Security and Privacy       

links

Security and Privacy Publications



2019

Detecting Backdoor Attacks on Deep Neural Networks by Activation Clustering (Best paper award)
Bryant Chen, Wilka Carvalho, Nathalie Baracaldo, Heiko Ludwig, Benjamin Edwards, Taesung Lee, Ian Molloy and Biplav Srivastava
AAAI Collocated: The AAAI's Workshop on Artificial Intelligence Safety (SafeAI), 2019

Fair Transfer Learning with Missing Protected Attributes
A. Coston, K. Ramamurthy, D. Wei, K. Varshney, S. Speakman, Z. Mustahsan, S. Chakraborty
ACM Artificial Intelligence Ethics and Society (AIES), 2019


2018

On Composable Security for Digital Signatures
Christian Badertscher, Ueli Maurer, Bjoern Tackmann
Public Key Cryptography, pp. 494-523, Springer, 2018

Stateful Multi-Client Verifiable Computation
Christian Cachin, Esha Ghosh, Dimitrios Papadopoulos, Bjoern Tackmann
Applied Cryptography and Network Security, Springer, 2018

Toward an Algebraic Theory of Systems
Christian Matt, Ueli Maurer, Christopher Portmann, Renato Renner, Bjoern Tackmann
Theoretical Computer Science, Elsevier, 2018

Secure Opportunistic Multipath Key Exchange
Sergiu Costea, Marios Choudary, Dana Gucea, Bjoern Tackmann, Costin Raiciu
ACM Conference on Computer and Communications Security, ACM Press, 2018

CRYSTALS-Dilithium: A Lattice-Based Digital Signature Scheme
Leo Ducas, Eike Kiltz, Tancrede Lepoint, Vadim Lyubashevsky, Peter Schwabe, Gregor Seiler, Damien Stehle
CHES 2018(1), 238--268



CRYSTALS-Kyber: a CCA-Secure Module-Lattice-Based KEM
Joppe W. Bos, Leo Ducas, Eike Kiltz, Tancrede Lepoint, Vadim Lyubashevsky, John M. Schanck, Peter Schwabe, Gregor Seiler, Damien Stehle
Euro S&P, 2018

Sub-Linear Lattice-Based Zero-Knowledge Arguments for Arithmetic Circuits
Carsten Baum, Jonathan Bootle, Andrea Cerulli, Rafael del Pino, Jens Groth, Vadim Lyubashevsky
Crypto, 2018

More Efficient Commitments from Structured Lattice Assumptions
Carsten Baum, Ivan Damgard, Vadim Lyubashevsky, Sabine Oechsner, Chris Peikert
SCN, 2018

Asymptotically Efficient Lattice-Based Digital Signatures
Vadim Lyubashevsky, Daniele Micciancio
J. Cryptology 31(3), 774--797, 2018


Updatable Encryption with Post-Compromise Security
Anja Lehmann, Bjoern Tackmann
Advances in Cryptology - EUROCRYPT, Springer, 2018

The Wonderful World of Global Random Oracles
Jan Camenisch, Manu Drijvers, Tommaso Gagliardoni, Anja Lehmann, Gregory Neven
Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part I, pp. 280--312

Collusion-Resistant Processing of SQL Range Predicates
Manish Kesarwani, Akshar Kaul, Gagandeep Singh, Prasad M. Deshpande, Jayant R. Haritsa
Data Science and Engineering 3(4), 323--340, 2018

Efficient Secure k-Nearest Neighbours over Encrypted Data
Manish Kesarwani, Akshar Kaul, Prasad Naldurg, Sikhar Patranabis, Gagandeep Singh, Sameep Mehta, Debdeep Mukhopadhyay
Proceedings of the 21th International Conference on Extending Database Technology, EDBT 2018, Vienna, Austria, March 26-29, 2018., pp. 564--575

Collusion-Resistant Processing of SQL Range Predicates
Manish Kesarwani, Akshar Kaul, Gagandeep Singh, Prasad M. Deshpande, Jayant R. Haritsa
Database Systems for Advanced Applications - 23rd International Conference, DASFAA 2018, Gold Coast, QLD, Australia, May 21-24, 2018, Proceedings, Part II, pp. 211--227

Protecting Intellectual Property of Deep Neural Networks with Watermarking
Jialong Zhang, Zhongshu Gu, Jiyong Jang, Hui Wu, Marc Ph. Stoecklin, Heqing Huang, Ian Molloy
Proceedings of the ACM Asia Conference on Computer and Communications Security (AsiaCCS), 2018

Dressed Up: Baiting Attackers through Endpoint Service Projection
Marc Ph. Stoecklin, Jialong Zhang, Frederico Araujo and Teryl Taylor
SDN-NFV Security '18: Proceedings of the ACM Workshop on Security in Software Defined Networks & Network Function Virtualization (in conjunction with CODASPY '18), 2018

Hidden in Plain Sight: Filesystem View Separation for Data Integrity and Deception
Teryl Taylor, Frederico Araujo, Anne Kohlbrenner, Marc Ph. Stoecklin
Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), 2018

Cross-Stack Threat Sensing for Cyber Security and Resilience
Frederico Araujo, Teryl Taylor, Jialong Zhang, Marc Ph. Stoecklin
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2018

Error-Sensor: Mining Information from HTTP Error Traffic for Malware Intelligence
Jialong Zhang, Jiyong Jang, Guofei Gu, Marc Ph. Stoecklin, and Xin Hu
Proceedings of the International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2018

DeepLocker - Concealing Targeted Attacks with AI Locksmithing
Dhilung Kirat, Jiyong Jang, and Marc Ph. Stoecklin
Black Hat USA, 2018

Threat Intelligence Computing
Xiaokui Shu, Frederico Araujo, Douglas L. Schales, Marc Ph. Stoecklin, Jiyong Jang, Heqing Huang, Josyula R. Rao
Proceedings of the 2018 ACM Conference on Computer and Communications Security (CCS), pp. 1883--1898, ACM

Model Extraction Warning in MLaaS Paradigm
Manish Kesarwani, Bhaskar Mukhoty, Vijay Arya, Sameep Mehta
Proceedings of the 34th Annual Conference on Computer Security Applications, ACSAC 2018, San Juan, Puerto Rico, USA, December 3 7, ACM


2017

Per-Session Security: Password-Based Cryptography Revisited
Gregory Demay, Peter Gazi, Ueli Maurer, Bjoern Tackmann
ESORICS, Springer, 2017

Secure Event Tickets on a Blockchain
Bjoern Tackmann
Data Privacy Management, Cryptocurrencies and Blockchain Technology, Springer, 2017

Moderately Hard Functions: Definitions, Instantiations, and Applications
Joel Alwen, Bjoern Tackmann
Theory of Cryptography, Springer, 2017


Amortization with Fewer Equations for Proving Knowledge of Small Secrets
Rafael del Pino, Vadim Lyubashevsky
Crypto, 2017

Practical Quantum-Safe Voting from Lattices
Rafael del Pino, Vadim Lyubashevsky, Gregory Neven, Gregor Seiler
CCS, 2017

Updatable Tokenization: Formal Definitions and Provably Secure Constructions
C Cachin, J Camenisch, E Freire-Stoegbuchner, A Lehmann
Financial Crypto, 2017
Abstract

Privacy-Preserving User-Auditable Pseudonym Systems
J Camenisch, A Lehmann
IEEE EuroS&P - European Symposium on Security and Privacy, 2017
Abstract

One TPM to Bind Them All: Fixing TPM2.0 for Provably Secure Anonymous Attestation
Jan Camenisch, Liqun Chen, Manu Drijvers, Anja Lehmann, David Novick, Rainer Urian
IEEE S&P, 2017
Abstract

UC-Secure Non-Interactive Public-Key Encryption
Jan Camenisch, Anja Lehmann, Gregory Neven, Kai Samelin
IEEE CSF - Computer Security Foundations Symposium, , IEEE, 2017
Abstract

Anonymous Attestation with Subverted TPMs
Jan Camenisch, Manu Drijvers, Anja Lehmann
Advances in Cryptography - CRYPTO 2017, Springer
Abstract

Android Malware Clustering through Malicious Payload Mining
Yuping Li, Jiyong Jang, Xin Hu, and Xinming Ou
Proceedings of the International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2017

POSTER: Hidden in Plain Sight: A Filesystem for Data Integrity and Confidentiality
Anne Kohlbrenner, Frederico Araujo, Teryl Taylor, Marc Ph. Stoecklin
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 2523--2525, ACM

Unsupervised Deep Embedding for Novel Class Detection over Data Stream
Ahmad M. Mustafa, Gbadebo Ayoade, Khaled Al-Naami, Latifur Khan, Kevin W. Hamlen, Bhavani Thuraisingham, Frederico Araujo
IEEE International Conference on Big Data, 2017

Anomaly Detection as a Service: Challenges, Advances, and Opportunities
Danfeng (Daphne) Yao, Xiaokui Shu, Long Cheng, Salvatore J. Stolfo
Synthesis Lectures on Information Security, Privacy, and Trust 9(3), 1--173, 2017

Precisely and Scalably Vetting JavaScript Bridge In Android Hybrid Apps
Guangliang Yang, Abner Mendoza, Jialong Zhang, Guofei Gu
Proceedings of the International Symposium on Research on Attacks, Intrusions and Defenses (RAID), 2017

Attacking the Brain: Races in the SDN Control Plane
Lei Xu, Jeff Huang, Sungmin Hong, Jialong Zhang, and Guofei Gu
Proceedings of the 26th USENIX Security Symposium, 2017
Abstract

Understanding the Market-Level and Network-Level Behaviors of the Android Malware Ecosystem
Chao Yang, Jialong Zhang, and Guofei Gu
2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), , pp. 2452--2457
Abstract

Brief Announcement: A Consent Management Solution for Enterprises
Abigail Goldsteen, Shelly Garion, Sima Nadler, Natalia Razinkov, Yosef Moatti, Paula Ta-Shma
Cyber Security Cryptography and Machine Learning First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings


2016

Multi-User Security of Authenticated Encryption: AES-GCM in TLS 1.3
Mihir Bellare, Bjoern Tackmann
Advances in Cryptology - CRYPTO, Springer, 2016

Nonce-Based Cryptography: Retaining Security when Randomness Fails
Mihir Bellare, Bjoern Tackmann
Advances in Cryptology - EUROCRYPT, Springer, 2016

Non-Malleable Encryption: Simpler, Shorter, Stronger
Sandro Coretti, Yevgeniy Dodis, Bjoern Tackmann, Daniele Venturi
Theory of Cryptography, Springer, 2016

Tightly Secure Signatures From Lossy Identification Schemes
Michel Abdalla, Pierre-Alain Fouque, Vadim Lyubashevsky, Mehdi Tibouchi
J. Cryptology 29(3), 597--631, 2016



Anonymous Attestation Using the Strong Diffie Hellman Assumption Revisited
J Camenisch, M Drijvers, A Lehmann
9th International Conference on Trust & Trustworthy Computing - TRUST 2016, Springer, LNCS
Abstract

Universally Composable Direct Anonymous Attestation
Jan Camenisch, Manu Drijvers, Anja Lehmann
PKC, 2016
Abstract

Virtual Smart Cards: How to Sign with a Password and a Server
J Camenisch, A Lehmann, G Neven, K Samelin
SCN, 2016
Abstract

Hunting for Invisibility: Characterizing and Detecting Malicious Web Infrastructures through Server Visibility Analysis
Jialong Zhang, Xin Hu, Jiyong Jang, Ting Wang, Guofei Gu, Marc Ph. Stoecklin
Proceedings of IEEE International Conference on Computer Communications (INFOCOM'16), 2016

Detecting Malicious Exploit Kits using Tree-based Similarity Searches
Teryl Taylor, Xin Hu, Ting Wang, Jiyong Jang, Marc Ph. Stoecklin, Fabian Monrose, and Reiner Sailer
Proceedings of the ACM Conference on Data and Application Security and Privacy (CODASPY), 2016

BAYWATCH: Robust Beaconing Detection to Identify Infected Hosts in Large-Scale Enterprise Networks
Xin Hu, Jiyong Jang, Marc Ph. Stoecklin, Ting Wang, Douglas L. Schales, Dhilung Kirat, and Josyula R. Rao
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2016

BotMeter: Charting DGA-Botnet Landscapes in Large Networks
Ting Wang, Xin Hu, Jiyong Jang, Shouling Ji, Marc Ph. Stoecklin, and Teryl Taylor
Proceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS), 2016

Scalable malware classification with multifaceted content features and threat intelligence
Xin Hu, Jiyong Jang, Ting Wang, Zubair Ashraf, Marc Ph. Stoecklin, Dhilung Kirat
IBM Journal of Research and Development 60(4), 2016

Scalable Analytics to Detect DNS Misuse for Establishing Stealthy Communication Channels
Douglas L. Schales, Jiyong Jang, Ting Wang, Xin Hu, Dhilung Kirat, Ben Wuest, Marc Ph. Stoecklin
IBM Journal of Research and Development 60(4), 2016

Security 360°: Enterprise security for the cognitive era
Josyula R. Rao, Suresh N. Chari, Dimitrios Pendarakis, Reiner Sailer, Marc Ph. Stoecklin, Wilfried Teiken, Andreas Wespi
IBM Journal of Research and Development 60(4), 2016

Closing the loop: Network and in-host monitoring tandem for comprehensive cloud security visibility
S. Berger, Y. Chen, X. Hu, D. Pendarakis, J. R. Rao, R. Sailer, D. L. Schales, M. P. Stoecklin
IBM Journal of Research and Development 60(4), 10:1-10:12, 2016

Security intelligence for industrial control systems
Andreas Amrein, Valentino Angeletti, Anton Beitler, Marcel Német, Micha Reiser, Simone Riccetti, Marc Ph. Stoecklin, Andreas Wespi
IBM Journal of Research and Development 60(4), 2016

Passive security intelligence to analyze the security risks of mobile/BYOD activities
Marc Ph. Stoecklin, Kapil Singh, Larry Koved, Xin Hu, Suresh N. Chari, Josyula R. Rao, P.C. Cheng, Mihai Christodorescu, Reiner Sailer and Douglas Lee Schales
IBM Journal of Research and Development, 2016


2015

How Fair is Your Protocol? A Utility-based Approach to Protocol Optimality
Juan A. Garay, Jonathan Katz, Bjoern Tackmann, Vassilis Zikas
Principles Of Distributed Computing, ACM Press, 2015

(De-) Constructing TLS 1.3
Markulf Kohlweiss, Ueli Maurer, Cristina Onete, Bjoern Tackmann, Daniele Venturi
INDOCRYPT, pp. 85--102, Springer, 2015

Query-Complexity Amplification for Random Oracles
Gregory Demay, Peter Gazi, Ueli Maurer, Bjoern Tackmann
Information Theoretic Security, pp. 159--180, Springer, 2015

Fair Distributed Computation of Reactive Functions
Juan A. Garay, Bjoern Tackmann, Vassilis Zikas
DISC, pp. 497--512, Springer, 2015

Robust Authenticated Encryption and the Limits of Symmetric Cryptography
Christian Badertscher, Christian Matt, Ueli Maurer, Phillip Rogaway, Bjoern Tackmann
IMA International Conference on Cryptography and Coding, Springer, 2015

Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer
Christian Badertscher, Christian Matt, Ueli Maurer, Phillip Rogaway, Bjoern Tackmann
Provable Security, pp. 85--104, Springer, 2015

From Single-Bit to Multi-Bit Public-Key Encryption via Non-Malleable Codes
Sandro Coretti, Ueli Maurer, Bjoern Tackmann, Daniele Venturi
Theory of Cryptography, pp. 532--560, Springer, 2015

Efficient Zero-Knowledge Proofs for Commitments from Learning with Errors over Rings
Fabrice Benhamouda, Stephan Krenn, Vadim Lyubashevsky, Krzysztof Pietrzak
ESORICS, 2015



Lattice-Based Signatures: Optimization and Implementation on Reconfigurable Hardware
Tim Guneysu, Vadim Lyubashevsky, Thomas Poppelmann
IEEE Trans. Computers 64(7), 1954--1967, 2015

[Book Chapter] An Architecture for Privacy-ABCs
P Bichsel, J Camenisch, M Dubovitskaya, R Enderlein, S Krenn, A Lehmann, G Neven, F-S Preiss
Attribute-based Credentials for Trust - Identity in the Information Society, Springer, 2015

[Book Chapter] Cryptographic Protocols Underlying Privacy-ABCs
P Bichsel, J Camenisch, M Dubovitskaya, R Enderlein, S Krenn, A Lehmann, G Neven, F-S Preiss
Attribute-based Credentials for Trust - Identity in the Information Society, Springer, 2015

Recovering Lost Device-Bound Credentials
F Baldimtsi, J Camenisch, L Hanzlik, S Krenn, A Lehmann, G Neven
International Conference on Applied Cryptography and Network Security - ACNS, Springer, LNCS, 2015
Abstract

Formal Treatment of Privacy-Enhancing Credential Systems
J Camenisch, S Krenn, A Lehmann, G Mikkelsen, G Neven, M Pedersen
Selected Areas in Cryptography - SAC, 2015
Abstract

Optimal Distributed Password Verification
J Camenisch, A Lehmann, G Neven
ACM CCS, 2015
Abstract

Privacy for Distributed Databases via (Un)linkable Pseudonyms
J Camenisch, A Lehmann
ACM CCS, 2015
Abstract

The Dropper Effect: Insights into Malware Distribution with Downloader Graph Analytics
Bum Jun Kwon, Jayanta Mondal, Jiyong Jang, Leyla Bilge, Tudor Dumitras
Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2015

Experimental Study of Fuzzy Hashing in Malware Clustering Analysis
Yuping Li, Sathya Chandran Sundaramurthy, Alexandru G. Bardas, Xinming Ou, Doina Caragea, Xin Hu, Jiyong Jang
Proceedings of the Workshop on Cyber Security Experimentation and Test (CSET), 2015

Rateless and Pollution-Attack-Resilient Network Coding
Wentao Huang, Ting Wang, Xin Hu, Jiyong Jang, and Theodoros Salonidis
Proceedings of the IEEE International Symposium on Information Theory (ISIT), 2015

FCCE: Highly Scalable Distributed Feature Collection and Correlation Engine for Low Latency Big Data Analytics
Douglas Schales, Xin Hu, Jiyong Jang, Reiner Sailer, Marc Ph. Stoecklin, and Ting Wang.
Proceedings of the 31st IEEE International Conference on Data Engineering (ICDE '15), 2015

SecGraph: A Uniform and Open-source Evaluation System for Graph Data Anonymization and De-anonymization
Shouling Ji, Weiqing Li, Prateek Mittal, Xin Hu, and Raheem Beyah
Proceedings of the 24th USENIX Security Symposium (USENIX Security), 2015

Indexing Earth Mover's Distance over Network Metrics
Ting Wang, Shicong Meng, and Jiang Bian
IEEE Transactions on Knowledge and Data Engineering (TKDE) 27(6), 1588-1601, 2015


2013

Panel on granularity in access control
Ian Molloy, Mahesh V. Tripunitara, Volkmar Lotz, Martin Kuhlmann, Casey Schaufler, Vijay Atluri
SACMAT, pp. 85-86, 2013

A bigData platform for analytics on access control policies and logs
Suresh Chari, Ted Habeck, Ian Molloy, Youngja Park, Wilfried Teiken
SACMAT, pp. 185-188, 2013

Ensuring continuous compliance through reconciling policy with usage
Suresh Chari, Ian Molloy, Youngja Park, Wilfried Teiken
SACMAT, pp. 49-60, 2013


2012

Enhancing Javascript with Transactions
Mohan Dhawan, Chung-chieh Shan, Vinod Ganapathy
26th European Conference on Object-Oriented Programming (ECOOP'12), pp. 383--408, Springer, 2012

Fathom: A Browser-based Network Measurement Platform
Mohan Dhawan, Justin Samuel, Renata Teixeira, Christian Kreibich, Mark Allman, Nicholas Weaver, Vern Paxson
12th ACM Conference on Internet Measurement Conference (IMC'12), pp. 73--86, 2012

Priv3: A Third Party Cookie Policy
Mohan Dhawan, Christian Kreibich, Nicholas Weaver
W3C Workshop: Do Not Track and Beyond, 2012

An Analysis of the Mozilla Jetpack Extension Framework
Rezwana Karim, Mohan Dhawan, Vinod Ganapathy, Chung-chieh Shan
26th European Conference on Object-Oriented Programming (ECOOP'12), pp. 333--355, Springer, 2012

Using probabilistic generative models for ranking risks of Android apps
Hao Peng, Christopher S. Gates, Bhaskar Pratim Sarma, Ninghui Li, Yuan Qi, Rahul Potharaju, Cristina Nita-Rotaru, Ian Molloy
ACM Conference on Computer and Communications Security, pp. 241-252, 2012

Android Permissions: A Perspective Combining Risks and Benefits
B. Sarma, N. Li, C. Gates, R. Potharaju, C. Nita-Rotaru, I. Molloy
ACM Symposium on Access Control Models and Technologies (SACMAT), 2012

Generative Models for Access Control Policies: Applications to Role Mining Over Logs with Attribution
Ian Molloy, Youngja Park, and Suresh Chari.
ACM Symposium on Access Control Models and Technologies (SACMAT), 2012

Slicing: A New Approach for Privacy Preserving Data Publishing
Tiancheng Li, Ninghui Li, Jian Zhang, Ian Molloy
IEEE Trans. Knowl. Data Eng. 24(3), 561--574, 2012

Learning Stochastic Models of Information Flow
Luke Dickens, Ian Molloy, Jorge Lobo, Pau-Chen Cheng, Alessandra Russo
Proceedings of the 28th IEEE International Conference on Data Engineering (ICDE), 2012

Risk-Based Security Decisions Under Uncertainty
Ian Molloy, Luke Dickens, Charles Morisset, Pau-Chen Cheng, Jorge Lobo, Alessandra Russo
Proceedings of the Second ACM Conference on Data and Application Security and Privacy (CODASPY), 2012

Biometric Authentication on a Mobile Device: A Study of User Effort, Error and Task Disruption
Shari Trewin, Cal Swart, Larry Koved, Jacquelyn Martino, Kapil Singh, Shay Ben-David
Proceedings of the 28th Annual Computer Security Applications Conference (ACSAC), 2012

Limitations of Generating a Secret Key Using Wireless Fading Under Active Adversary
M. Zafer, D. Agrawal, M. Srivatsa
IEEE/ACM Transactions on Networking, IEEE, 2012

The Impact of TLS on SIP Server Performance: Measurement and Modeling
Charles Shen and Erich Nahum and Henning Schulzrinne and Charles P. Wright
IEEE/ACM Transactions on Networking 20(4), IEEE, 2012


Biometric authentication on a mobile device: a study of user effort, error and task disruption
Shari Trewin, Calvin Swart, Larry Koved, Jacquelyn Martino, Kapil Singh, Shay Ben-David
28th Annual Computer Security Applications Conference, ACSAC 2012, ACSA
Abstract


2011

Atlantis: Robust, Extensible Execution Environments for Web Applications
James Mickens, Mohan Dhawan
23rd ACM Symposium on Operating Systems Principles (SOSP'11), pp. 217--231, 2011

Adversaries' Holy Grail: access control analytics
I Molloy, J Lobo, S Chari
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, pp. 54--61, 2011

Attack on the GridCode one-time password
I Molloy, N Li
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, pp. 306--315, 2011

Data Kindness on the Internet
Christan Grant, Tyrone Grandison, Kun Liu
Richard Tapia Celebration of Diversity in Computing Conference., 2011

A Global Virtual Machine Attribute Access Control Policy for Auditing Federated Digital Identities within a Compute Cloud
Sean Thorpe, Indrajit Ray, Indrakshi Ray, Tyrone Grandison, Abbie Barbir
International Journal of Information Assurance and Security (JIAS)6, 2011

Enabling Security Uniformly Across Cloud Systems
Sean Thorpe, Indrajit Ray, Tyrone Grandison
ACM ASPLOS (Architectural Support for Programming Languages and Operating Systems) RESOLVE (Runtime Environments/Systems, Layering, and Virtualized Environments), ACM Press, 2011

PCTA: Privacy-constrained Clustering-based Transaction Data Anonymization
A. Gkoulalas-Divanis, G. Loukides
4th International Workshop on Privacy and Anonymity in the Information Society, pp. 5, ACM, 2011

Lessons Learned Building the Caernarvon High-Assurance Smart Card Operating System
P A Karger, S K McIntosh, E R Palmer, D C Toll, S M Weber
IEEE Security and Privacy pp. 99, 1--1, IEEE, 2011


2010

The Case for JavaScript Transactions: Position Paper
Mohan Dhawan, Chung-chieh Shan, Vinod Ganapathy
5th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS'10), pp. 6, 2010

Towards an Integrated Approach to Role Engineering
Chris Giblin, Marcel Graf, Gunter Karjoth, Andreas Wespi, Ian Molloy, Jorge Lobo, Seraphin Calo
2nd ACM Workshop on Assurable & Usable Security Configuration (SafeConfig), 2010

Mining roles with noisy data
I Molloy, N Li, Y A Qi, J Lobo, L Dickens
Proceeding of the 15th ACM symposium on Access control models and technologies, pp. 45--54, ACM, 2010

Towards an integrated approach to role engineering
C Giblin, M Graf, G Karjoth, A Wespi, I Molloy, J Lobo, S Calo
Proceedings of the 3rd ACM workshop on Assurable and usable security configuration, pp. 63--70, 2010

METHOD AND SYSTEM FOR HARDWARE BASED PROGRAM FLOW MONITOR FOR EMBEDDED SOFTWARE
S McIntosh, D Brand, M Kaplan, P A Karger, M G McIntosh, E R Palmer, A M Paradkar, D Toll, S M Weber
US Patent US7861305B2
Abstract

Lessons Learned Building the Caernarvon High-Assurance Operating System
P Karger, S McIntosh, E Palmer, D Toll, S Weber
IEEE Security and Privacy, 22--30, IEEE Computer Society, 2010

A Declarative Framework for Intrusion Analysis
Matthew Fredrikson, Mihai Christodorescu, Jonathon Giffin, Somesh Jha
Cyber Situational Awareness, 179--200, Springer, 2010

Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors
Matt Fredrikson, Somesh Jha, Mihai Christodorescu, Reiner Sailer, Xifeng Yan
IEEE Symposium on Security and Privacy, pp. 45-60, 2010

AccessMiner: Using System-Centric Models for Malware Protection
Andrea Lanzi, Davide Balzarotti, Christopher Kruegel, Mihai Christodorescu, Engin Kirda
ACM Conference on Computer and Communications Security, pp. 399-412, ACM, 2010
Abstract

Almost optimal bounds for direct product threshold theorem
C Jutla
Theory of Cryptography, 37--51, Springer, 2010

Where Do You Want to Go Today? Escalating Privileges by Pathname Manipulation
Suresh Chari, Shai Halevi, Wietse Venema
17th Annual Network and Distributed System Security Symposium (NDSS), 2010

Cryptographic Extraction and Key Derivation: The HKDF Scheme
Hugo Krawczyk
2010
\urlhttp://eprint.iacr.org/2010/264

One-Pass HMQV and Asymmetric Key-Wrapping
Shai Halevi, Hugo Krawczyk
2010
\urlhttp://eprint.iacr.org/2010/638

i-hop homomorphic encryption and rerandomizable Yao circuits
C Gentry, S Halevi, V Vaikuntanathan
Advances in Cryptology--CRYPTO 2010, 155--172, Springer

Toward basing fully homomorphic encryption on worst-case hardness
C Gentry
Advances in Cryptology--CRYPTO 2010, 116--137, Springer


Computing arbitrary functions of encrypted data
C Gentry
Communications of the ACM 53(3), 97--105, ACM, 2010

A simple BGN-type cryptosystem from LWE
C Gentry, S Halevi, V Vaikuntanathan
Advances in Cryptology--EUROCRYPT 2010, 506--522, Springer

Fully homomorphic encryption over the integers
M Van Dijk, C Gentry, S Halevi, V Vaikuntanathan
Advances in Cryptology--EUROCRYPT 2010, 24--43, Springer

Security for Signcryption: The Two-User Model
J H An, T Rabin
Practical Signcryption, 21--42, Springer, 2010

Designing a side channel resistant random number generator
S Chari, V Diluoffo, P Karger, E Palmer, T Rabin, J Rao, P Rohotgi, H Scherzer, M Steiner, D Toll
Smart Card Research and Advanced Application, 49--64, Springer, 2010

Protecting circuits from leakage: The computationally-bounded and noisy cases
S Faust, T Rabin, L Reyzin, E Tromer, V Vaikuntanathan
Advances in Cryptology--EUROCRYPT 2010, 135--156, Springer

A New and Improved Paradigm for Hybrid Encryption Secure Against Chosen-Ciphertext Attack
Y Desmedt, R Gennaro, K Kurosawa, V Shoup
Journal of cryptology 23(1), 91--120, Springer, 2010

Constructing certificateless encryption and id-based encryption from id-based key agreement
D Fiore, R Gennaro, N Smart
4th International Conference,, pp. 167--186, Springer, 2010

Identity-based key exchange protocols without pairings
D Fiore, R Gennaro
Transactions on computational science X, 42--77, Springer, 2010

Text search protocols with simulation based security
R Gennaro, C Hazay, J Sorensen
Public Key Cryptography--PKC 2010, 332--350, Springer

Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead"
R Gennaro, H Krawczyk, T Rabin
Applied Cryptography and Network Security: 8th International Conference, ACNS 2010, , pp. 309

Making the Diffie-Hellman protocol identity-based
D Fiore, R Gennaro
Topics in Cryptology-CT-RSA 2010, 165--178, Springer

Non-interactive verifiable computing: Outsourcing computation to untrusted workers
R Gennaro, C Gentry, B Parno
Advances in Cryptology--CRYPTO 2010, 465--482, Springer

The Impact of TLS on SIP Server Performance
C. Shen, E. Nahum, H. Schulzrinne, C.P. Wright
IPTComm 2010: Principles, Systems and Applications of IP Telecommunications, pp. 59--70, Springer

Social-Aware Data Diffusion in Delay Tolerant MANETs
Y Zhang, W Gao, G Cao, T La Porta, B Krishnamachari, A Iyengar
Technical Report, 2010

Providing K-Anonymity in Location Based Services
A Gkoulalas-Divanis, P Kalnis, and V S Verykios
ACM SIGKDD Explorations 12(1), 3--10, ACM, 2010

Towards a Formal Definition of a Computing Cloud
Tyrone Grandison, E Michael Maximilien, Sean Thorpe, Alfredo Alba
The IEEE World Congress on Services (SERVICES), pp. 191--192, 2010

Making Privacy a Fundamental Component of Web Resources
Thomas Duebendorfer, Christoph Renner, Tyrone Grandison, Michael Maximilien, Mark Weitzel
W3C Workshop on Privacy for Advanced Web APIs, 2010

There's Something Stuck In My Shoe
Koved, Larry
Security & Privacy Usability Technology Transfer: Emerging Research (SPUTTER) Workshop, Carnegie Mellon CyLab and Microsoft, 2010
Abstract

Physical layer enhanced wireless secret key exchange
C. Capar, M. Zafer, D. Goeckel, D. Towsley, D. Agrawal
Annual conference of ITA, 2010

Checkpointing virtual machines against transient errors
L Wang, Z Kalbarczyk, R K Iyer, A Iyengar
On-Line Testing Symposium (IOLTS), 2010 IEEE 16th International, pp. 97--102

HIPAA Compliance and Patient Privacy Protection
T Grandison, R Bhatti
13th World Congress on Medical and Health Informatics (MEDINFO), Citeseer, 2010

Privacy for Healthcare Social Networks
E M Maximilien, T Grandison
13th World Congress on Medical and Health Informatics (MEDINFO), Citeseer, 2010

Hardware Based Mandatory Access Control
W E Hall, G H D Hunt, P A Karger, M F Mergen, D R Safford, D C Toll

ROADTRACK: Scaling Location Updates for Mobile Clients on Road Networks with Query Awareness
P Pesti, L Liu, B Bamba, A Iyengar, M Weber
Proceedings of the VLDB Endowment 3(2), 2010

Exploiting cryptography for privacy-enhanced access control
Claudio A.~Ardagna, Jan Camenisch, Markulf Kohlweiss, Ronald Leenes, Gregory Neven, Bart Priem, Pierangela Samarati, Dieter Sommer, Mario Verdicchio
Journal of Computer Security 18(1), 123--160, 2010

Robust Encryption
Michel Abdalla, Mihir Bellare, Gregory Neven
7th Theory of Cryptography Conference, Springer-Verlag, 2010

Scalable integrity monitoring in virtualized environments
Kenneth Goldman, Reiner Sailer, Dimitrios Pendarakis, Deepa Srinivasan
Proceedings of the fifth ACM workshop on Scalable trusted computing, pp. 73--78, 2010

Evaluation of a just-in-time compiler retrofitted for PHP
Michiaki Tatsubori, Akihiko Tozawa, Toyotaro Suzumura, Scott Trent, Tamiya Onodera
Proceedings of the 6th International Conference on Virtual Execution Environments, VEE 2010, Pittsburgh, Pennsylvania, USA, March 17-19, 2010, pp. 121--132

Implementing a High-Assurance Smart-Card OS
P Karger, D Toll, E Palmer, S McIntosh, S Weber, J Edwards
Financial Cryptography and Data Security, 51--65, Springer, 2010

Anonymization of Electronic Medical Records for Validating Genome-Wide Association Studies
G Loukides, A Gkoulalas-Divanis, B Malin
Proceedings of the National Academy of Sciences 107(17), 7898, National Acad Sciences, 2010


2009

Analyzing Information Flow in JavaScript-based Browser Extensions
Mohan Dhawan, Vinod Ganapathy
25th AnnualComputer Security Applications Conference (ACSAC'09), pp. 382--391, 2009

Evaluating Role Mining Algorithms
Ian Molloy and Ninghui Li and Tiancheng Li and Ziqing Mao and Qihua Wang and Jorge Lobo
Proceedings of the Fourteenth ACM Symposium on Access Control Models and Technologies (SACMAT'09), 2009

Evaluating role mining algorithms
I Molloy, N Li, T Li, Z Mao, Q Wang, J Lobo
Proceedings of the 14th ACM symposium on Access control models and technologies, pp. 95--104, 2009

Defeating cross-site request forgery attacks with browser-enforced authenticity protection
Z Mao, N Li, I Molloy
Financial Cryptography and Data Security, 238--255, Springer, 2009


Slicing: A New Approach for Privacy Preserving Data Publishing
T Li, N Li, J Zhang, I Molloy
Knowledge and Data Engineering, IEEE Transactions on pp. 99, 1--1, IEEE, 2009

Using Recommenders for Discretionary Access Control
Suresh Chari, Larry Koved, and Mary Ellen Zurko
Web 2.0 Security and Privacy, IEEE, 2009
Abstract   Held in conjunction with the 2009 IEEE Symposium on Security and Privacy


Stealthy Deployment and Execution of In-Guest Kernel Agents
T. Chiueh, M. Conover, M. Lu, B. Montague
Proc. of The Black Hat, USA, 2009

Method, Apparatus and System for Resistance to Side Channel Attacks on Random Number Generators
S N Chari, V V Diluoffo, P A Karger, E R Palmer, T Rabin, J R Rao, P Rohatgi, H Scherzer, M Steiner, D C Toll
US Patent US7496616B2
Abstract

A Note on Information-theoretic Secret Key Exchange over Wireless Channels
M. Zafer, D. Agrawal, and M. Srivatsa
47th Annual Allerton Conference on Communication, Control and Computing, 2009

Secure Network Coding Over the Integers
Rosario Gennaro, Jonathan Katz, Hugo Krawczyk, Tal Rabin
2009
\urlhttp://eprint.iacr.org/2009/569


2008

Enforcing Authorization Policies using Transactional Memory Introspection
Arnar Birgisson, Mohan Dhawan, Ulfar Erlingsson, Vinod Ganapathy, Liviu Iftode
15th ACM Conference on Computer and Communications Security (CCS'08), pp. 223--234, 2008

Mining Roles with Semantic Meanings
Ian Molloy, Hong Chen, Tiancheng Li, Qihua Wang, Ninghui Li, Elisa Bertino, Seraphin Calo, Jorge Lobo
Proceedings of the Thirteenth ACM Symposium on Access Control Models and Technologies (SACMAT'08), 2008

Trading in Risk: Using Markets to Improve Access Control
Ian Molloy, Pau-Chen Cheng, Pankaj Rohatgi
Proceedings of the Fifteenth New Security Paradigms Workshop (NSPW'08), 2008

Mining roles with semantic meanings
I Molloy, H Chen, T Li, Q Wang, N Li, E Bertino, S Calo, J Lobo
Proceedings of the 13th ACM symposium on Access control models and technologies, pp. 21--30, 2008

Secure Delegation for Web 2.0 and Mashups
P.Austel S. Bhola, S. Chari, L. Koved, M. McIntosh, M. Steiner, S. Weber
Web 2.0 Security and Privacy, IEEE, 2008
Abstract   Held in conjunction with the 2008 IEEE Symposium on Security and Privacy

Secure Delegation for Web 2.0 and Mashups
S Chari, L Koved, M Mcintosh, M Steiner, S Weber
W2SP 2008: Web 2.0 Security and Privacy

SWORD4J: Security WORkbench Development environment 4 Java
Ted Habeck; Larry Koved; Marco Pistoia
IBM Research Report RC24554, IBM T. J. Watson Research Center, 2008
Abstract

The Caernarvon secure embedded operating system
D C Toll, P A Karger, E R Palmer, S K McIntosh, S Weber
ACM SIGOPS Operating Systems Review 42(1), 32--39, ACM, 2008

Tooling in support of Common Criteria evaluation of a high assurance operating system
DC Toll, S Weber, PA Karger, ER Palmer, SK McIntosh
IBM Thomas J. Watson Research Center Report, 2008

The Feasibility of Automated Feedback-Directed Specification-Based Test Generation: A Case Study of a High-Assurance Operating System
S Weber, A Paradkar, S K McIntosh, D C Toll, P A Karger, M Kaplan, E R Palmer
19th International Symposium on Software Reliability Engineering, pp. 229--238, 2008


Design of a Secure Smart Card Operating System for Pervasive Applications
P A Karger, D C Toll, E R Palmer, S K McIntosh, S M Weber
Technical Report RC 24687, 2008

Designing a Secure Smart Card Operating System
P A Karger, D C Toll, E R Palmer, S K McIntosh, S M Weber
Technical Report RC 24531, 2008


2007

Secure Distributed Key Generation for Discrete-Log Based Cryptosystems
Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin
Journal of Cryptology 20(1), 51--83, Springer, Heidelberg, Germany, 2007


Dynamic virtual credit card numbers
I Molloy, J Li, N Li
Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security, pp. 208--223, 2007

Cryptographic strength of SSL/TLS servers: Current and recent practices
H K Lee, T Malkin, E Nahum
Proceedings of the 7th ACM SIGCOMM Internet Measurement Conference, pp. 83--92, 2007

Used trusted co-servers to enhance security of web interaction
D M Chess, J Dyer, N Itoi, J Kravitz, E R Palmer, R Perez, S W Smith, others
US Patent US7194759B1
Abstract


2006

The case for analysis preserving language transformation
X Zhang, L Koved, M Pistoia, S Weber, T Jaeger, G Marceau, L Zeng
Proceedings of the 2006 international symposium on Software testing and analysis, pp. 202, ACM
Abstract


2005

Interprocedural analysis for privileged code placement and tainted variable detection
M. Pistoia, R. Flynn, L. Koved, V. Sreedhar
ECOOP 2005-Object-Oriented Programming, 734--734, Springer
Abstract

System and method to grant or refuse access to a system
H Scherzer, E Palmer
US Patent App. 11/274,619


2004

Experiences with Building Security Checking and Understanding Tool
T Habeck, L Koved, O Marquez, VC Sreedhar, M Steiner, W Venema, S Weber
Technical Report RC24243, IBM Research, 2004
Abstract

Applying Static Analysis to Verifying Security Properties
X Zhang, T Jaegert, L Koved
Proceedings of the 2004 Grace Hopper Celebration of Women in Computing Conference
Abstract

Enterprise Java 2 Security: Building Secure and Robust J2EE Applications
M Pistoia, N Nagaratnam, L Koved, A Nadalin
2004 - portal.acm.org, Addison Wesley Longman Publishing Co., Inc. Redwood City, CA, USA
Abstract

Detecting Unwanted Synchronization in Java Programs
Leeman, G., Kershenbaum, A., Koved, L., and Reimer, D.
Software Engineering and Applications (SEA 2004). Sponsored by International Association of Science and Technology for Development (IASTED)., MIT
Abstract

Enterprise Java ™ Security: Building Secure and Robust J2EE Applications
M. Pistoia, N. Nagaratnam, L. Koved, A. Nadalin
2004 - books.google.com, Addison-Wesley Professional


2003

Template attacks
Suresh Chari, Josyula R Rao, Pankaj Rohatgi
Cryptographic Hardware and Embedded Systems-CHES 2002, pp. 13--28, Springer, 2003

Authenticated electronic coupon issuing and redemption
C C Palmer, E R Palmer, S W Smith
US Patent 6,505,773, European Patent EP1068581B1, Germany Patent DE69902454D1
Abstract

Method and system for processing electronic documents
M Anderson, F Jaffe, C Hibbert, J Virkki, J Kravitz, S Chang, E Palmer, others
US Patent 6,609,200
Abstract


2002

Access rights analysis for Java
L. Koved, M. Pistoia, A. Kershenbaum
OOPSLA '02 Proceedings of the 17th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications, pp. 359--372, ACM, 2002
Abstract

User authentication and authorization in the Java platform
C Lai, L Gong, L Koved, A Nadalin, R Schemers
Computer Security Applications Conference, 1999, pp. 285--290, 2002
Abstract

METHOD AND APPARATUS FOR COLLECTING INFORMATION ASSOCIATED WITH MOVEMENT BETWEEN LOCATIONS
Lawrence E Ashery, Kenneth Alan Goldman, Elaine Rivette Palmer, Pankaj Rohatgi, Sean William Smith
European Patent EP1076872B1, Germany Patent DE69903805D1
Abstract

Vehicle customization, restriction, and data logging
Kenneth Alan Goldman, Charles Campbell Palmer, Elaine Rivette Palmer
US Patent 6,430,488
Abstract


2001

Security challenges for Enterprise Java in an e-business environment
L Koved, A Nadalin, N Nagaratnam, M Pistoia, T Shrader
IBM Systems Journal 40(1), 130--152, International Business Machines, 2001
Abstract


1999

Towards sound approaches to counteract power-analysis attacks
Suresh Chari, Charanjit S Jutla, Josyula R Rao, Pankaj Rohatgi
Advances in Cryptology—CRYPTO’99, pp. 398--412, 1999

Adaptive Security for Threshold Cryptosystems
Ran Canetti, Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin
Advances in Cryptology -- CRYPTO" "'99, pp. 98--115, springer, 1999

Secure hash-and-sign signatures without the random oracle
Rosario Gennaro, Shai Halevi, Tal Rabin
Advances in Cryptology—EUROCRYPT’99, pp. 123--139, 1999

Identification bracelet for child and guardian matching
J K Kravitz, E R Palmer
US Patent 5,978,493
Abstract


1998

Simplified VSS and fast-track multiparty computations with applications to threshold cryptography
Rosario Gennaro, Michael O Rabin, Tal Rabin
Proceedings of the seventeenth annual ACM symposium on Principles of distributed computing, pp. 101--111, 1998

The evolution of Java security
L Koved, AJ Nadalin, D Neal, T Lawson
IBM Systems Journal 37(3), 349-364, International Business Machines Corporation, 1998
Abstract

Using a high-performance, programmable secure coprocessor
S Smith, E Palmer, S Weingart
Financial Cryptography, pp. 73--89, 1998


1996

Robust Threshold DSS Signatures
Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin
EUROCRYPT'96, 1996

Robust and Efficient Sharing of RSA Functions
Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin
CRYPTO'96, 1996

Parallelized network security protocols
E Nahum, D Yates, SOMalley, H Orman, R &
ISOC Symposium on Networked and Distributed System Security (NDSS), 1996


1995

Towards High Performance Cryptographic Software
E Nahum, SOMalley, H Orman, R Schroeppel
Third IEEE Workshop on the Architecture and Implementation of High Performance Communications Subsystems (HPCS), 1995


1991

Introduction to the Citadel architecture: Security in physically exposed environments
S R White, S H Weingart, W C Arnold, E R Palmer
Technical Report RC 16672, IBM Research, 1991

An Introduction to Citadel: a secure crypto coprocessor for workstations
Elaine Palmer
Technical Report RC 18373, IBM TJ Watson Research Center, 1991


Year Unknown

Role Mining for Engineering and Optimizing Role Based Access Control Systems
N L T L I Molloy, Q W E Bertino, S C J Lobo
cerias.purdue.edu, 0