nguyen, Xun Gong,
Anupam Das, and Nikita Borisov.
Pnp: improving web browsing
performance over tor using web resource prefetch-and-push.
In 2013 ACM SIGSAC Conference on Computer and Communications
Security, CCS'13, Berlin, Germany, November 4-8, 2013, pages
1433–1436, 2013.
(doi:10.1145/2508859.2512519)
- Ling Ren, Christopher W.
Fletcher, Xiangyao Yu, Marten van Dijk, and
Srinivas Devadas.
Integrity verification for
path oblivious-ram.
In IEEE High Performance Extreme Computing Conference, HPEC 2013,
Waltham, MA, USA, September 10-12, 2013, pages 1–6, 2013.
(doi:10.1109/HPEC.2013.6670339)
- Ling Ren, Xiangyao Yu,
Christopher W. Fletcher, Marten van Dijk, and
Srinivas Devadas.
Design space exploration and
optimization of path oblivious RAM in secure processors.
In The 40th Annual International Symposium on Computer Architecture,
ISCA'13, Tel-Aviv, Israel, June 23-27, 2013, pages 571–582, 2013.
(doi:10.1145/2485922.2485971)
- Ling Ren, Xiangyao Yu,
Christopher W. Fletcher, Marten van Dijk, and
Srinivas Devadas.
Design space exploration and
optimization of path oblivious RAM in secure processors.
IACR Cryptology ePrint Archive, 2013:76, 2013.
- Emil Stefanov, Marten van
Dijk, Elaine Shi, Christopher W. Fletcher,
Ling Ren, Xiangyao Yu, and
Srinivas Devadas.
Path ORAM: an extremely
simple oblivious RAM protocol.
In 2013 ACM SIGSAC Conference on Computer and Communications
Security, CCS'13, Berlin, Germany, November 4-8, 2013, pages 299–310,
2013.
(doi:10.1145/2508859.2516660)
- Emil Stefanov, Marten van
Dijk, Elaine Shi, Christopher W. Fletcher,
Ling Ren, Xiangyao Yu, and
Srinivas Devadas.
Path ORAM: an extremely simple
oblivious RAM protocol.
IACR Cryptology ePrint Archive, 2013:280, 2013.
- Daniel Turner, Kirill
Levchenko, Stefan Savage, and Alex C. Snoeren.
A comparison of syslog and
IS-IS for network failure analysis.
In Proceedings of the 2013 Internet Measurement Conference, IMC 2013,
Barcelona, Spain, October 23-25, 2013, pages 433–440, 2013.
(doi:10.1145/2504730.2504766)
- Qiyan Wang, Zi Lin,
Nikita Borisov, and Nicholas Hopper.
rbridge:
User reputation based tor bridge distribution with privacy preservation.
In 20th Annual Network and Distributed System Security Symposium, NDSS
2013, San Diego, California, USA, February 24-27, 2013, 2013.
- Andrew M. White, Srinivas
Krishnan, Michael Bailey, Fabian Monrose, and
Phillip A. Porras.
Clear
and present data: Opaque traffic and its security implications for the
future.
In 20th Annual Network and Distributed System Security Symposium, NDSS
2013, San Diego, California, USA, February 24-27, 2013, 2013.
- Yunjing Xu, Michael Bailey,
Brian Noble, and Farnam Jahanian.
Small is better: avoiding
latency traps in virtualized data centers.
In ACM Symposium on Cloud Computing, SOCC '13, Santa Clara, CA, USA,
October 1-3, 2013, pages 7:1–7:16, 2013.
(doi:10.1145/2523616.2523620)
- Yunjing Xu, Zachary
Musgrave, Brian Noble, and Michael Bailey.
Bobtail:
Avoiding long tails in the cloud.
In Proceedings of the 10th USENIX Symposium on Networked Systems Design
and Implementation, NSDI 2013, Lombard, IL, USA, April 2-5, 2013,
pages 329–341, 2013.
- Xiangyao Yu, Christopher W.
Fletcher, Ling Ren, Marten van Dijk, and
Srinivas Devadas.
Generalized external
interaction with tamper-resistant hardware with bounded information
leakage.
In CCSW'13, Proceedings of the 2013 ACM Cloud Computing Security
Workshop, Co-located with CCS 2013, Berlin, Germany, November 4,
2013, pages 23–34, 2013.
(doi:10.1145/2517488.2517498)
- He Zhang, Sanjay Mehrotra,
David M. Liebovitz, Carl A. Gunter, and
Bradley Malin.
Mining deviations from patient care pathways via electronic medical record
system audits.
ACM Trans. Management Inf. Syst., 4(4):17:1–17:20, 2013.
- Jing Zhang, Ari Chivukula,
Michael Bailey, Manish Karir, and
Mingyan Liu.
Characterization of
blacklists and tainted network traffic.
In Passive and Active Measurement - 14th International Conference, PAM
2013, Hong Kong, China, March 18-19, 2013. Proceedings, pages
218–228, 2013.
(doi:10.1007/978-3-642-36516-4_22)
- Wen Zhang, You Chen,
Carl A. Gunter, David M. Liebovitz, and
Bradley Malin.
Evolving role definitions through permission invocation patterns.
In SACMAT, pages 37–48. ACM, 2013.
- Xiao-yong Zhou, Soteris
Demetriou, Dongjing He, Muhammad Naveed,
Xiaorui Pan, XiaoFeng Wang,
Carl A. Gunter, and Klara Nahrstedt.
Identity, location, disease and more: inferring your secrets from android
public resources.
In ACM Conference on Computer and Communications Security, pages
1017–1028. ACM, 2013.
- Saman A. Zonouz, Amir
Houmansadr, Robin Berthier, Nikita Borisov,
and William H. Sanders.
Secloud: A cloud-based
comprehensive and lightweight security solution for smartphones.
Computers & Security, 37:215–227, 2013.
(doi:10.1016/j.cose.2013.02.002)
- Michael Bailey, David
Dittrich, Erin Kenneally, and Douglas Maughan.
The menlo report.
IEEE Security & Privacy, 10(2):71–75, 2012.
(doi:10.1109/MSP.2012.52)
- Michael Bailey, Erin
Kenneally, and David Dittrich.
A refined ethical
impact assessment tool and a case study of its application.
In Financial Cryptography and Data Security - FC 2012 Workshops, USEC
and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected
Papers, pages 112–123, 2012.
(doi:10.1007/978-3-642-34638-5_10)
- Adam M. Bates, Kevin R. B.
Butler, Micah Sherr, Clay Shields,
Patrick Traynor, and Dan S. Wallach.
Accountable
wiretapping -or- I know they can hear you now.
In 19th Annual Network and Distributed System Security Symposium, NDSS
2012, San Diego, California, USA, February 5-8, 2012, 2012.
- Adam M. Bates, Benjamin
Mood, Joe Pletcher, Hannah Pruse,
Masoud Valafar, and Kevin R. B. Butler.
Detecting co-residency with
active traffic analysis techniques.
In Proceedings of the 2012 ACM Workshop on Cloud computing security,
CCSW 2012, Raleigh, NC, USA, October 19, 2012., pages 1–12, 2012.
(doi:10.1145/2381913.2381915)
- Nikita Borisov.
11th workshop on privacy in
the electronic society.
In the ACM Conference on Computer and Communications Security, CCS'12,
Raleigh, NC, USA, October 16-18, 2012, pages 1064–1065, 2012.
(doi:10.1145/2382196.2382331)
- Judith Bayard Cushing, Evan
Hayduk, Jerilyn Walley, Kirsten M. Winters,
Denise Lach, Michael Bailey,
Christoph Thomas, and Susan G. Stafford.
Which visualizations work,
for what purpose, for whom?: evaluating visualizations of terrestrial and
aquatic systems.
In Proceedings of the 2012 BELIV Workshop: Beyond Time and Errors -
Novel Evaluation Methods for Visualization, Seattle, WA, USA, October 14-15,
2012, page 3, 2012.
(doi:10.1145/2442576.2442579)
- Christopher W. Fletcher,
Rachael Harding, Omer Khan, and
Srinivas Devadas.
A low-overhead dynamic
optimization framework for multicores.
In International Conference on Parallel Architectures and Compilation
Techniques, PACT '12, Minneapolis, MN, USA - September 19 - 23,
2012, pages 467–468, 2012.
(doi:10.1145/2370816.2370899)
- Christopher W. Fletcher,
Marten van Dijk, and Srinivas Devadas.
Compilation techniques for efficient
encrypted computation.
IACR Cryptology ePrint Archive, 2012:266, 2012.
- Christopher W. Fletcher,
Marten van Dijk, and Srinivas Devadas.
Towards an interpreter for
efficient encrypted computation.
In Proceedings of the 2012 ACM Workshop on Cloud computing security,
CCSW 2012, Raleigh, NC, USA, October 19, 2012., pages 83–94, 2012.
(doi:10.1145/2381913.2381928)
- Wojciech Fraczak and Andrew
Miller.
Disjoint set forest
digraph representation for an efficient dominator tree construction.
In Combinatorial Algorithms, 23rd International Workshop, IWOCA 2012,
Tamil Nadu, India, July 19-21, 2012, Revised Selected Papers, pages
46–59, 2012.
(doi:10.1007/978-3-642-35926-2_5)
- Xun Gong, Nikita Borisov,
Negar Kiyavash, and Nabil Schear.
Website detection using
remote traffic analysis.
In Privacy Enhancing Technologies - 12th International Symposium, PETS
2012, Vigo, Spain, July 11-13, 2012. Proceedings, pages 58–78, 2012.
(doi:10.1007/978-3-642-31680-7_4)
- Chris Grier, Lucas Ballard,
Juan Caballero, Neha Chachra,
Christian J. Dietrich, Kirill Levchenko,
Panayiotis Mavrommatis, Damon McCoy,
Antonio Nappa, Andreas Pitsillidis,
Niels Provos, M. Zubair Rafique,
Moheeb Abu Rajab, Christian Rossow,
Kurt Thomas, Vern Paxson, Stefan
Savage, and Geoffrey M. Voelker.
Manufacturing compromise: the
emergence of exploit-as-a-service.
In the ACM Conference on Computer and Communications Security, CCS'12,
Raleigh, NC, USA, October 16-18, 2012, pages 821–832, 2012.
(doi:10.1145/2382196.2382283)
- Tristan Halvorson, Janos
Szurdi, Gregor Maier, Márk
Félegyházi, Christian Kreibich,
Nicholas Weaver, Kirill Levchenko, and
Vern Paxson.
The BIZ top-level
domain: Ten years later.
In Passive and Active Measurement - 13th International Conference, PAM
2012, Vienna, Austria, March 12-14th, 2012. Proceedings, pages
221–230, 2012.
(doi:10.1007/978-3-642-28537-0_22)
- Amir Houmansadr and Nikita
Borisov.
Botmosaic: Collaborative network
watermark for botnet detection.
CoRR, abs/1203.1568, 2012.
- Amir Houmansadr, Negar
Kiyavash, and Nikita Borisov.
Non-blind watermarking of network
flows.
CoRR, abs/1203.2273, 2012.
- Amir Houmansadr, Thomas J.
Riedl, Nikita Borisov, and Andrew C. Singer.
IP over voice-over-ip for censorship
circumvention.
CoRR, abs/1207.2683, 2012.
- Amir Houmansadr, Wenxuan
Zhou, Matthew Caesar, and Nikita Borisov.
SWEET: serving the web by exploiting
email tunnels.
CoRR, abs/1211.3191, 2012.
- Sonia Jahid and Nikita
Borisov.
PIRATTE: proxy-based immediate
revocation of attribute-based encryption.
CoRR, abs/1208.4877, 2012.
- Sonia Jahid, Shirin
Nilizadeh, Prateek Mittal, Nikita Borisov, and
Apu Kapadia.
DECENT: A
decentralized architecture for enforcing privacy in online social
networks.
In Tenth Annual IEEE International Conference on Pervasive Computing
and Communications, PerCom 2012, March 19-23, 2012, Lugano, Switzerland,
Workshop Proceedings, pages 326–332, 2012.
(doi:10.1109/PerComW.2012.6197504)
- Sanjeev Khanna, Santosh S.
Venkatesh, Omid Fatemieh, Fariba Khan, and
Carl A. Gunter.
Adaptive selective verification: An efficient adaptive countermeasure to thwart
dos attacks.
IEEE/ACM Trans. Netw., 20(3):715–728, 2012.
- Negar Kiyavash, Amir
Houmansadr, and Nikita Borisov.
Multi-flow attacks against network
flow watermarks: Analysis and countermeasures.
CoRR, abs/1203.1390, 2012.
- Ramana Rao Kompella, Kirill
Levchenko, Alex C. Snoeren, and George
Varghese.
Router support for
fine-grained latency measurements.
IEEE/ACM Trans. Netw., 20(3):811–824, 2012.
(doi:10.1109/TNET.2012.2188905)
- Ilia A. Lebedev,
Christopher W. Fletcher, Shaoyi Cheng,
James C. Martin, Austin Doupnik,
Daniel Burke, Mingjie Lin, and
John Wawrzynek.
Exploring many-core design
templates for fpgas and asics.
Int. J. Reconfig. Comp., 2012:439141:1–439141:15, 2012.
(doi:10.1155/2012/439141)
- Michael LeMay and Carl A.
Gunter.
Cumulative attestation kernels for embedded systems.
IEEE Trans. Smart Grid, 3(2):744–760, 2012.
- Frank Li, Prateek Mittal,
Matthew Caesar, and Nikita Borisov.
Sybilcontrol: Practical sybil defense
with computational puzzles.
CoRR, abs/1201.2657, 2012.
- Damon McCoy, Andreas
Pitsillidis, Grant Jordan, Nicholas Weaver,
Christian Kreibich, Brian Krebs,
Geoffrey M. Voelker, Stefan Savage, and
Kirill Levchenko.
Pharmaleaks:
Understanding the business of online pharmaceutical affiliate programs.
In Proceedings of the 21th USENIX Security Symposium, Bellevue, WA,
USA, August 8-10, 2012, pages 1–16, 2012.
- Andrew Miller, Brandyn White,
Emiko Charbonneau, Zach Kanzler, and
Joseph J. LaViola Jr.
Interactive 3d model acquisition
and tracking of building block structures.
IEEE Trans. Vis. Comput. Graph., 18(4):651–659, 2012.
(doi:10.1109/TVCG.2012.48)
- Prateek Mittal and Nikita
Borisov.
Information leaks in
structured peer-to-peer anonymous communication systems.
ACM Trans. Inf. Syst. Secur., 15(1):5:1–5:28, 2012.
(doi:10.1145/2133375.2133380)
- Prateek Mittal, Matthew
Caesar, and Nikita Borisov.
X-vine:
Secure and pseudonymous routing in dhts using social networks.
In 19th Annual Network and Distributed System Security Symposium, NDSS
2012, San Diego, California, USA, February 5-8, 2012, 2012.
- Prateek Mittal, Matthew K.
Wright, and Nikita Borisov.
Pisces: Anonymous communication using
social networks.
CoRR, abs/1208.6326, 2012.
- Shirin Nilizadeh, Sonia
Jahid, Prateek Mittal, Nikita Borisov, and
Apu Kapadia.
Cachet: a decentralized
architecture for privacy preserving social networking with caching.
In Conference on emerging Networking Experiments and Technologies, CoNEXT
'12, Nice, France - December 10 - 13, 2012, pages 337–348, 2012.
(doi:10.1145/2413176.2413215)
- Andreas Pitsillidis, Chris
Kanich, Geoffrey M. Voelker, Kirill Levchenko,
and Stefan Savage.
Taster's choice: a
comparative analysis of spam feeds.
In Proceedings of the 12th ACM SIGCOMM Internet Measurement
Conference, IMC '12, Boston, MA, USA, November 14-16, 2012, pages
427–440, 2012.
(doi:10.1145/2398776.2398821)
- Pengju Ren, Mieszko Lis,
Myong Hyon Cho, Keun Sup Shim,
Christopher W. Fletcher, Omer Khan,
Nanning Zheng, and Srinivas Devadas.
HORNET: A cycle-level
multicore simulator.
IEEE Trans. on CAD of Integrated Circuits and Systems,
31(6):890–903, 2012.
(doi:10.1109/TCAD.2012.2184760)
- Qiyan Wang and Nikita
Borisov.
Octopus: A secure and
anonymous DHT lookup.
In 2012 IEEE 32nd International Conference on Distributed Computing
Systems, Macau, China, June 18-21, 2012, pages 325–334, 2012.
(doi:10.1109/ICDCS.2012.78)
- Qiyan Wang and Nikita
Borisov.
Octopus: A secure and anonymous
DHT lookup.
CoRR, abs/1203.2668, 2012.
- Qiyan Wang, Xun Gong,
Giang T. K. Nguyen, Amir Houmansadr, and
Nikita Borisov.
Censorspoofer: asymmetric
communication using IP spoofing for censorship-resistant web browsing.
In the ACM Conference on Computer and Communications Security, CCS'12,
Raleigh, NC, USA, October 16-18, 2012, pages 121–132, 2012.
(doi:10.1145/2382196.2382212)
- Qiyan Wang, Xun Gong,
Giang T. K. Nguyen, Amir Houmansadr, and
Nikita Borisov.
Censorspoofer: Asymmetric
communication with IP spoofing for censorship-resistant web browsing.
CoRR, abs/1203.1673, 2012.
- Jing Zhang, Robin Berthier,
Will Rhee, Michael Bailey,
Partha P. Pal, Farnam Jahanian, and
William H. Sanders.
Learning
from early attempts to measure information security performance.
In 5th Workshop on Cyber Security Experimentation and Test, CSET '12,
Bellevue, WA, USA, August 6, 2012, 2012.
- Jing Zhang, Robin Berthier,
Will Rhee, Michael Bailey,
Partha P. Pal, Farnam Jahanian, and
William H. Sanders.
Safeguarding academic
accounts and resources with the university credential abuse auditing
system.
In IEEE/IFIP International Conference on Dependable Systems and
Networks, DSN 2012, Boston, MA, USA, June 25-28, 2012, pages 1–8,
2012.
(doi:10.1109/DSN.2012.6263961)
- Quanyan Zhu, Carl A. Gunter,
and Tamer Basar.
Tragedy of anticommons in digital right management of medical records.
In HealthSec. USENIX Association, 2012.
- David C. Bergman, Dong (Kevin)
Jin, Joshua Juen, Naoki Tanaka,
Carl A. Gunter, and Andrew K. Wright.
Nonintrusive load-shed verification.
IEEE Pervasive Computing, 10(1):49–57, 2011.
- Emiko Charbonneau, Andrew
Miller, and Joseph J. LaViola Jr.
Teach me to dance: exploring
player experience and performance in full body dance games.
In Proceedings of the 8th International Conference on Advances in
Computer Entertainment Technology, ACE 2011, Lisbon, Portugal, November
8-11, 2011, page 43, 2011.
(doi:10.1145/2071423.2071477)
- Scott E. Coull, Fabian
Monrose, and Michael Bailey.
On
measuring the similarity of network hosts: Pitfalls, new metrics, and
empirical analyses.
In Proceedings of the Network and Distributed System Security Symposium,
NDSS 2011, San Diego, California, USA, 6th February - 9th February
2011, 2011.
- Anupam Das and Nikita
Borisov.
Securing tor tunnels under the
selective-dos attack.
CoRR, abs/1107.3863, 2011.
- David Dittrich, Michael
Bailey, and Sven Dietrich.
Building an active computer
security ethics community.
IEEE Security & Privacy, 9(4):32–40, 2011.
(doi:10.1109/MSP.2010.199)
- Omid Fatemieh, Ali Farhadi,
Ranveer Chandra, and Carl A. Gunter.
Using classification to protect the integrity of spectrum measurements in white
space networks.
In NDSS. The Internet Society, 2011.
- Omid Fatemieh, Michael
LeMay, and Carl A. Gunter.
Reliable telemetry in white spaces using remote attestation.
In ACSAC, pages 323–332. ACM, 2011.
- Christopher W. Fletcher,
Ilia A. Lebedev, Narges Bani Asadi,
Daniel Burke, and John Wawrzynek.
Bridging the GPGPU-FPGA
efficiency gap.
In Proceedings of the ACM/SIGDA 19th International Symposium on Field
Programmable Gate Arrays, FPGA 2011, Monterey, California, USA, February
27, March 1, 2011, pages 119–122, 2011.
(doi:10.1145/1950413.1950439)
- Xun Gong, Negar Kiyavash,
Nabil Schear, and Nikita Borisov.
Website detection using remote traffic
analysis.
CoRR, abs/1109.0097, 2011.
- Jeff Green, Joshua Juen,
Omid Fatemieh, Ravinder Shankesi,
Dong (Kevin) Jin, and Carl A. Gunter.
Reconstructing hash reversal based proof of work schemes.
In LEET. USENIX Association, 2011.
- Carl A. Gunter, David M.
Liebovitz, and Bradley Malin.
Experience-based access management: A life-cycle framework for identity and
access management systems.
IEEE Security & Privacy, 9(5):48–55, 2011.
- Amir Houmansadr and Nikita
Borisov.
Coco: Coding-based
covert timing channels for network flows.
In Information Hiding - 13th International Conference, IH 2011, Prague,
Czech Republic, May 18-20, 2011, Revised Selected Papers, pages
314–328, 2011.
(doi:10.1007/978-3-642-24178-9_22)
- Amir Houmansadr and Nikita
Borisov.
SWIRL:
A scalable watermark to detect correlated network flows.
In Proceedings of the Network and Distributed System Security Symposium,
NDSS 2011, San Diego, California, USA, 6th February - 9th February
2011, 2011.
- Amir Houmansadr and Nikita
Borisov.
Towards improving network
flow watermarks using the repeat-accumulate codes.
In Proceedings of the IEEE International Conference on Acoustics,
Speech, and Signal Processing, ICASSP 2011, May 22-27, 2011, Prague
Congress Center, Prague, Czech Republic, pages 1852–1855, 2011.
(doi:10.1109/ICASSP.2011.5946866)
- Amir Houmansadr, Giang T. K.
Nguyen, Matthew Caesar, and Nikita Borisov.
Cirripede: circumvention
infrastructure using router redirection with plausible deniability.
In Proceedings of the 18th ACM Conference on Computer and
Communications Security, CCS 2011, Chicago, Illinois, USA, October 17-21,
2011, pages 187–200, 2011.
(doi:10.1145/2046707.2046730)
- Sonia Jahid, Carl A. Gunter,
Imranul Hoque, and Hamed Okhravi.
Myabdac: compiling XACML policies for attribute-based database access
control.
In CODASPY, pages 97–108. ACM, 2011.
- Sonia Jahid, Prateek Mittal,
and Nikita Borisov.
Easier: encryption-based
access control in social networks with efficient revocation.
In Proceedings of the 6th ACM Symposium on Information, Computer and
Communications Security, ASIACCS 2011, Hong Kong, China, March 22-24,
2011, pages 411–415, 2011.
(doi:10.1145/1966913.1966970)
- Sonia Jahid, Shirin
Nilizadeh, Prateek Mittal, Nikita Borisov, and
Apu Kapadia.
A decentralized architecture for
enforcing privacy in online social networks.
CoRR, abs/1111.5377, 2011.
- Chris Kanich, Neha Chachra,
Damon McCoy, Chris Grier,
David Y. Wang, Marti Motoyama,
Kirill Levchenko, Stefan Savage, and
Geoffrey M. Voelker.
No
plan survives contact: Experience with cybercrime measurement.
In 4th Workshop on Cyber Security Experimentation and Test, CSET '11,
San Francisco, CA, USA, August 8, 2011, 2011.
- Chris Kanich, Nicholas
Weaver, Damon McCoy, Tristan Halvorson,
Christian Kreibich, Kirill Levchenko,
Vern Paxson, Geoffrey M. Voelker, and
Stefan Savage.
Show
me the money: Characterizing spam-advertised revenue.
In 20th USENIX Security Symposium, San Francisco, CA, USA, August 8-12,
2011, Proceedings, 2011.
- Michael LeMay and Carl A.
Gunter.
Enforcing executing-implies-verified with the integrity-aware processor.
In TRUST, volume 6740 of Lecture Notes in Computer
Science, pages 202–216. Springer, 2011.
- Kirill Levchenko, Andreas
Pitsillidis, Neha Chachra, Brandon Enright,
Márk Félegyházi, Chris Grier,
Tristan Halvorson, Chris Kanich,
Christian Kreibich, He Liu, Damon
McCoy, Nicholas Weaver, Vern Paxson,
Geoffrey M. Voelker, and Stefan Savage.
Click trajectories: End-to-end
analysis of the spam value chain.
In 32nd IEEE Symposium on Security and Privacy, S&P 2011, 22-25 May
2011, Berkeley, California, USA, pages 431–446, 2011.
(doi:10.1109/SP.2011.24)
- Mieszko Lis, Pengju Ren,
Myong Hyon Cho, Keun Sup Shim,
Christopher W. Fletcher, Omer Khan, and
Srinivas Devadas.
Scalable, accurate
multicore simulation in the 1000-core era.
In IEEE International Symposium on Performance Analysis of Systems and
Software, ISPASS 2011, 10-12 April, 2011, Austin, TX, USA, pages
175–185, 2011.
(doi:10.1109/ISPASS.2011.5762734)
- Mieszko Lis, Keun Sup Shim,
Myong Hyon Cho, Christopher W. Fletcher,
Michel A. Kinsy, Ilia A. Lebedev,
Omer Khan, and Srinivas Devadas.
Brief announcement:
distributed shared memory based on computation migration.
In SPAA 2011: Proceedings of the 23rd Annual ACM Symposium on
Parallelism in Algorithms and Architectures, San Jose, CA, USA, June 4-6,
2011 (Co-located with FCRC 2011), pages 253–256, 2011.
(doi:10.1145/1989493.1989530)
- He Liu, Kirill Levchenko,
Márk Félegyházi, Christian
Kreibich, Gregor Maier, and Geoffrey M.
Voelker.
On
the effects of registrar-level intervention.
In 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats,
LEET '11, Boston, MA, USA, March 29, 2011, 2011.
- Damon McCoy, Jose Andre
Morales, and Kirill Levchenko.
Proximax:
Measurement-driven proxy dissemination (short paper).
In Financial Cryptography and Data Security - 15th International
Conference, FC 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011,
Revised Selected Papers, pages 260–267, 2011.
(doi:10.1007/978-3-642-27576-0_21)
- Andrew Miller, Vishal Jain,
and Joseph L. Mundy.
Real-time rendering and
dynamic updating of 3-d volumetric data.
In Proceedings of 4th Workshop on General Purpose Processing on Graphics
Processing Units, GPGPU 2011, Newport Beach, CA, USA, March 5, 2011,
page 8, 2011.
(doi:10.1145/1964179.1964190)
- Kazuhiro Minami, Nikita
Borisov, Marianne Winslett, and Adam J. Lee.
Confidentiality-preserving
proof theories for distributed proof systems.
In Proceedings of the 6th ACM Symposium on Information, Computer and
Communications Security, ASIACCS 2011, Hong Kong, China, March 22-24,
2011, pages 145–154, 2011.
(doi:10.1145/1966913.1966933)
- Prateek Mittal, Matthew
Caesar, and Nikita Borisov.
X-vine: Secure and pseudonymous
routing using social networks.
CoRR, abs/1109.0971, 2011.
- Prateek Mittal, Ahmed
Khurshid, Joshua Juen, Matthew Caesar, and
Nikita Borisov.
Stealthy traffic analysis of
low-latency anonymous communication using throughput fingerprinting.
In Proceedings of the 18th ACM Conference on Computer and
Communications Security, CCS 2011, Chicago, Illinois, USA, October 17-21,
2011, pages 215–226, 2011.
(doi:10.1145/2046707.2046732)
- Prateek Mittal, Ahmed
Khurshid, Joshua Juen, Matthew Caesar, and
Nikita Borisov.
Stealthy traffic analysis of
low-latency anonymous communication using throughput fingerprinting.
CoRR, abs/1109.0597, 2011.
- Prateek Mittal, Femi G.
Olumofin, Carmela Troncoso, Nikita Borisov,
and Ian Goldberg.
Pir-tor:
Scalable anonymous communication using private information retrieval.
In 20th USENIX Security Symposium, San Francisco, CA, USA, August 8-12,
2011, Proceedings, 2011.
- Marti Motoyama, Damon McCoy,
Kirill Levchenko, Stefan Savage, and
Geoffrey M. Voelker.
An analysis of underground
forums.
In Proceedings of the 11th ACM SIGCOMM Internet Measurement
Conference, IMC '11, Berlin, Germany, November 2-, 2011, pages
71–80, 2011.
(doi:10.1145/2068816.2068824)
- Marti Motoyama, Damon McCoy,
Kirill Levchenko, Stefan Savage, and
Geoffrey M. Voelker.
Dirty
jobs: The role of freelance labor in web service abuse.
In 20th USENIX Security Symposium, San Francisco, CA, USA, August 8-12,
2011, Proceedings, 2011.
- Shishir Nagaraja, Amir
Houmansadr, Pratch Piyawongwisal, Vijit Singh,
Pragya Agarwal, and Nikita Borisov.
Stegobot: A covert
social network botnet.
In Information Hiding - 13th International Conference, IH 2011, Prague,
Czech Republic, May 18-20, 2011, Revised Selected Papers, pages
299–313, 2011.
(doi:10.1007/978-3-642-24178-9_21)
- Shishir Nagaraja, Amir
Houmansadr, Pratch Piyawongwisal, Vijit Singh,
Pragya Agarwal, and Nikita Borisov.
Stegobot: construction of an
unobservable communication network leveraging social behavior.
CoRR, abs/1107.2031, 2011.
- Shishir Nagaraja, Virajith
Jalaparti, Matthew Caesar, and Nikita Borisov.
P3CA: private anomaly
detection across ISP networks.
In Privacy Enhancing Technologies - 11th International Symposium, PETS
2011, Waterloo, ON, Canada, July 27-29, 2011. Proceedings, pages
38–56, 2011.
(doi:10.1007/978-3-642-22263-4_3)
- Kaustubh Nyalkalkar, Sushant
Sinha, Michael Bailey, and Farnam Jahanian.
A comparative study of
two network-based anomaly detection methods.
In INFOCOM 2011. 30th IEEE International Conference on Computer
Communications, Joint Conference of the IEEE Computer and Communications
Societies, 10-15 April 2011, Shanghai, China, pages 176–180, 2011.
(doi:10.1109/INFCOM.2011.5934975)
- Robin Snader and Nikita
Borisov.
Improving security and
performance in the tor network through tunable path selection.
IEEE Trans. Dependable Sec. Comput., 8(5):728–741, 2011.
(doi:10.1109/TDSC.2010.40)
- Md. Yusuf Sarwar Uddin, Ahmed
Khurshid, Hee Dong Jung, Carl A. Gunter,
Matthew Caesar, and Tarek F. Abdelzaher.
Making dtns robust against spoofing attacks with localized countermeasures.
In SECON, pages 332–340. IEEE, 2011.
- Yunjing Xu, Michael Bailey,
Farnam Jahanian, Kaustubh R. Joshi,
Matti A. Hiltunen, and Richard D. Schlichting.
An exploration of L2 cache
covert channels in virtualized environments.
In Proceedings of the 3rd ACM Cloud Computing Security Workshop, CCSW
2011, Chicago, IL, USA, October 21, 2011, pages 29–40, 2011.
(doi:10.1145/2046660.2046670)
- Jianqing Zhang and Carl A.
Gunter.
Application-aware secure multicast for power grid communications.
IJSN, 6(1):40–52, 2011.
- Wen Zhang, Carl A. Gunter,
David M. Liebovitz, and Jian Tian.
Role prediction using electronic medical record system audits.
In HealthSec. USENIX Association, 2011.
- Narges Bani Asadi,
Christopher W. Fletcher, Greg Gibeling,
John Wawrzynek, Wing H. Wong, and
Garry P. Nolan.
ParaLearn: a massively
parallel, scalable system for learning interaction networks on fpgas.
In Proceedings of the 24th International Conference on Supercomputing,
2010, Tsukuba, Ibaraki, Japan, June 2-4, 2010, pages 83–94, 2010.
(doi:10.1145/1810085.1810100)
- Jeffrey P. Bigham, Chandrika
Jayant, Hanjie Ji, Greg Little,
Andrew Miller, Robert C. Miller,
Robin Miller, Aubrey Tatarowicz,
Brandyn White, Samuel White, and
Tom Yeh.
Vizwiz: nearly real-time
answers to visual questions.
In Proceedings of the 23rd Annual ACM Symposium on User Interface
Software and Technology, New York, NY, USA, October 3-6, 2010, pages
333–342, 2010.
(doi:10.1145/1866029.1866080)
- Jeffrey P. Bigham, Chandrika
Jayant, Hanjie Ji, Greg Little,
Andrew Miller, Robert C. Miller,
Aubrey Tatarowicz, Brandyn White,
Samuel White, and Tom Yeh.
Vizwiz: nearly real-time
answers to visual questions.
In Proceedings of the International Cross-Disciplinary Conference on Web
Accessibility, W4A 2010, Raleigh, NC, USA, April 26 - 27, 2010,
page 24, 2010.
(doi:10.1145/1805986.1806020)
- Jeffrey P. Bigham, Chandrika
Jayant, Andrew Miller, Brandyn White, and
Tom Yeh.
Vizwiz: : Locateit -
enabling blind people to locate objects in their environment.
In IEEE Conference on Computer Vision and Pattern Recognition, CVPR
Workshops 2010, San Francisco, CA, USA, 13-18 June, 2010, pages
65–72, 2010.
(doi:10.1109/CVPRW.2010.5543821)
- Graham Billiau, Chee Fon
Chang, Aditya Ghose, and Andrew Miller.
Support-based
distributed optimisation: An approach to radiotherapy scheduling.
In Electronic Healthcare - Third International Conference, eHealth 2010,
Casablanca, Morocco, December 13-15, 2010, Revised Selected Papers,
pages 327–334, 2010.
(doi:10.1007/978-3-642-23635-8_41)
- Graham Billiau, Chee Fon
Chang, Andrew Miller, and Aditya K. Ghose.
Support-based
distributed optimisation: An approach to radiotherapy patient scheduling.
In Healthgrid Applications and Core Technologies - Proceedings of
HealthGrid 2010, University Paris XI, Orsay, Paris, France, June 28-30,
2010, pages 229–233, 2010.
(doi:10.3233/978-1-60750-583-9-229)
- Rakeshbabu Bobba, Omid
Fatemieh, Fariba Khan, Arindam Khan,
Carl A. Gunter, Himanshu Khurana, and
Manoj Prabhakaran.
Attribute-based messaging: Access control and confidentiality.
ACM Trans. Inf. Syst. Secur., 13(4):31:1–31:35, 2010.
- Nikita Borisov, Marek
Klonowski, Miroslaw Kutylowski, and Anna
Lauks-Dutka.
Attacking and repairing the
improved modonions protocol-tagging approach.
TIIS, 4(3):380–399, 2010.
(doi:10.3837/tiis.2010.06.011)
- Xun Gong, Negar Kiyavash, and
Nikita Borisov.
Fingerprinting websites using
remote traffic analysis.
In Proceedings of the 17th ACM Conference on Computer and
Communications Security, CCS 2010, Chicago, Illinois, USA, October 4-8,
2010, pages 684–686, 2010.
(doi:10.1145/1866307.1866397)
- Carl A. Gunter, David M.
Liebovitz, and Bradley Malin.
EBAM: experience-based access management for healthcare.
In HealthSec. USENIX Association, 2010.
- Kerry Hinge, Aditya Ghose,
and Andrew Miller.
A framework for detecting
interactions between co-incident clinical processes.
IJEHMC, 1(2):24–35, 2010.
(doi:10.4018/jehmc.2010040103)
- Sachin Kadloor, Xun Gong,
Negar Kiyavash, T. Tezcan, and
Nikita Borisov.
Low-cost side channel remote
traffic analysis attack in packet networks.
In Proceedings of IEEE International Conference on Communications,
ICC 2010, Cape Town, South Africa, 23-27 May 2010, pages 1–5, 2010.
(doi:10.1109/ICC.2010.5501972)
- Erin Kenneally, Michael
Bailey, and Douglas Maughan.
A framework for
understanding and applying ethical principles in network and security
research.
In Financial Cryptography and Data Security, FC 2010 Workshops, RLCPS,
WECSR, and WLC 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010,
Revised Selected Papers, pages 240–246, 2010.
(doi:10.1007/978-3-642-14992-4_22)
- Fariba Khan and Carl A.
Gunter.
Tiered incentives for integrity based queuing.
In NetEcon. USENIX Association, 2010.
- Mohammad Maifi Hasan Khan,
Hieu Khac Le, Michael LeMay,
Paria Moinzadeh, Lili Wang, Yong
Yang, Dong Kun Noh, Tarek F. Abdelzaher,
Carl A. Gunter, Jiawei Han, and
Xin Jin.
Diagnostic powertracing for sensor node failure analysis.
In IPSN, pages 117–128. ACM, 2010.
- Ilia A. Lebedev, Shaoyi
Cheng, Austin Doupnik, James C. Martin,
Christopher W. Fletcher, Daniel Burke,
Mingjie Lin, and John Wawrzynek.
MARC: A many-core
approach to reconfigurable computing.
In ReConFig'10: 2010 International Conference on Reconfigurable Computing
and FPGAs, Cancun, Quintana Roo, Mexico, 13-15 December 2010,
Proceedings, pages 7–12, 2010.
(doi:10.1109/ReConFig.2010.49)
- Barry M. Lunt, Joseph J.
Ekstrom, Han Reichgelt, Michael Bailey, and
Richard J. LeBlanc.
IT 2008: the history of a
new computing discipline.
Commun. ACM, 53(12):133–141, 2010.
(doi:10.1145/1859204.1859236)
- Andrew Miller and Joseph
J. LaViola Jr.
Towards a handheld stereo
projector system for viewing and interacting in virtual worlds.
In IEEE Symposium on 3D User Interfaces, 3DUI 2010, Waltham, MA, USA,
20-21 March, 2010, pages 133–134, 2010.
(doi:10.1109/3DUI.2010.5444701)
- Kazuhiro Minami and Nikita
Borisov.
Protecting location privacy
against inference attacks.
In Proceedings of the 17th ACM Conference on Computer and
Communications Security, CCS 2010, Chicago, Illinois, USA, October 4-8,
2010, pages 711–713, 2010.
(doi:10.1145/1866307.1866406)
- Kazuhiro Minami and Nikita
Borisov.
Protecting location privacy
against inference attacks.
In Proceedings of the 2010 ACM Workshop on Privacy in the Electronic
Society, WPES 2010, Chicago, Illinois, USA, October 4, 2010, pages
123–126, 2010.
(doi:10.1145/1866919.1866938)
- Prateek Mittal, Nikita
Borisov, Carmela Troncoso, and Alfredo Rial.
Scalable
anonymous communication with provable security.
In 5th USENIX Workshop on Hot Topics in Security, HotSec'10,
Washington, D.C., USA, August 10, 2010, 2010.
- Marti Motoyama, Kirill
Levchenko, Chris Kanich, Damon McCoy,
Geoffrey M. Voelker, and Stefan Savage.
Re:
Captchas-understanding captcha-solving services in an economic context.
In 19th USENIX Security Symposium, Washington, DC, USA, August 11-13,
2010, Proceedings, pages 435–462, 2010.
- Marti Motoyama, Brendan
Meeder, Kirill Levchenko, Geoffrey M. Voelker,
and Stefan Savage.
Measuring
online service availability using twitter.
In 3rd Workshop on Online Social Networks, WOSN 2010, Boston, MA, USA,
June 22, 2010, 2010.
- Shishir Nagaraja, Prateek
Mittal, Chi-Yao Hong, Matthew Caesar, and
Nikita Borisov.
Botgrep:
Finding P2P bots with structured graph analysis.
In 19th USENIX Security Symposium, Washington, DC, USA, August 11-13,
2010, Proceedings, pages 95–110, 2010.
- Andreas Pitsillidis, Kirill
Levchenko, Christian Kreibich, Chris Kanich,
Geoffrey M. Voelker, Vern Paxson,
Nicholas Weaver, and Stefan Savage.
Botnet judo:
Fighting spam with itself.
In Proceedings of the Network and Distributed System Security Symposium,
NDSS 2010, San Diego, California, USA, 28th February - 3rd March
2010, 2010.
- Jantima Polpinij, Andrew
Miller, Aditya K. Ghose, and Hoa Khanh Dam.
Ontology-based text analysis approach to retrieve oncology documents from
pubmed relevant to cervical cancer in clinical trials.
In Advances in Data Mining. 10th Industrial Conference, ICDM 2010,
Berlin, Germany, July 2010, Workshop Proceedings, pages 157–169,
2010.
- Sushant Sinha, Michael
Bailey, and Farnam Jahanian.
Improving
spam blacklisting through dynamic thresholding and speculative
aggregation.
In Proceedings of the Network and Distributed System Security Symposium,
NDSS 2010, San Diego, California, USA, 28th February - 3rd March
2010, 2010.
- Daniel Turner, Kirill
Levchenko, Alex C. Snoeren, and Stefan Savage.
California fault lines:
understanding the causes and impact of network failures.
In Proceedings of the ACM SIGCOMM 2010 Conference on Applications,
Technologies, Architectures, and Protocols for Computer Communications, New
Delhi, India, August 30 -September 3, 2010, pages 315–326, 2010.
(doi:10.1145/1851182.1851220)
- Qiyan Wang, Prateek Mittal,
and Nikita Borisov.
In search of an anonymous and
secure lookup: attacks on structured peer-to-peer anonymous communication
systems.
In Proceedings of the 17th ACM Conference on Computer and
Communications Security, CCS 2010, Chicago, Illinois, USA, October 4-8,
2010, pages 308–318, 2010.
(doi:10.1145/1866307.1866343)
- Chadwick A. Wingrave, Brian
Williamson, Paul Varcholik, Jeremy Rose,
Andrew Miller, Emiko Charbonneau,
Jared N. Bott, and Joseph J. LaViola Jr.
The wiimote and beyond:
Spatially convenient devices for 3d user interfaces.
IEEE Computer Graphics and Applications, 30(2):71–85, 2010.
(doi:10.1109/MCG.2009.109)
- Eric Wustrow, Manish Karir,
Michael Bailey, Farnam Jahanian, and
Geoff Huston.
Internet background radiation
revisited.
In Proceedings of the 10th ACM SIGCOMM Internet Measurement
Conference, IMC 2010, Melbourne, Australia - November 1-3, 2010,
pages 62–74, 2010.
(doi:10.1145/1879141.1879149)
- Yunjing Xu, Michael Bailey,
Eric Vander Weele, and Farnam Jahanian.
Canvus: Context-aware
network vulnerability scanning.
In Recent Advances in Intrusion Detection, 13th International Symposium,
RAID 2010, Ottawa, Ontario, Canada, September 15-17, 2010.
Proceedings, pages 138–157, 2010.
(doi:10.1007/978-3-642-15512-3_8)
- Musab AlTurki, José
Meseguer, and Carl A. Gunter.
Probabilistic modeling and analysis of dos protection for the ASV protocol.
Electr. Notes Theor. Comput. Sci., 234:3–18, 2009.
- Paul Anderson, Carl A.
Gunter, Charles R. Kalmanek, Sanjai Narain,
Jonathan M. Smith, Rajesh Talpade, and
Geoffrey G. Xie.
Guest editorial network infrastructure configuration.
IEEE Journal on Selected Areas in Communications,
27(3):249–252, 2009.
- Nikita Borisov, Marek
Klonowski, Miroslaw Kutylowski, and Anna
Lauks-Dutka.
Attacking and repairing
the improved modonions protocol.
In Information, Security and Cryptology - ICISC 2009, 12th
International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected
Papers, pages 258–273, 2009.
(doi:10.1007/978-3-642-14423-3_18)
- Chee Fon Chang, Aditya
Ghose, and Andrew Miller.
Mixed-initiative
argumentation: A framework for justification management in clinical group
decision support.
In The Uses of Computational Argumentation, Papers from the 2009 AAAI
Fall Symposium, Arlington, Virginia, USA, November 5-7, 2009,
2009.
- Chee Fon Chang, Andrew
Miller, and Aditya Ghose.
Mixed-initiative
argumentation: Group decision support in medicine.
In Electronic Healthcare - Second International ICST Conference,
eHealth 2009, Istanbul, Turkey, September 23-15, 2009, Revised Selected
Papers, pages 43–50, 2009.
(doi:10.1007/978-3-642-11745-9_8)
- Emiko Charbonneau, Andrew
Miller, Chadwick A. Wingrave, and Joseph
J. LaViola Jr.
Poster: Realdance: An
exploration of 3d spatial interfaces for dancing games.
In IEEE Symposium on 3D User Interfaces, 3DUI 2009, Lafayette, LA, USA,
14-15 March, 2009, pages 141–142, 2009.
(doi:10.1109/3DUI.2009.4811226)
- Alwyn Goodloe and Carl A.
Gunter.
Completeness of discovery protocols.
In SafeConfig, pages 29–36. ACM, 2009.
- Carl A. Gunter.
Security policy implementation strategies for common carrier monitoring service
providers.
In POLICY, pages 114–117. IEEE Computer Society, 2009.
- Elsa L. Gunter, Ayesha
Yasmeen, Carl A. Gunter, and Anh Nguyen.
Specifying and analyzing workflows for automated identification and data
capture.
In HICSS, pages 1–11. IEEE Computer Society, 2009.
- Alejandro Gutierrez, Apeksha
Godiyal, Matt Stockton, Michael LeMay,
Carl A. Gunter, and Roy H. Campbell.
Sh@re: Negotiated audit in social networks.
In SMC, pages 74–79. IEEE, 2009.
- Amir Houmansadr, Negar
Kiyavash, and Nikita Borisov.
Multi-flow attack
resistant watermarks for network flows.
In Proceedings of the IEEE International Conference on Acoustics,
Speech, and Signal Processing, ICASSP 2009, 19-24 April 2009, Taipei,
Taiwan, pages 1497–1500, 2009.
(doi:10.1109/ICASSP.2009.4959879)
- Amir Houmansadr, Negar
Kiyavash, and Nikita Borisov.
RAINBOW:
A robust and invisible non-blind watermark for network flows.
In Proceedings of the Network and Distributed System Security Symposium,
NDSS 2009, San Diego, California, USA, 8th February - 11th February
2009, 2009.
- Chris Kanich, Christian
Kreibich, Kirill Levchenko, Brandon Enright,
Geoffrey M. Voelker, Vern Paxson, and
Stefan Savage.
Spamalytics: an empirical
analysis of spam marketing conversion.
Commun. ACM, 52(9):99–107, 2009.
(doi:10.1145/1562164.1562190)
- Ramana Rao Kompella, Kirill
Levchenko, Alex C. Snoeren, and George
Varghese.
Every microsecond counts:
tracking fine-grain latencies with a lossy difference aggregator.
In Proceedings of the ACM SIGCOMM 2009 Conference on Applications,
Technologies, Architectures, and Protocols for Computer Communications,
Barcelona, Spain, August 16-21, 2009, pages 255–266, 2009.
(doi:10.1145/1592568.1592599)
- Christian Kreibich, Chris
Kanich, Kirill Levchenko, Brandon Enright,
Geoffrey M. Voelker, Vern Paxson, and
Stefan Savage.
Spamcraft:
An inside look at spam campaign orchestration.
In 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats,
LEET '09, Boston, MA, USA, April 21, 2009, 2009.
- Adam J. Lee, Kazuhiro Minami,
and Nikita Borisov.
Confidentiality-preserving
distributed proofs of conjunctive queries.
In Proceedings of the 2009 ACM Symposium on Information, Computer and
Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12,
2009, pages 287–297, 2009.
(doi:10.1145/1533057.1533096)
- Michael LeMay and Carl A.
Gunter.
Cumulative attestation kernels for embedded systems.
In ESORICS, volume 5789 of Lecture Notes in Computer
Science, pages 655–670. Springer, 2009.
- Michael LeMay, Jason J. Haas,
and Carl A. Gunter.
Collaborative recommender systems for building automation.
In HICSS, pages 1–10. IEEE Computer Society, 2009.
- Matthew M. Lucas and Nikita
Borisov.
flybynight: mitigating the
privacy risks of social networking.
In Proceedings of the 5th Symposium on Usable Privacy and Security,
SOUPS 2009, Mountain View, California, USA, July 15-17, 2009, 2009.
(doi:10.1145/1572532.1572577)
- Michael J. May, Carl A.
Gunter, Insup Lee, and Steve Zdancewic.
Strong and weak policy relations.
In POLICY, pages 33–36. IEEE Computer Society, 2009.
- Kazuhiro Minami, Nikita
Borisov, and Carl A. Gunter.
Safety in discretionary
access control for logic-based publish-subscribe systems.
In 14th ACM Symposium on Access Control Models and Technologies,
SACMAT 2009, Stresa, Italy, June 3-5, 2009, Proceedings, pages
3–12, 2009.
(doi:10.1145/1542207.1542211)
- Prateek Mittal and Nikita
Borisov.
Shadowwalker: peer-to-peer
anonymous communication using redundant structured topologies.
In Proceedings of the 2009 ACM Conference on Computer and
Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13,
2009, pages 161–172, 2009.
(doi:10.1145/1653662.1653683)
- Lars E. Olson, Carl A.
Gunter, William R. Cook, and Marianne
Winslett.
Implementing reflective access control in SQL.
In DBSec, volume 5645 of Lecture Notes in Computer
Science, pages 17–32. Springer, 2009.
- Ravinder Shankesi, Musab
AlTurki, Ralf Sasse, Carl A. Gunter, and
José Meseguer.
Model-checking dos amplification for voip session initiation.
In ESORICS, volume 5789 of Lecture Notes in Computer
Science, pages 390–405. Springer, 2009.
- Wook Shin, Carl A. Gunter,
Shinsaku Kiyomoto, Kazuhide Fukushima, and
Toshiaki Tanaka.
How to bootstrap security for ad-hoc network: Revisited.
In SEC, volume 297 of IFIP Advances in Information and
Communication Technology, pages 119–131. Springer, 2009.
- Robin Snader and Nikita
Borisov.
Eigenspeed: secure
peer-to-peer bandwidth evaluation.
In Proceedings of the 8th international conference on Peer-to-peer
systems, IPTPS'09, Boston, MA, USA, April 21, 2009, page 9, 2009.
- Michael Bailey, Timothy
Rostrom, and Joseph J. Ekstrom.
Operating
system power dependencies.
In 34th International Computer Measurement Group Conference, December
7-12, 2008, Las Vegas, Nevada, USA, Proceedings, pages 15–20,
2008.
- Nikita Borisov and Soumyadeb
Mitra.
Restricted queries over
an encrypted index with applications to regulatory compliance.
In Applied Cryptography and Network Security, 6th International
Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008.
Proceedings, pages 373–391, 2008.
(doi:10.1007/978-3-540-68914-0_23)
- Rohit Chadha, Carl A. Gunter,
José Meseguer, Ravinder Shankesi, and
Mahesh Viswanathan.
Modular preservation of safety properties by cookie-based dos-protection
wrappers.
In FMOODS, volume 5051 of Lecture Notes in Computer
Science, pages 39–58. Springer, 2008.
- Ellick Chan, Carl A. Gunter,
Sonia Jahid, Evgeni Peryshkin, and
Daniel Rebolledo.
Using rhythmic nonces for puzzle-based dos resistance.
In CSAW, pages 51–58. ACM, 2008.
- Xu Chen, Jonathon Andersen,
Zhuoqing Morley Mao, Michael Bailey, and
Jose Nazario.
Towards an understanding of
anti-virtualization and anti-debugging behavior in modern malware.
In The 38th Annual IEEE/IFIP International Conference on Dependable
Systems and Networks, DSN 2008, June 24-27, 2008, Anchorage, Alaska, USA,
Proceedings, pages 177–186, 2008.
(doi:10.1109/DSN.2008.4630086)
- Brandon Enright, Geoff
Voelker, Stefan Savage, Chris Kanich, and
Kirill Levchenko.
Storm:
When researchers collide.
;login:, 33(4), 2008.
- Yongpei Guan and Andrew
Miller.
A polynomial time
algorithm for the stochastic uncapacitated lot-sizing problem with
backlogging.
In Integer Programming and Combinatorial Optimization, 13th International
Conference, IPCO 2008, Bertinoro, Italy, May 26-28, 2008,
Proceedings, pages 450–462, 2008.
(doi:10.1007/978-3-540-68891-4_31)
- Chris Kanich, Christian
Kreibich, Kirill Levchenko, Brandon Enright,
Geoffrey M. Voelker, Vern Paxson, and
Stefan Savage.
Spamalytics: an empirical
analysis of spam marketing conversion.
In Proceedings of the 2008 ACM Conference on Computer and
Communications Security, CCS 2008, Alexandria, Virginia, USA, October
27-31, 2008, pages 3–14, 2008.
(doi:10.1145/1455770.1455774)
- Chris Kanich, Kirill
Levchenko, Brandon Enright, Geoffrey M.
Voelker, and Stefan Savage.
The
heisenbot uncertainty problem: Challenges in separating bots from chaff.
In First USENIX Workshop on Large-Scale Exploits and Emergent Threats,
LEET '08, San Francisco, CA, USA, April 15, 2008, Proceedings,
2008.
- Sanjeev Khanna, Santosh S.
Venkatesh, Omid Fatemieh, Fariba Khan, and
Carl A. Gunter.
Adaptive selectiveverification.
In INFOCOM, pages 529–537. IEEE, 2008.
- Negar Kiyavash, Amir
Houmansadr, and Nikita Borisov.
Multi-flow
attacks against network flow watermarking schemes.
In Proceedings of the 17th USENIX Security Symposium, July 28-August 1,
2008, San Jose, CA, USA, pages 307–320, 2008.
- Christian Kreibich, Chris
Kanich, Kirill Levchenko, Brandon Enright,
Geoffrey M. Voelker, Vern Paxson, and
Stefan Savage.
On
the spam campaign trail.
In First USENIX Workshop on Large-Scale Exploits and Emergent Threats,
LEET '08, San Francisco, CA, USA, April 15, 2008, Proceedings,
2008.
- Michael LeMay, Rajesh Nelli,
George Gross, and Carl A. Gunter.
An integrated architecture for demand response communications and control.
In HICSS, page 174. IEEE Computer Society, 2008.
- Kirill Levchenko, Geoffrey M.
Voelker, Ramamohan Paturi, and Stefan Savage.
Xl: an efficient network
routing algorithm.
In Proceedings of the ACM SIGCOMM 2008 Conference on Applications,
Technologies, Architectures, and Protocols for Computer Communications,
Seattle, WA, USA, August 17-22, 2008, pages 15–26, 2008.
(doi:10.1145/1402958.1402962)
- Matthew M. Lucas and Nikita
Borisov.
Flybynight: mitigating the
privacy risks of social networking.
In Proceedings of the 2008 ACM Workshop on Privacy in the Electronic
Society, WPES 2008, Alexandria, VA, USA, October 27, 2008, pages
1–8, 2008.
(doi:10.1145/1456403.1456405)
- Andrew Miller, Mubarak Shah,
and Don Harper.
Landing a UAV on a
runway using image registration.
In 2008 IEEE International Conference on Robotics and Automation,
ICRA 2008, May 19-23, 2008, Pasadena, California, USA, pages
182–187, 2008.
(doi:10.1109/ROBOT.2008.4543206)
- Kazuhiro Minami, Adam J. Lee,
Marianne Winslett, and Nikita Borisov.
Secure aggregation in a
publish-subscribe system.
In Proceedings of the 2008 ACM Workshop on Privacy in the Electronic
Society, WPES 2008, Alexandria, VA, USA, October 27, 2008, pages
95–104, 2008.
(doi:10.1145/1456403.1456419)
- Soumyadeb Mitra, Marianne
Winslett, and Nikita Borisov.
Deleting index entries from
compliance storage.
In EDBT 2008, 11th International Conference on Extending Database
Technology, Nantes, France, March 25-29, 2008, Proceedings, pages
109–120, 2008.
(doi:10.1145/1353343.1353361)
- Prateek Mittal and Nikita
Borisov.
Information leaks in
structured peer-to-peer anonymous communication systems.
In Proceedings of the 2008 ACM Conference on Computer and
Communications Security, CCS 2008, Alexandria, Virginia, USA, October
27-31, 2008, pages 267–278, 2008.
(doi:10.1145/1455770.1455805)
- Lars E. Olson, Carl A.
Gunter, and P. Madhusudan.
A formal framework for reflective database access control policies.
In ACM Conference on Computer and Communications Security, pages
289–298. ACM, 2008.
- Nabil Schear, David R.
Albrecht, and Nikita Borisov.
High-speed matching of
vulnerability signatures.
In Recent Advances in Intrusion Detection, 11th International Symposium,
RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings,
pages 155–174, 2008.
(doi:10.1007/978-3-540-87403-4_9)
- Sushant Sinha, Michael
Bailey, and Farnam Jahanian.
Shades of grey: On the
effectiveness of reputation-based "blacklists".
In 3rd International Conference on Malicious and Unwanted Software,
MALWARE 2008, Alexandria, Virginia, USA, October 7-8, 2008, pages
57–64, 2008.
(doi:10.1109/MALWARE.2008.4690858)
- Robin Snader and Nikita
Borisov.
A
tune-up for tor: Improving security and performance in the tor network.
In Proceedings of the Network and Distributed System Security Symposium,
NDSS 2008, San Diego, California, USA, 10th February - 13th February
2008, 2008.
- Javed Ahmed, Mubarak Shah,
Andrew Miller, Don Harper, and
M. Noman Jafri.
A vision-based
system for a UGV to handle a road intersection.
In Proceedings of the Twenty-Second AAAI Conference on Artificial
Intelligence, July 22-26, 2007, Vancouver, British Columbia, Canada,
pages 1077–1082, 2007.
- Michael Bailey, Jon
Oberheide, Jon Andersen, Zhuoqing Morley Mao,
Farnam Jahanian, and Jose Nazario.
Automated
classification and analysis of internet malware.
In Recent Advances in Intrusion Detection, 10th International Symposium,
RAID 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings,
pages 178–197, 2007.
(doi:10.1007/978-3-540-74320-0_10)
- Nikita Borisov and Kazuhiro
Minami.
Single-bit re-encryption with
applications to distributed proof systems.
In Proceedings of the 2007 ACM Workshop on Privacy in the Electronic
Society, WPES 2007, Alexandria, VA, USA, October 29, 2007, pages
48–55, 2007.
(doi:10.1145/1314333.1314341)
- Nikita Borisov, David
Brumley, Helen J. Wang, John Dunagan,
Pallavi Joshi, and Chuanxiong Guo.
Generic
application-level protocol analyzer and its language.
In Proceedings of the Network and Distributed System Security Symposium,
NDSS 2007, San Diego, California, USA, 28th February - 2nd March
2007, 2007.
- Nikita Borisov, George
Danezis, Prateek Mittal, and Parisa Tabriz.
Denial of service or denial
of security?.
In Proceedings of the 2007 ACM Conference on Computer and
Communications Security, CCS 2007, Alexandria, Virginia, USA, October
28-31, 2007, pages 92–102, 2007.
(doi:10.1145/1315245.1315258)
- Jodie P. Boyer, Ragib Hasan,
Lars E. Olson, Nikita Borisov,
Carl A. Gunter, and David Raila.
Improving multi-tier security
using redundant authentication.
In Proceedings of the 2007 ACM workshop on Computer Security
Architecture, CSAW 2007, Fairfax, VA, USA, November 2, 2007, pages
54–62, 2007.
(doi:10.1145/1314466.1314475)
- Alwyn Goodloe and Carl A.
Gunter.
Reasoning about concurrency for security tunnels.
In CSF, pages 64–78. IEEE Computer Society, 2007.
- Ratul K. Guha, Carl A.
Gunter, and Saswati Sarkar.
Fair coalitions for power-aware routing in wireless networks.
IEEE Trans. Mob. Comput., 6(2):206–220, 2007.
- Michael LeMay and Carl A.
Gunter.
Supporting emergency-response by retasking network infrastructures.
In HotNets. ACM SIGCOMM, 2007.
- Michael LeMay, Omid
Fatemieh, and Carl A. Gunter.
Policymorph: interactive policy transformations for a logical attribute-based
access control framework.
In SACMAT, pages 205–214. ACM, 2007.
- Michael LeMay, George Gross,
Carl A. Gunter, and Sanjam Garg.
Unified architecture for large-scale attested metering.
In HICSS, page 115. IEEE Computer Society, 2007.
- Andrew Miller and Mubarak
Shah.
Foreground segmentation in
surveillance scenes containing a door.
In Proceedings of the 2007 IEEE International Conference on Multimedia
and Expo, ICME 2007, July 2-5, 2007, Beijing, China, pages
1822–1825, 2007.
(doi:10.1109/ICME.2007.4285027)
- Andrew Miller, Pavel
Babenko, Min Hu, and Mubarak Shah.
Person tracking in
UAV video.
In Multimodal Technologies for Perception of Humans, International
Evaluation Workshops CLEAR 2007 and RT 2007, Baltimore, MD, USA, May
8-11, 2007, Revised Selected Papers, pages 215–220, 2007.
(doi:10.1007/978-3-540-68585-2_19)
- Andrew Miller, Arslan
Basharat, Brandyn White, Jingen Liu, and
Mubarak Shah.
Person and vehicle
tracking in surveillance video.
In Multimodal Technologies for Perception of Humans, International
Evaluation Workshops CLEAR 2007 and RT 2007, Baltimore, MD, USA, May
8-11, 2007, Revised Selected Papers, pages 174–178, 2007.
(doi:10.1007/978-3-540-68585-2_14)
- Frank Schwartzenburg, William
Oates, Jennifer Park, Donald Johnson,
Marcy Stutzman, Michael Bailey, and
Simone Youngblood.
Verification, validation,
and accreditation (vv&a): one voice — unified, common &
cross-cutting.
In Proceedings of the 2007 Summer Computer Simulation Conference, SCSC
2007, San Diego, California, USA, July 16-19, 2007, pages 429–436,
2007.
- Sushant Sinha, Michael
Bailey, and Farnam Jahanian.
Shedding
light on the configuration of dark addresses.
In Proceedings of the Network and Distributed System Security Symposium,
NDSS 2007, San Diego, California, USA, 28th February - 2nd March
2007, 2007.
- Charles C. Zhang, Marianne
Winslett, and Carl A. Gunter.
On the safety and efficiency of firewall policy deployment.
In IEEE Symposium on Security and Privacy, pages 33–50. IEEE
Computer Society, 2007.
- Raja Afandi, Jianqing Zhang,
and Carl A. Gunter.
Ampol-q: Adaptive middleware policy to support qos.
In ICSOC, volume 4294 of Lecture Notes in Computer
Science, pages 165–178. Springer, 2006.
- Raja Afandi, Jianqing Zhang,
Munawar Hafiz, and Carl A. Gunter.
Ampol: Adaptive messaging policy.
In ECOWS, pages 53–64. IEEE Computer Society, 2006.
- Rakeshbabu Bobba, Omid
Fatemieh, Fariba Khan, Carl A. Gunter, and
Himanshu Khurana.
Using attribute-based access control to enable attribute-based messaging.
In ACSAC, pages 403–413. IEEE Computer Society, 2006.
- Nikita Borisov.
Computational puzzles as sybil
defenses.
In Sixth IEEE International Conference on Peer-to-Peer Computing (P2P
2006), 2-4 October 2006, Cambridge, United Kingdom, pages 171–176,
2006.
(doi:10.1109/P2P.2006.10)
- Jodie P. Boyer, Kaijun Tan,
and Carl A. Gunter.
Privacy sensitive location information systems in smart buildings.
In SPC, volume 3934 of Lecture Notes in Computer
Science, pages 149–164. Springer, 2006.
- Evan Cooke, Michael Bailey,
Farnam Jahanian, and Richard Mortier.
The dark oracle:
Perspective-aware unused and unreachable address discovery.
In 3rd Symposium on Networked Systems Design and Implementation (NSDI
2006), May 8-10, 2007, San Jose, California, USA, Proceedings.,
2006.
- Adam J. Lee, Jodie P. Boyer,
Lars E. Olson, and Carl A. Gunter.
Defeasible security policy composition for web services.
In FMSE, pages 45–54. ACM, 2006.
- Adam J. Lee, Parisa Tabriz,
and Nikita Borisov.
A privacy-preserving
interdomain audit framework.
In Proceedings of the 2006 ACM Workshop on Privacy in the Electronic
Society, WPES 2006, Alexandria, VA, USA, October 30, 2006, pages
99–108, 2006.
(doi:10.1145/1179601.1179620)
- Justin Ma, Kirill Levchenko,
Christian Kreibich, Stefan Savage, and
Geoffrey M. Voelker.
Unexpected means of protocol
inference.
In Proceedings of the 6th ACM SIGCOMM Internet Measurement
Conference, IMC 2006, Rio de Janeriro, Brazil, October 25-27, 2006,
pages 313–326, 2006.
(doi:10.1145/1177080.1177123)
- Michael J. May, Carl A.
Gunter, and Insup Lee.
Privacy apis: Access control techniques to analyze and verify legal privacy
policies.
In CSFW, pages 85–97. IEEE Computer Society, 2006.
- Michael J. May, Wook Shin,
Carl A. Gunter, and Insup Lee.
Securing the drop-box architecture for assisted living.
In FMSE, pages 1–12. ACM, 2006.
- Andrew Miller.
Cellml media type.
RFC, 4708:1–7, 2006.
(doi:10.17487/RFC4708)
- Parisa Tabriz and Nikita
Borisov.
Breaking the collusion detection
mechanism of morphmix.
In Privacy Enhancing Technologies, 6th International Workshop, PET
2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers, pages
368–383, 2006.
(doi:10.1007/11957454_21)
- Qixin Wang, Wook Shin,
Xue Liu, Zheng Zeng, Cham Oh,
Bedoor K. AlShebli, Marco Caccamo,
Carl A. Gunter, Elsa L. Gunter,
Jennifer C. Hou, Karrie Karahalios, and
Lui Sha.
I-living: An open system architecture for assisted living.
In SMC, pages 4268–4275. IEEE, 2006.
- Yun Zhai, Phillip Berkowitz,
Andrew Miller, Khurram Shafique,
Aniket A. Vartak, Brandyn White, and
Mubarak Shah.
Multiple vehicle
tracking in surveillance videos.
In Multimodal Technologies for Perception of Humans, First International
Evaluation Workshop on Classification of Events, Activities and
Relationships, CLEAR 2006, Southampton, UK, April 6-7, 2006, Revised
Selected Papers, pages 200–208, 2006.
(doi:10.1007/978-3-540-69568-4_16)
- Jianqing Zhang, Nikita
Borisov, and William Yurcik.
Outsourcing security
analysis with anonymized logs.
In Second International Conference on Security and Privacy in
Communication Networks and the Workshops, SecureComm 2006, Baltimore, MD,
USA, August 2, 2006 - September 1, 2006, pages 1–9, 2006.
(doi:10.1109/SECCOMW.2006.359577)
- Michael Bailey, Evan Cooke,
Farnam Jahanian, and Jose Nazario.
The
internet motion sensor - A distributed blackhole monitoring system.
In Proceedings of the Network and Distributed System Security Symposium,
NDSS 2005, San Diego, California, USA, 2005.
- Michael Bailey, Evan Cooke,
Farnam Jahanian, Niels Provos,
Karl Rosaen, and David Watson.
Data reduction
for the scalable automated analysis of distributed darknet traffic.
In Proceedings of the 5th Internet Measurement Conference, IMC 2005,
Berkeley, California, USA, October 19-21, 2005, pages 239–252,
2005.
- Michael Bailey, Evan Cooke,
Farnam Jahanian, David Watson, and
Jose Nazario.
The blaster worm: Then and
now.
IEEE Security & Privacy, 3(4):26–31, 2005.
(doi:10.1109/MSP.2005.106)
- Karthikeyan Bhargavan and
Carl A. Gunter.
Network event recognition.
Formal Methods in System Design, 27(3):213–251, 2005.
- Nikita Borisov.
An analysis of parallel mixing
with attacker-controlled inputs.
In Privacy Enhancing Technologies, 5th International Workshop, PET
2005, Cavtat, Croatia, May 30-June 1, 2005, Revised Selected Papers,
pages 12–25, 2005.
(doi:10.1007/11767831_2)
- Nikita Borisov and Robert
Johnson.
Fixing
races for fun and profit: How to abuse atime.
In Proceedings of the 14th USENIX Security Symposium, Baltimore, MD,
USA, July 31 - August 5, 2005, 2005.
- A. Robert Calderbank, Anna C.
Gilbert, Kirill Levchenko, S. Muthukrishnan,
and Martin Strauss.
Improved
range-summable random variable construction algorithms.
In Proceedings of the Sixteenth Annual ACM-SIAM Symposium on Discrete
Algorithms, SODA 2005, Vancouver, British Columbia, Canada, January 23-25,
2005, pages 840–849, 2005.
- Alwyn Goodloe, Carl A.
Gunter, and Mark-Oliver Stehr.
Formal prototyping in early stages of protocol design.
In WITS, pages 67–80. ACM, 2005.
- Qiang Huang, Helen J. Wang,
and Nikita Borisov.
Privacy-preserving
friends troubleshooting network.
In Proceedings of the Network and Distributed System Security Symposium,
NDSS 2005, San Diego, California, USA, 2005.
- Kevin D. Lux, Michael J. May,
Nayan L. Bhattad, and Carl A. Gunter.
Wsemail: Secure internet messaging based on web services.
In ICWS, pages 75–82. IEEE Computer Society, 2005.
- Nikita Borisov.
Challenges in wireless
security.
In Mobile Computing Handbook. 2004.
(doi:10.1201/9780203504086.ch38)
- Nikita Borisov, Ian Goldberg,
and Eric A. Brewer.
Off-the-record communication,
or, why not to use PGP.
In Proceedings of the 2004 ACM Workshop on Privacy in the Electronic
Society, WPES 2004, Washington, DC, USA, October 28, 2004, pages
77–84, 2004.
(doi:10.1145/1029179.1029200)
- Evan Cooke, Michael Bailey,
Zhuoqing Morley Mao, David Watson,
Farnam Jahanian, and Danny McPherson.
Toward understanding
distributed blackhole placement.
In Proceedings of the 2004 ACM Workshop on Rapid Malcode, WORM 2004,
Washington, DC, USA, October 29, 2004, pages 54–64, 2004.
(doi:10.1145/1029618.1029627)
- Carl A. Gunter, Sanjeev
Khanna, Kaijun Tan, and Santosh S. Venkatesh.
Dos protection for reliably authenticated broadcast.
In NDSS. The Internet Society, 2004.
- Carl A. Gunter, Michael J.
May, and Stuart G. Stubblebine.
A formal privacy system and its application to location based services.
In Privacy Enhancing Technologies, volume 3424 of Lecture
Notes in Computer Science, pages 256–282. Springer, 2004.
- Charles Higby and Michael
Bailey.
Wireless security patch
management system.
In Proceedings of the 5th Conference on Information Technology Education,
SIGITE 2004, 2004, Salt Lake City, UT, USA, October 28-30, 2004,
pages 165–168, 2004.
(doi:10.1145/1029533.1029575)
- Kirill Levchenko, Ramamohan
Paturi, and George Varghese.
On the difficulty of scalably
detecting network attacks.
In Proceedings of the 11th ACM Conference on Computer and
Communications Security, CCS 2004, Washington, DC, USA, October 25-29,
2004, pages 12–20, 2004.
(doi:10.1145/1030083.1030087)
- Michael McDougall, Rajeev
Alur, and Carl A. Gunter.
A model-based approach to integrating security policies for embedded devices.
In EMSOFT, pages 211–219. ACM, 2004.
- Lynne E. Parker, Balajee
Kannan, Fang Tang, and Michael Bailey.
Tightly-coupled navigation
assistance in heterogeneous multi-robot teams.
In 2004 IEEE/RSJ International Conference on Intelligent Robots and
Systems, Sendai, Japan, September 28 - October 2, 2004, pages
1016–1022, 2004.
(doi:10.1109/IROS.2004.1389486)
- Kaijun Tan, Jason Crampton,
and Carl A. Gunter.
The consistency of task-based authorization constraints in workflow systems.
In CSFW, page 155. IEEE Computer Society, 2004.
- Carl A. Gunter.
Open apis for embedded security.
In ECOOP, volume 2743 of Lecture Notes in Computer
Science, pages 225–247. Springer, 2003.
- Pankaj Kakkar, Carl A.
Gunter, and Martın Abadi.
Reasoning about secrecy for active networks.
Journal of Computer Security, 11(2):245–287, 2003.
- Karthikeyan Bhargavan and
Carl A. Gunter.
Requirements for a practical network event recognition language.
Electr. Notes Theor. Comput. Sci., 70(4):1–20, 2002.
- Karthikeyan Bhargavan,
Carl A. Gunter, Moonjoo Kim,
Insup Lee, Davor Obradovic, Oleg
Sokolsky, and Mahesh Viswanathan.
Verisim: Formal analysis of network simulations.
IEEE Trans. Software Eng., 28(2):129–145, 2002.
- Karthikeyan Bhargavan, Davor
Obradovic, and Carl A. Gunter.
Formal verification of standards for distance vector routing protocols.
J. ACM, 49(4):538–576, 2002.
- Nikita Borisov and Eric A.
Brewer.
Active
certificates: A framework for delegation.
In Proceedings of the Network and Distributed System Security Symposium,
NDSS 2002, San Diego, California, USA, 2002.
- Nikita Borisov, Monica Chew,
Robert Johnson, and David A. Wagner.
Multiplicative
differentials.
In Fast Software Encryption, 9th International Workshop, FSE 2002,
Leuven, Belgium, February 4-6, 2002, Revised Papers, pages 17–33,
2002.
(doi:10.1007/3-540-45661-9_2)
- Alwyn Goodloe, Michael
McDougall, Carl A. Gunter, and Rajeev Alur.
Predictable programs in barcodes.
In CASES, pages 298–303. ACM, 2002.
- Carl A. Gunter.
Micro mobile programs.
In IFIP TCS, volume 223 of IFIP Conference
Proceedings, pages 356–369. Kluwer, 2002.
- J. Robert von Behren, Eric A.
Brewer, Nikita Borisov, Michael Chen,
Matt Welsh, Josh MacDonald,
Jeremy Lau, and David E. Culler.
Ninja:
A framework for network services.
In Proceedings of the General Track: 2002 USENIX Annual Technical
Conference, June 10-15, 2002, Monterey, California, USA, pages
87–102, 2002.
- Karthikeyan Bhargavan, Satish
Chandra, Peter J. McCann, and Carl A. Gunter.
What packets may come: automata for network monitoring.
In POPL, pages 206–219. ACM, 2001.
- Nikita Borisov, Ian Goldberg,
and David A. Wagner.
Intercepting mobile
communications: the insecurity of 802.11.
In MOBICOM 2001, Proceedings of the seventh annual international
conference on Mobile computing and networking, Rome, Italy, July 16-21,
2001., pages 180–189, 2001.
(doi:10.1145/381677.381695)
- Steven D. Gribble, Matt
Welsh, J. Robert von Behren, Eric A. Brewer,
David E. Culler, Nikita Borisov,
Steven E. Czerwinski, Ramakrishna Gummadi,
Jon R. Hill, Anthony D. Joseph,
Randy H. Katz, Zhuoqing Morley Mao,
Steven J. Ross, and Ben Y. Zhao.
The ninja architecture
for robust internet-scale systems and services.
Computer Networks, 35(4):473–497, 2001.
(doi:10.1016/S1389-1286(00)00179-1)
- Carl A. Gunter, Stephen
Weeks, and Andrew K. Wright.
Models and languages for digital rights.
In HICSS. IEEE Computer Society, 2001.
- Karthikeyan Bhargavan,
Carl A. Gunter, Moonjoo Kim,
Insup Lee, Davor Obradovic, Oleg
Sokolsky, and Mahesh Viswanathan.
Verisim: Formal analysis of network simulations.
In ISSTA, pages 2–13. ACM, 2000.
- Karthikeyan Bhargavan,
Carl A. Gunter, and Davor Obradovic.
Fault origin adjudication.
In FMSP, pages 61–71. ACM, 2000.
- Karthikeyan Bhargavan,
Carl A. Gunter, and Davor Obradovic.
Routing information protocol in HOL/SPIN.
In TPHOLs, volume 1869 of Lecture Notes in Computer
Science, pages 53–72. Springer, 2000.
- Carl A. Gunter.
Abstracting dependencies between software configuration items.
ACM Trans. Softw. Eng. Methodol., 9(1):94–131, 2000.
- Carl A. Gunter.
Automated analysis of standard ML.
ACM SIGSOFT Software Engineering Notes, 25(1):53, 2000.
- Carl A. Gunter and Trevor
Jim.
Generalized certificate revocation.
In POPL, pages 316–329. ACM, 2000.
- Carl A. Gunter and Trevor
Jim.
Policy-directed certificate retrieval.
Softw., Pract. Exper., 30(15):1609–1640, 2000.
- Carl A. Gunter, Elsa L.
Gunter, Michael Jackson, and Pamela Zave.
A reference model for requirements and specifications.
IEEE Software, 17(3):37–43, 2000.
- Carl A. Gunter, Elsa L.
Gunter, Michael Jackson, and Pamela Zave.
A reference model for requirements and specifications-extended abstract.
In ICRE, page 189. IEEE Computer Society, 2000.
- Carl A. Gunter, Elsa L.
Gunter, and Pamela Zave.
Formal software engineering.
ACM SIGSOFT Software Engineering Notes, 25(1):54, 2000.
- Pankaj Kakkar, Carl A.
Gunter, and Martın Abadi.
Reasoning about secrecy for active networks.
In CSFW, pages 118–129. IEEE Computer Society, 2000.
- Pankaj Kakkar, Michael
McDougall, Carl A. Gunter, and Trevor Jim.
Certificate distribution with local autonomy.
In IWAN, volume 1942 of Lecture Notes in Computer
Science, pages 277–295. Springer, 2000.
- Bow-Yaw Wang, José
Meseguer, and Carl A. Gunter.
Specification and formal analysis of a PLAN algorithm in maude.
In ICDCS Workshop on Distributed System Validation and
Verification, pages E49–E56, 2000.
- Michael W. Hicks, Jonathan T.
Moore, D. Scott Alexander, Carl A. Gunter, and
Scott Nettles.
Planet: An active internetwork.
In INFOCOM, pages 1124–1133. IEEE, 1999.
- Pankaj Kakkar, Michael W.
Hicks, Jonathan T. Moore, and Carl A. Gunter.
Specifying the PLAN network programming langauge.
Electr. Notes Theor. Comput. Sci., 26:87–104, 1999.
- Karthikeyan Bhargavan, Carl A.
Gunter, Elsa L. Gunter, Michael Jackson,
Davor Obradovic, and Pamela Zave.
The village telephone system: A case study in formal software engineering.
In TPHOLs, volume 1479 of Lecture Notes in Computer
Science, pages 49–66. Springer, 1998.
- Michael W. Hicks, Pankaj
Kakkar, Jonathan T. Moore, Carl A. Gunter, and
Scott Nettles.
Network programming using PLAN.
In ICCL Workshop: Internet Programming Languages, volume 1686 of
Lecture Notes in Computer Science, pages 127–143. Springer,
1998.
- Michael W. Hicks, Pankaj
Kakkar, Jonathan T. Moore, Carl A. Gunter, and
Scott Nettles.
PLAN: A packet language for active networks.
In ICFP, pages 86–93. ACM, 1998.
- Carl A. Gunter, Teow-Hin
Ngair, and Devika Subramanian.
The common order-theoretic structure of version spaces and atmss.
Artif. Intell., 95(2):357–407, 1997.
- Jawahar Chirimar, Carl A.
Gunter, and Jon G. Riecke.
Reference counting as a computational interpretation of linear logic.
J. Funct. Program., 6(2):195–244, 1996.
- Carl A. Gunter.
Abstracting dependencies between software configuration items.
In SIGSOFT FSE, pages 167–178. ACM, 1996.
- Carl A. Gunter, John C.
Mitchell, and David Notkin.
Strategic directions in software engineering and programming languages.
ACM Comput. Surv., 28(4):727–737, 1996.
- Carl A. Gunter, Teow-Hin
Ngair, and Devika Subramanian.
Sets as anti-chains.
In ASIAN, volume 1179 of Lecture Notes in Computer
Science, pages 116–128. Springer, 1996.
- Carl A. Gunter, Didier
Rémy, and Jon G. Riecke.
A generalization of exceptions and control in ml-like languages.
In FPCA, pages 12–23. ACM, 1995.
- Carl A. Gunter.
Forms of semantic specification.
In Current Trends in Theoretical Computer Science, volume 40 of
World Scientific Series in Computer Science, pages 332–353.
World Scientific, 1993.
- Carl A. Gunter, Elsa L.
Gunter, and David B. MacQueen.
Computing ML equality kinds using abstract interpretation.
Inf. Comput., 107(2):303–323, 1993.
- Edward E. Hodgkin, Andrew
Miller, and Mark Whittaker.
A monte carlo pharmacophore
generation procedure: Application to the human PAF receptor.
Journal of Computer-Aided Molecular Design, 7(5):515–534, 1993.
(doi:10.1007/BF00124360)
- Jawahar Chirimar, Carl A.
Gunter, and Myra Van Inwegen.
Xpnet: A graphical interface to proof nets with an efficient proof checker.
In CADE, volume 607 of Lecture Notes in Computer
Science, pages 711–715. Springer, 1992.
- Jawahar Chirimar, Carl A.
Gunter, and Jon G. Riecke.
Proving memory management invariants for a language based on linear logic.
In LISP and Functional Programming, pages 139–150, 1992.
- Carl A. Gunter.
The mixed powerdomain.
Theor. Comput. Sci., 103(2):311–334, 1992.
- Carl A. Gunter.
Forms of semantic specification.
Bulletin of the EATCS, 45:98–113, 1991.
- Carl A. Gunter, Elsa L.
Gunter, and David B. MacQueen.
An abstract interpretation for ML equality kinds.
In TACS, volume 526 of Lecture Notes in Computer
Science, pages 112–130. Springer, 1991.
- Carl A. Gunter, Teow-Hin
Ngair, Prakash Panangaden, and Devika
Subramanian.
The common order-theoretic structure of version spaces and atms's.
In AAAI, pages 500–505. AAAI Press / The MIT Press,
1991.
- Val Tannen, Thierry Coquand,
Carl A. Gunter, and Andre Scedrov.
Inheritance as implicit coercion.
Inf. Comput., 93(1):172–221, 1991.
- Vijay Gehlot and Carl A.
Gunter.
Normal process representatives.
In LICS, pages 200–207. IEEE Computer Society, 1990.
- Carl A. Gunter.
Relating total and partial correctness interpretations of non-deterministic
programs.
In POPL, pages 306–319. ACM Press, 1990.
- Carl A. Gunter and Dana S.
Scott.
Semantic domains.
In Handbook of Theoretical Computer Science, Volume B: Formal Models
and Sematics (B), pages 633–674. 1990.
- Val Tannen, Carl A. Gunter,
and Andre Scedrov.
Computing with coercions.
In LISP and Functional Programming, pages 44–60, 1990.
- Thierry Coquand, Carl A.
Gunter, and Glynn Winskel.
Domain theoretic models of polymorphism.
Inf. Comput., 81(2):123–167, 1989.
- Val Tannen, Thierry Coquand,
Carl A. Gunter, and Andre Scedrov.
Inheritance and explicit coercion (preliminary report).
In LICS, pages 112–129. IEEE Computer Society, 1989.
- Carl A. Gunter and Achim
Jung.
Coherence and consistency in domains (extended outline).
In LICS, pages 309–317. IEEE Computer Society, 1988.
- Thierry Coquand, Carl A.
Gunter, and Glynn Winskel.
Di-domains as a model of polymorphism.
In MFPS, volume 298 of Lecture Notes in Computer
Science, pages 344–363. Springer, 1987.
- Carl A. Gunter.
Universal profinite domains.
Inf. Comput., 72(1):1–30, 1987.
- Carl A. Gunter.
The largest first-order-axiomatizable cartesian closed category of domains.
In LICS, pages 142–148. IEEE Computer Society, 1986.
- Carl A. Gunter.
Comparing categories of domains.
In Mathematical Foundations of Programming Semantics, volume 239
of Lecture Notes in Computer Science, pages 101–121. Springer,
1985.
- Carl A. Gunter.
A universal domain technique for profinite posets.
In ICALP, volume 194 of Lecture Notes in Computer
Science, pages 232–243. Springer, 1985.