Security and Privacy Publications
2019
Detecting Backdoor Attacks on Deep Neural Networks by Activation Clustering (Best paper award)
Bryant Chen, Wilka Carvalho, Nathalie Baracaldo, Heiko Ludwig, Benjamin Edwards, Taesung Lee, Ian Molloy and Biplav Srivastava
AAAI Collocated: The AAAI's Workshop on Artificial Intelligence Safety (SafeAI), 2019
Bryant Chen, Wilka Carvalho, Nathalie Baracaldo, Heiko Ludwig, Benjamin Edwards, Taesung Lee, Ian Molloy and Biplav Srivastava
AAAI Collocated: The AAAI's Workshop on Artificial Intelligence Safety (SafeAI), 2019
Fair Transfer Learning with Missing Protected Attributes
A. Coston, K. Natesan Ramamurthy, D. Wei, K. R. Varshney, S. Speakman, Z. Mustahsan, S. Chakraborty
AAAI/ACM Conference on Artificial Intelligence, Ethics, and Society (AIES), 2019
A. Coston, K. Natesan Ramamurthy, D. Wei, K. R. Varshney, S. Speakman, Z. Mustahsan, S. Chakraborty
AAAI/ACM Conference on Artificial Intelligence, Ethics, and Society (AIES), 2019
2018
On Composable Security for Digital Signatures
Christian Badertscher, Ueli Maurer, Bjoern Tackmann
Public Key Cryptography, pp. 494-523, Springer, 2018
Christian Badertscher, Ueli Maurer, Bjoern Tackmann
Public Key Cryptography, pp. 494-523, Springer, 2018
Stateful Multi-Client Verifiable Computation
Christian Cachin, Esha Ghosh, Dimitrios Papadopoulos, Bjoern Tackmann
Applied Cryptography and Network Security, Springer, 2018
Christian Cachin, Esha Ghosh, Dimitrios Papadopoulos, Bjoern Tackmann
Applied Cryptography and Network Security, Springer, 2018
Toward an Algebraic Theory of Systems
Christian Matt, Ueli Maurer, Christopher Portmann, Renato Renner, Bjoern Tackmann
Theoretical Computer Science, Elsevier, 2018
Christian Matt, Ueli Maurer, Christopher Portmann, Renato Renner, Bjoern Tackmann
Theoretical Computer Science, Elsevier, 2018
Secure Opportunistic Multipath Key Exchange
Sergiu Costea, Marios Choudary, Dana Gucea, Bjoern Tackmann, Costin Raiciu
ACM Conference on Computer and Communications Security, ACM Press, 2018
Sergiu Costea, Marios Choudary, Dana Gucea, Bjoern Tackmann, Costin Raiciu
ACM Conference on Computer and Communications Security, ACM Press, 2018
CRYSTALS-Dilithium: A Lattice-Based Digital Signature Scheme
Leo Ducas, Eike Kiltz, Tancrede Lepoint, Vadim Lyubashevsky, Peter Schwabe, Gregor Seiler, Damien Stehle
CHES 2018(1), 238--268
Leo Ducas, Eike Kiltz, Tancrede Lepoint, Vadim Lyubashevsky, Peter Schwabe, Gregor Seiler, Damien Stehle
CHES 2018(1), 238--268
A Concrete Treatment of Fiat-Shamir Signatures in the Quantum Random-Oracle Model
Eike Kiltz, Vadim Lyubashevsky, Christian Schaffner
Eurocrypt, 2018
Eike Kiltz, Vadim Lyubashevsky, Christian Schaffner
Eurocrypt, 2018
Short, Invertible Elements in Partially Splitting Cyclotomic Rings and Applications to Lattice-Based Zero-Knowledge Proofs
Vadim Lyubashevsky, Gregor Seiler
Eurocrypt, 2018
Vadim Lyubashevsky, Gregor Seiler
Eurocrypt, 2018
CRYSTALS-Kyber: a CCA-Secure Module-Lattice-Based KEM
Joppe W. Bos, Leo Ducas, Eike Kiltz, Tancrede Lepoint, Vadim Lyubashevsky, John M. Schanck, Peter Schwabe, Gregor Seiler, Damien Stehle
Euro S&P, 2018
Joppe W. Bos, Leo Ducas, Eike Kiltz, Tancrede Lepoint, Vadim Lyubashevsky, John M. Schanck, Peter Schwabe, Gregor Seiler, Damien Stehle
Euro S&P, 2018
Sub-Linear Lattice-Based Zero-Knowledge Arguments for Arithmetic Circuits
Carsten Baum, Jonathan Bootle, Andrea Cerulli, Rafael del Pino, Jens Groth, Vadim Lyubashevsky
Crypto, 2018
Carsten Baum, Jonathan Bootle, Andrea Cerulli, Rafael del Pino, Jens Groth, Vadim Lyubashevsky
Crypto, 2018
More Efficient Commitments from Structured Lattice Assumptions
Carsten Baum, Ivan Damgard, Vadim Lyubashevsky, Sabine Oechsner, Chris Peikert
SCN, 2018
Carsten Baum, Ivan Damgard, Vadim Lyubashevsky, Sabine Oechsner, Chris Peikert
SCN, 2018
Asymptotically Efficient Lattice-Based Digital Signatures
Vadim Lyubashevsky, Daniele Micciancio
J. Cryptology 31(3), 774--797, 2018
Vadim Lyubashevsky, Daniele Micciancio
J. Cryptology 31(3), 774--797, 2018
Lattice-Based Group Signatures and Zero-Knowledge Proofs of Automorphism Stability
Rafael del Pino, Vadim Lyubashevsky, Gregor Seiler
CCS, 2018
Rafael del Pino, Vadim Lyubashevsky, Gregor Seiler
CCS, 2018
Updatable Encryption with Post-Compromise Security
Anja Lehmann, Bjoern Tackmann
Advances in Cryptology - EUROCRYPT, Springer, 2018
Anja Lehmann, Bjoern Tackmann
Advances in Cryptology - EUROCRYPT, Springer, 2018
The Wonderful World of Global Random Oracles
Jan Camenisch, Manu Drijvers, Tommaso Gagliardoni, Anja Lehmann, Gregory Neven
Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part I, pp. 280--312
Jan Camenisch, Manu Drijvers, Tommaso Gagliardoni, Anja Lehmann, Gregory Neven
Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part I, pp. 280--312
Collusion-Resistant Processing of SQL Range Predicates
Manish Kesarwani, Akshar Kaul, Gagandeep Singh, Prasad M. Deshpande, Jayant R. Haritsa
Data Science and Engineering 3(4), 323--340, 2018
Manish Kesarwani, Akshar Kaul, Gagandeep Singh, Prasad M. Deshpande, Jayant R. Haritsa
Data Science and Engineering 3(4), 323--340, 2018
Efficient Secure k-Nearest Neighbours over Encrypted Data
Manish Kesarwani, Akshar Kaul, Prasad Naldurg, Sikhar Patranabis, Gagandeep Singh, Sameep Mehta, Debdeep Mukhopadhyay
Proceedings of the 21th International Conference on Extending Database Technology, EDBT 2018, Vienna, Austria, March 26-29, 2018., pp. 564--575
Manish Kesarwani, Akshar Kaul, Prasad Naldurg, Sikhar Patranabis, Gagandeep Singh, Sameep Mehta, Debdeep Mukhopadhyay
Proceedings of the 21th International Conference on Extending Database Technology, EDBT 2018, Vienna, Austria, March 26-29, 2018., pp. 564--575
Collusion-Resistant Processing of SQL Range Predicates
Manish Kesarwani, Akshar Kaul, Gagandeep Singh, Prasad M. Deshpande, Jayant R. Haritsa
Database Systems for Advanced Applications - 23rd International Conference, DASFAA 2018, Gold Coast, QLD, Australia, May 21-24, 2018, Proceedings, Part II, pp. 211--227
Manish Kesarwani, Akshar Kaul, Gagandeep Singh, Prasad M. Deshpande, Jayant R. Haritsa
Database Systems for Advanced Applications - 23rd International Conference, DASFAA 2018, Gold Coast, QLD, Australia, May 21-24, 2018, Proceedings, Part II, pp. 211--227
Protecting Intellectual Property of Deep Neural Networks with Watermarking
Jialong Zhang, Zhongshu Gu, Jiyong Jang, Hui Wu, Marc Ph. Stoecklin, Heqing Huang, Ian Molloy
Proceedings of the ACM Asia Conference on Computer and Communications Security (AsiaCCS), 2018
Jialong Zhang, Zhongshu Gu, Jiyong Jang, Hui Wu, Marc Ph. Stoecklin, Heqing Huang, Ian Molloy
Proceedings of the ACM Asia Conference on Computer and Communications Security (AsiaCCS), 2018
Dressed Up: Baiting Attackers through Endpoint Service Projection
Marc Ph. Stoecklin, Jialong Zhang, Frederico Araujo and Teryl Taylor
SDN-NFV Security '18: Proceedings of the ACM Workshop on Security in Software Defined Networks & Network Function Virtualization (in conjunction with CODASPY '18), 2018
Marc Ph. Stoecklin, Jialong Zhang, Frederico Araujo and Teryl Taylor
SDN-NFV Security '18: Proceedings of the ACM Workshop on Security in Software Defined Networks & Network Function Virtualization (in conjunction with CODASPY '18), 2018
Hidden in Plain Sight: Filesystem View Separation for Data Integrity and Deception
Teryl Taylor, Frederico Araujo, Anne Kohlbrenner, Marc Ph. Stoecklin
Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), 2018
Teryl Taylor, Frederico Araujo, Anne Kohlbrenner, Marc Ph. Stoecklin
Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), 2018
Cross-Stack Threat Sensing for Cyber Security and Resilience
Frederico Araujo, Teryl Taylor, Jialong Zhang, Marc Ph. Stoecklin
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2018
Frederico Araujo, Teryl Taylor, Jialong Zhang, Marc Ph. Stoecklin
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2018
Error-Sensor: Mining Information from HTTP Error Traffic for Malware Intelligence
Jialong Zhang, Jiyong Jang, Guofei Gu, Marc Ph. Stoecklin, and Xin Hu
Proceedings of the International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2018
Jialong Zhang, Jiyong Jang, Guofei Gu, Marc Ph. Stoecklin, and Xin Hu
Proceedings of the International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2018
DeepLocker - Concealing Targeted Attacks with AI Locksmithing
Dhilung Kirat, Jiyong Jang, and Marc Ph. Stoecklin
Black Hat USA, 2018
Dhilung Kirat, Jiyong Jang, and Marc Ph. Stoecklin
Black Hat USA, 2018
Threat Intelligence Computing
Xiaokui Shu, Frederico Araujo, Douglas L. Schales, Marc Ph. Stoecklin, Jiyong Jang, Heqing Huang, Josyula R. Rao
Proceedings of the 2018 ACM Conference on Computer and Communications Security (CCS), pp. 1883--1898, ACM
Xiaokui Shu, Frederico Araujo, Douglas L. Schales, Marc Ph. Stoecklin, Jiyong Jang, Heqing Huang, Josyula R. Rao
Proceedings of the 2018 ACM Conference on Computer and Communications Security (CCS), pp. 1883--1898, ACM
Model Extraction Warning in MLaaS Paradigm
Manish Kesarwani, Bhaskar Mukhoty, Vijay Arya, Sameep Mehta
Proceedings of the 34th Annual Conference on Computer Security Applications, ACSAC 2018, San Juan, Puerto Rico, USA, December 3ÿýÿ 7, ACM
Manish Kesarwani, Bhaskar Mukhoty, Vijay Arya, Sameep Mehta
Proceedings of the 34th Annual Conference on Computer Security Applications, ACSAC 2018, San Juan, Puerto Rico, USA, December 3ÿýÿ 7, ACM
2017
Per-Session Security: Password-Based Cryptography Revisited
Gregory Demay, Peter Gazi, Ueli Maurer, Bjoern Tackmann
ESORICS, Springer, 2017
Gregory Demay, Peter Gazi, Ueli Maurer, Bjoern Tackmann
ESORICS, Springer, 2017
Secure Event Tickets on a Blockchain
Bjoern Tackmann
Data Privacy Management, Cryptocurrencies and Blockchain Technology, Springer, 2017
Bjoern Tackmann
Data Privacy Management, Cryptocurrencies and Blockchain Technology, Springer, 2017
Moderately Hard Functions: Definitions, Instantiations, and Applications
Joel Alwen, Bjoern Tackmann
Theory of Cryptography, Springer, 2017
Joel Alwen, Bjoern Tackmann
Theory of Cryptography, Springer, 2017
Amortization with Fewer Equations for Proving Knowledge of Small Secrets
Rafael del Pino, Vadim Lyubashevsky
Crypto, 2017
Rafael del Pino, Vadim Lyubashevsky
Crypto, 2017
Practical Quantum-Safe Voting from Lattices
Rafael del Pino, Vadim Lyubashevsky, Gregory Neven, Gregor Seiler
CCS, 2017
Rafael del Pino, Vadim Lyubashevsky, Gregory Neven, Gregor Seiler
CCS, 2017
Updatable Tokenization: Formal Definitions and Provably Secure Constructions
C Cachin, J Camenisch, E Freire-Stoegbuchner, A Lehmann
Financial Crypto, 2017
Abstract
C Cachin, J Camenisch, E Freire-Stoegbuchner, A Lehmann
Financial Crypto, 2017
Abstract
Privacy-Preserving User-Auditable Pseudonym Systems
J Camenisch, A Lehmann
IEEE EuroS&P - European Symposium on Security and Privacy, 2017
Abstract
J Camenisch, A Lehmann
IEEE EuroS&P - European Symposium on Security and Privacy, 2017
Abstract
One TPM to Bind Them All: Fixing TPM2.0 for Provably Secure Anonymous Attestation
Jan Camenisch, Liqun Chen, Manu Drijvers, Anja Lehmann, David Novick, Rainer Urian
IEEE S&P, 2017
Abstract
Jan Camenisch, Liqun Chen, Manu Drijvers, Anja Lehmann, David Novick, Rainer Urian
IEEE S&P, 2017
Abstract
UC-Secure Non-Interactive Public-Key Encryption
Jan Camenisch, Anja Lehmann, Gregory Neven, Kai Samelin
IEEE CSF - Computer Security Foundations Symposium, , IEEE, 2017
Abstract
Jan Camenisch, Anja Lehmann, Gregory Neven, Kai Samelin
IEEE CSF - Computer Security Foundations Symposium, , IEEE, 2017
Abstract
Anonymous Attestation with Subverted TPMs
Jan Camenisch, Manu Drijvers, Anja Lehmann
Advances in Cryptography - CRYPTO 2017, Springer
Abstract
Jan Camenisch, Manu Drijvers, Anja Lehmann
Advances in Cryptography - CRYPTO 2017, Springer
Abstract
Android Malware Clustering through Malicious Payload Mining
Yuping Li, Jiyong Jang, Xin Hu, and Xinming Ou
Proceedings of the International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2017
Yuping Li, Jiyong Jang, Xin Hu, and Xinming Ou
Proceedings of the International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2017
Hidden in Plain Sight: A Filesystem for Data Integrity and Confidentiality
Anne Kohlbrenner, Frederico Araujo, Teryl Taylor, Marc Ph. Stoecklin
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 2523--2525, ACM
Anne Kohlbrenner, Frederico Araujo, Teryl Taylor, Marc Ph. Stoecklin
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 2523--2525, ACM
Unsupervised Deep Embedding for Novel Class Detection over Data Stream
Ahmad M. Mustafa, Gbadebo Ayoade, Khaled Al-Naami, Latifur Khan, Kevin W. Hamlen, Bhavani Thuraisingham, Frederico Araujo
IEEE International Conference on Big Data, 2017
Ahmad M. Mustafa, Gbadebo Ayoade, Khaled Al-Naami, Latifur Khan, Kevin W. Hamlen, Bhavani Thuraisingham, Frederico Araujo
IEEE International Conference on Big Data, 2017
Anomaly Detection as a Service: Challenges, Advances, and Opportunities
Danfeng (Daphne) Yao, Xiaokui Shu, Long Cheng, Salvatore J. Stolfo
Synthesis Lectures on Information Security, Privacy, and Trust 9(3), 1--173, 2017
Danfeng (Daphne) Yao, Xiaokui Shu, Long Cheng, Salvatore J. Stolfo
Synthesis Lectures on Information Security, Privacy, and Trust 9(3), 1--173, 2017
Precisely and Scalably Vetting JavaScript Bridge In Android Hybrid Apps
Guangliang Yang, Abner Mendoza, Jialong Zhang, Guofei Gu
Proceedings of the International Symposium on Research on Attacks, Intrusions and Defenses (RAID), 2017
Guangliang Yang, Abner Mendoza, Jialong Zhang, Guofei Gu
Proceedings of the International Symposium on Research on Attacks, Intrusions and Defenses (RAID), 2017
Attacking the Brain: Races in the SDN Control Plane
Lei Xu, Jeff Huang, Sungmin Hong, Jialong Zhang, and Guofei Gu
Proceedings of the 26th USENIX Security Symposium, 2017
Abstract
Lei Xu, Jeff Huang, Sungmin Hong, Jialong Zhang, and Guofei Gu
Proceedings of the 26th USENIX Security Symposium, 2017
Abstract
Understanding the Market-Level and Network-Level Behaviors of the Android Malware Ecosystem
Chao Yang, Jialong Zhang, and Guofei Gu
2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), , pp. 2452--2457
Abstract
Chao Yang, Jialong Zhang, and Guofei Gu
2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), , pp. 2452--2457
Abstract
Brief Announcement: A Consent Management Solution for Enterprises
Abigail Goldsteen, Shelly Garion, Sima Nadler, Natalia Razinkov, Yosef Moatti, Paula Ta-Shma
Cyber Security Cryptography and Machine Learning First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings
Abigail Goldsteen, Shelly Garion, Sima Nadler, Natalia Razinkov, Yosef Moatti, Paula Ta-Shma
Cyber Security Cryptography and Machine Learning First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings
2016
Multi-User Security of Authenticated Encryption: AES-GCM in TLS 1.3
Mihir Bellare, Bjoern Tackmann
Advances in Cryptology - CRYPTO, Springer, 2016
Mihir Bellare, Bjoern Tackmann
Advances in Cryptology - CRYPTO, Springer, 2016
Nonce-Based Cryptography: Retaining Security when Randomness Fails
Mihir Bellare, Bjoern Tackmann
Advances in Cryptology - EUROCRYPT, Springer, 2016
Mihir Bellare, Bjoern Tackmann
Advances in Cryptology - EUROCRYPT, Springer, 2016
Non-Malleable Encryption: Simpler, Shorter, Stronger
Sandro Coretti, Yevgeniy Dodis, Bjoern Tackmann, Daniele Venturi
Theory of Cryptography, Springer, 2016
Sandro Coretti, Yevgeniy Dodis, Bjoern Tackmann, Daniele Venturi
Theory of Cryptography, Springer, 2016
Tightly Secure Signatures From Lossy Identification Schemes
Michel Abdalla, Pierre-Alain Fouque, Vadim Lyubashevsky, Mehdi Tibouchi
J. Cryptology 29(3), 597--631, 2016
Michel Abdalla, Pierre-Alain Fouque, Vadim Lyubashevsky, Mehdi Tibouchi
J. Cryptology 29(3), 597--631, 2016
The Whole is Less Than the Sum of Its Parts: Constructing More Efficient Lattice-Based AKEs
Rafael del Pino, Vadim Lyubashevsky, David Pointcheval
SCN, 2016
Rafael del Pino, Vadim Lyubashevsky, David Pointcheval
SCN, 2016
Digital Signatures Based on the Hardness of Ideal Lattice Problems in All Rings
Vadim Lyubashevsky
Asiacrypt, 2016
Vadim Lyubashevsky
Asiacrypt, 2016
Anonymous Attestation Using the Strong Diffie Hellman Assumption Revisited
J Camenisch, M Drijvers, A Lehmann
9th International Conference on Trust & Trustworthy Computing - TRUST 2016, Springer, LNCS
Abstract
J Camenisch, M Drijvers, A Lehmann
9th International Conference on Trust & Trustworthy Computing - TRUST 2016, Springer, LNCS
Abstract
Universally Composable Direct Anonymous Attestation
Jan Camenisch, Manu Drijvers, Anja Lehmann
PKC, 2016
Abstract
Jan Camenisch, Manu Drijvers, Anja Lehmann
PKC, 2016
Abstract
Virtual Smart Cards: How to Sign with a Password and a Server
J Camenisch, A Lehmann, G Neven, K Samelin
SCN, 2016
Abstract
J Camenisch, A Lehmann, G Neven, K Samelin
SCN, 2016
Abstract
Hunting for Invisibility: Characterizing and Detecting Malicious Web Infrastructures through Server Visibility Analysis
Jialong Zhang, Xin Hu, Jiyong Jang, Ting Wang, Guofei Gu, Marc Ph. Stoecklin
Proceedings of IEEE International Conference on Computer Communications (INFOCOM'16), 2016
Jialong Zhang, Xin Hu, Jiyong Jang, Ting Wang, Guofei Gu, Marc Ph. Stoecklin
Proceedings of IEEE International Conference on Computer Communications (INFOCOM'16), 2016
Detecting Malicious Exploit Kits using Tree-based Similarity Searches
Teryl Taylor, Xin Hu, Ting Wang, Jiyong Jang, Marc Ph. Stoecklin, Fabian Monrose, and Reiner Sailer
Proceedings of the ACM Conference on Data and Application Security and Privacy (CODASPY), 2016
Teryl Taylor, Xin Hu, Ting Wang, Jiyong Jang, Marc Ph. Stoecklin, Fabian Monrose, and Reiner Sailer
Proceedings of the ACM Conference on Data and Application Security and Privacy (CODASPY), 2016
BAYWATCH: Robust Beaconing Detection to Identify Infected Hosts in Large-Scale Enterprise Networks
Xin Hu, Jiyong Jang, Marc Ph. Stoecklin, Ting Wang, Douglas L. Schales, Dhilung Kirat, and Josyula R. Rao
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2016
Xin Hu, Jiyong Jang, Marc Ph. Stoecklin, Ting Wang, Douglas L. Schales, Dhilung Kirat, and Josyula R. Rao
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2016
BotMeter: Charting DGA-Botnet Landscapes in Large Networks
Ting Wang, Xin Hu, Jiyong Jang, Shouling Ji, Marc Ph. Stoecklin, and Teryl Taylor
Proceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS), 2016
Ting Wang, Xin Hu, Jiyong Jang, Shouling Ji, Marc Ph. Stoecklin, and Teryl Taylor
Proceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS), 2016
Scalable malware classification with multifaceted content features and threat intelligence
Xin Hu, Jiyong Jang, Ting Wang, Zubair Ashraf, Marc Ph. Stoecklin, Dhilung Kirat
IBM Journal of Research and Development 60(4), 2016
Xin Hu, Jiyong Jang, Ting Wang, Zubair Ashraf, Marc Ph. Stoecklin, Dhilung Kirat
IBM Journal of Research and Development 60(4), 2016
Scalable Analytics to Detect DNS Misuse for Establishing Stealthy Communication Channels
Douglas L. Schales, Jiyong Jang, Ting Wang, Xin Hu, Dhilung Kirat, Ben Wuest, Marc Ph. Stoecklin
IBM Journal of Research and Development 60(4), 2016
Douglas L. Schales, Jiyong Jang, Ting Wang, Xin Hu, Dhilung Kirat, Ben Wuest, Marc Ph. Stoecklin
IBM Journal of Research and Development 60(4), 2016
Security 360°: Enterprise security for the cognitive era
Josyula R. Rao, Suresh N. Chari, Dimitrios Pendarakis, Reiner Sailer, Marc Ph. Stoecklin, Wilfried Teiken, Andreas Wespi
IBM Journal of Research and Development 60(4), 2016
Josyula R. Rao, Suresh N. Chari, Dimitrios Pendarakis, Reiner Sailer, Marc Ph. Stoecklin, Wilfried Teiken, Andreas Wespi
IBM Journal of Research and Development 60(4), 2016
Closing the loop: Network and in-host monitoring tandem for comprehensive cloud security visibility
S. Berger, Y. Chen, X. Hu, D. Pendarakis, J. R. Rao, R. Sailer, D. L. Schales, M. P. Stoecklin
IBM Journal of Research and Development 60(4), 10:1-10:12, 2016
S. Berger, Y. Chen, X. Hu, D. Pendarakis, J. R. Rao, R. Sailer, D. L. Schales, M. P. Stoecklin
IBM Journal of Research and Development 60(4), 10:1-10:12, 2016
Security intelligence for industrial control systems
Andreas Amrein, Valentino Angeletti, Anton Beitler, Marcel Német, Micha Reiser, Simone Riccetti, Marc Ph. Stoecklin, Andreas Wespi
IBM Journal of Research and Development 60(4), 2016
Andreas Amrein, Valentino Angeletti, Anton Beitler, Marcel Német, Micha Reiser, Simone Riccetti, Marc Ph. Stoecklin, Andreas Wespi
IBM Journal of Research and Development 60(4), 2016
Passive security intelligence to analyze the security risks of mobile/BYOD activities
Marc Ph. Stoecklin, Kapil Singh, Larry Koved, Xin Hu, Suresh N. Chari, Josyula R. Rao, P.C. Cheng, Mihai Christodorescu, Reiner Sailer and Douglas Lee Schales
IBM Journal of Research and Development, 2016
Marc Ph. Stoecklin, Kapil Singh, Larry Koved, Xin Hu, Suresh N. Chari, Josyula R. Rao, P.C. Cheng, Mihai Christodorescu, Reiner Sailer and Douglas Lee Schales
IBM Journal of Research and Development, 2016
2015
How Fair is Your Protocol? A Utility-based Approach to Protocol Optimality
Juan A. Garay, Jonathan Katz, Bjoern Tackmann, Vassilis Zikas
Principles Of Distributed Computing, ACM Press, 2015
Juan A. Garay, Jonathan Katz, Bjoern Tackmann, Vassilis Zikas
Principles Of Distributed Computing, ACM Press, 2015
(De-) Constructing TLS 1.3
Markulf Kohlweiss, Ueli Maurer, Cristina Onete, Bjoern Tackmann, Daniele Venturi
INDOCRYPT, pp. 85--102, Springer, 2015
Markulf Kohlweiss, Ueli Maurer, Cristina Onete, Bjoern Tackmann, Daniele Venturi
INDOCRYPT, pp. 85--102, Springer, 2015
Query-Complexity Amplification for Random Oracles
Gregory Demay, Peter Gazi, Ueli Maurer, Bjoern Tackmann
Information Theoretic Security, pp. 159--180, Springer, 2015
Gregory Demay, Peter Gazi, Ueli Maurer, Bjoern Tackmann
Information Theoretic Security, pp. 159--180, Springer, 2015
Fair Distributed Computation of Reactive Functions
Juan A. Garay, Bjoern Tackmann, Vassilis Zikas
DISC, pp. 497--512, Springer, 2015
Juan A. Garay, Bjoern Tackmann, Vassilis Zikas
DISC, pp. 497--512, Springer, 2015
Robust Authenticated Encryption and the Limits of Symmetric Cryptography
Christian Badertscher, Christian Matt, Ueli Maurer, Phillip Rogaway, Bjoern Tackmann
IMA International Conference on Cryptography and Coding, Springer, 2015
Christian Badertscher, Christian Matt, Ueli Maurer, Phillip Rogaway, Bjoern Tackmann
IMA International Conference on Cryptography and Coding, Springer, 2015
Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer
Christian Badertscher, Christian Matt, Ueli Maurer, Phillip Rogaway, Bjoern Tackmann
Provable Security, pp. 85--104, Springer, 2015
Christian Badertscher, Christian Matt, Ueli Maurer, Phillip Rogaway, Bjoern Tackmann
Provable Security, pp. 85--104, Springer, 2015
From Single-Bit to Multi-Bit Public-Key Encryption via Non-Malleable Codes
Sandro Coretti, Ueli Maurer, Bjoern Tackmann, Daniele Venturi
Theory of Cryptography, pp. 532--560, Springer, 2015
Sandro Coretti, Ueli Maurer, Bjoern Tackmann, Daniele Venturi
Theory of Cryptography, pp. 532--560, Springer, 2015
Efficient Zero-Knowledge Proofs for Commitments from Learning with Errors over Rings
Fabrice Benhamouda, Stephan Krenn, Vadim Lyubashevsky, Krzysztof Pietrzak
ESORICS, 2015
Fabrice Benhamouda, Stephan Krenn, Vadim Lyubashevsky, Krzysztof Pietrzak
ESORICS, 2015
Quadratic Time, Linear Space Algorithms for Gram-Schmidt Orthogonalization and Gaussian Sampling in Structured Lattices
Vadim Lyubashevsky, Thomas Prest
Eurocrypt, 2015
Vadim Lyubashevsky, Thomas Prest
Eurocrypt, 2015
Simple Lattice Trapdoor Sampling from a Broad Class of Distributions
Vadim Lyubashevsky, Daniel Wichs
PKC, 2015
Vadim Lyubashevsky, Daniel Wichs
PKC, 2015
Lattice-Based Signatures: Optimization and Implementation on Reconfigurable Hardware
Tim Guneysu, Vadim Lyubashevsky, Thomas Poppelmann
IEEE Trans. Computers 64(7), 1954--1967, 2015
Tim Guneysu, Vadim Lyubashevsky, Thomas Poppelmann
IEEE Trans. Computers 64(7), 1954--1967, 2015
[Book Chapter] An Architecture for Privacy-ABCs
P Bichsel, J Camenisch, M Dubovitskaya, R Enderlein, S Krenn, A Lehmann, G Neven, F-S Preiss
Attribute-based Credentials for Trust - Identity in the Information Society, Springer, 2015
P Bichsel, J Camenisch, M Dubovitskaya, R Enderlein, S Krenn, A Lehmann, G Neven, F-S Preiss
Attribute-based Credentials for Trust - Identity in the Information Society, Springer, 2015
[Book Chapter] Cryptographic Protocols Underlying Privacy-ABCs
P Bichsel, J Camenisch, M Dubovitskaya, R Enderlein, S Krenn, A Lehmann, G Neven, F-S Preiss
Attribute-based Credentials for Trust - Identity in the Information Society, Springer, 2015
P Bichsel, J Camenisch, M Dubovitskaya, R Enderlein, S Krenn, A Lehmann, G Neven, F-S Preiss
Attribute-based Credentials for Trust - Identity in the Information Society, Springer, 2015
Recovering Lost Device-Bound Credentials
F Baldimtsi, J Camenisch, L Hanzlik, S Krenn, A Lehmann, G Neven
International Conference on Applied Cryptography and Network Security - ACNS, Springer, LNCS, 2015
Abstract
F Baldimtsi, J Camenisch, L Hanzlik, S Krenn, A Lehmann, G Neven
International Conference on Applied Cryptography and Network Security - ACNS, Springer, LNCS, 2015
Abstract
Formal Treatment of Privacy-Enhancing Credential Systems
J Camenisch, S Krenn, A Lehmann, G Mikkelsen, G Neven, M Pedersen
Selected Areas in Cryptography - SAC, 2015
Abstract
J Camenisch, S Krenn, A Lehmann, G Mikkelsen, G Neven, M Pedersen
Selected Areas in Cryptography - SAC, 2015
Abstract
Privacy for Distributed Databases via (Un)linkable Pseudonyms
J Camenisch, A Lehmann
ACM CCS, 2015
Abstract
J Camenisch, A Lehmann
ACM CCS, 2015
Abstract
The Dropper Effect: Insights into Malware Distribution with Downloader Graph Analytics
Bum Jun Kwon, Jayanta Mondal, Jiyong Jang, Leyla Bilge, Tudor Dumitras
Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2015
Bum Jun Kwon, Jayanta Mondal, Jiyong Jang, Leyla Bilge, Tudor Dumitras
Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2015
Experimental Study of Fuzzy Hashing in Malware Clustering Analysis
Yuping Li, Sathya Chandran Sundaramurthy, Alexandru G. Bardas, Xinming Ou, Doina Caragea, Xin Hu, Jiyong Jang
Proceedings of the Workshop on Cyber Security Experimentation and Test (CSET), 2015
Yuping Li, Sathya Chandran Sundaramurthy, Alexandru G. Bardas, Xinming Ou, Doina Caragea, Xin Hu, Jiyong Jang
Proceedings of the Workshop on Cyber Security Experimentation and Test (CSET), 2015
Rateless and Pollution-Attack-Resilient Network Coding
Wentao Huang, Ting Wang, Xin Hu, Jiyong Jang, and Theodoros Salonidis
Proceedings of the IEEE International Symposium on Information Theory (ISIT), 2015
Wentao Huang, Ting Wang, Xin Hu, Jiyong Jang, and Theodoros Salonidis
Proceedings of the IEEE International Symposium on Information Theory (ISIT), 2015
FCCE: Highly Scalable Distributed Feature Collection and Correlation Engine for Low Latency Big Data Analytics
Douglas Schales, Xin Hu, Jiyong Jang, Reiner Sailer, Marc Ph. Stoecklin, and Ting Wang.
Proceedings of the 31st IEEE International Conference on Data Engineering (ICDE '15), 2015
Douglas Schales, Xin Hu, Jiyong Jang, Reiner Sailer, Marc Ph. Stoecklin, and Ting Wang.
Proceedings of the 31st IEEE International Conference on Data Engineering (ICDE '15), 2015
SecGraph: A Uniform and Open-source Evaluation System for Graph Data Anonymization and De-anonymization
Shouling Ji, Weiqing Li, Prateek Mittal, Xin Hu, and Raheem Beyah
Proceedings of the 24th USENIX Security Symposium (USENIX Security), 2015
Shouling Ji, Weiqing Li, Prateek Mittal, Xin Hu, and Raheem Beyah
Proceedings of the 24th USENIX Security Symposium (USENIX Security), 2015
Indexing Earth Mover's Distance over Network Metrics
Ting Wang, Shicong Meng, and Jiang Bian
IEEE Transactions on Knowledge and Data Engineering (TKDE) 27(6), 1588-1601, 2015
Ting Wang, Shicong Meng, and Jiang Bian
IEEE Transactions on Knowledge and Data Engineering (TKDE) 27(6), 1588-1601, 2015
2013
Panel on granularity in access control
Ian Molloy, Mahesh V. Tripunitara, Volkmar Lotz, Martin Kuhlmann, Casey Schaufler, Vijay Atluri
SACMAT, pp. 85-86, 2013
Ian Molloy, Mahesh V. Tripunitara, Volkmar Lotz, Martin Kuhlmann, Casey Schaufler, Vijay Atluri
SACMAT, pp. 85-86, 2013
A bigData platform for analytics on access control policies
and logs
Suresh Chari, Ted Habeck, Ian Molloy, Youngja Park, Wilfried Teiken
SACMAT, pp. 185-188, 2013
Suresh Chari, Ted Habeck, Ian Molloy, Youngja Park, Wilfried Teiken
SACMAT, pp. 185-188, 2013
Ensuring continuous compliance through reconciling policy
with usage
Suresh Chari, Ian Molloy, Youngja Park, Wilfried Teiken
SACMAT, pp. 49-60, 2013
Suresh Chari, Ian Molloy, Youngja Park, Wilfried Teiken
SACMAT, pp. 49-60, 2013
2012
Enhancing Javascript with Transactions
Mohan Dhawan, Chung-chieh Shan, Vinod Ganapathy
26th European Conference on Object-Oriented Programming (ECOOP'12), pp. 383--408, Springer, 2012
Mohan Dhawan, Chung-chieh Shan, Vinod Ganapathy
26th European Conference on Object-Oriented Programming (ECOOP'12), pp. 383--408, Springer, 2012
Fathom: A Browser-based Network Measurement Platform
Mohan Dhawan, Justin Samuel, Renata Teixeira, Christian Kreibich, Mark Allman, Nicholas Weaver, Vern Paxson
12th ACM Conference on Internet Measurement Conference (IMC'12), pp. 73--86, 2012
Mohan Dhawan, Justin Samuel, Renata Teixeira, Christian Kreibich, Mark Allman, Nicholas Weaver, Vern Paxson
12th ACM Conference on Internet Measurement Conference (IMC'12), pp. 73--86, 2012
Priv3: A Third Party Cookie Policy
Mohan Dhawan, Christian Kreibich, Nicholas Weaver
W3C Workshop: Do Not Track and Beyond, 2012
Mohan Dhawan, Christian Kreibich, Nicholas Weaver
W3C Workshop: Do Not Track and Beyond, 2012
An Analysis of the Mozilla Jetpack Extension Framework
Rezwana Karim, Mohan Dhawan, Vinod Ganapathy, Chung-chieh Shan
26th European Conference on Object-Oriented Programming (ECOOP'12), pp. 333--355, Springer, 2012
Rezwana Karim, Mohan Dhawan, Vinod Ganapathy, Chung-chieh Shan
26th European Conference on Object-Oriented Programming (ECOOP'12), pp. 333--355, Springer, 2012
Using probabilistic generative models for ranking risks
of Android apps
Hao Peng, Christopher S. Gates, Bhaskar Pratim Sarma, Ninghui Li, Yuan Qi, Rahul Potharaju, Cristina Nita-Rotaru, Ian Molloy
ACM Conference on Computer and Communications Security, pp. 241-252, 2012
Hao Peng, Christopher S. Gates, Bhaskar Pratim Sarma, Ninghui Li, Yuan Qi, Rahul Potharaju, Cristina Nita-Rotaru, Ian Molloy
ACM Conference on Computer and Communications Security, pp. 241-252, 2012
Android Permissions: A Perspective Combining Risks and Benefits
B. Sarma, N. Li, C. Gates, R. Potharaju, C. Nita-Rotaru, I. Molloy
ACM Symposium on Access Control Models and Technologies (SACMAT), 2012
B. Sarma, N. Li, C. Gates, R. Potharaju, C. Nita-Rotaru, I. Molloy
ACM Symposium on Access Control Models and Technologies (SACMAT), 2012
Generative Models for Access Control Policies: Applications to Role Mining Over Logs with Attribution
Ian Molloy, Youngja Park, and Suresh Chari.
ACM Symposium on Access Control Models and Technologies (SACMAT), 2012
Ian Molloy, Youngja Park, and Suresh Chari.
ACM Symposium on Access Control Models and Technologies (SACMAT), 2012
Slicing: A New Approach for Privacy Preserving Data Publishing
Tiancheng Li, Ninghui Li, Jian Zhang, Ian Molloy
IEEE Trans. Knowl. Data Eng. 24(3), 561--574, 2012
Tiancheng Li, Ninghui Li, Jian Zhang, Ian Molloy
IEEE Trans. Knowl. Data Eng. 24(3), 561--574, 2012
Learning Stochastic Models of Information Flow
Luke Dickens, Ian Molloy, Jorge Lobo, Pau-Chen Cheng, Alessandra Russo
Proceedings of the 28th IEEE International Conference on Data Engineering (ICDE), 2012
Luke Dickens, Ian Molloy, Jorge Lobo, Pau-Chen Cheng, Alessandra Russo
Proceedings of the 28th IEEE International Conference on Data Engineering (ICDE), 2012
Risk-Based Security Decisions Under Uncertainty
Ian Molloy, Luke Dickens, Charles Morisset, Pau-Chen Cheng, Jorge Lobo, Alessandra Russo
Proceedings of the Second ACM Conference on Data and Application Security and Privacy (CODASPY), 2012
Ian Molloy, Luke Dickens, Charles Morisset, Pau-Chen Cheng, Jorge Lobo, Alessandra Russo
Proceedings of the Second ACM Conference on Data and Application Security and Privacy (CODASPY), 2012
Biometric Authentication on a Mobile Device: A Study of User Effort, Error and Task Disruption
Shari Trewin, Cal Swart, Larry Koved, Jacquelyn Martino, Kapil Singh, Shay Ben-David
Proceedings of the 28th Annual Computer Security Applications Conference (ACSAC), 2012
Shari Trewin, Cal Swart, Larry Koved, Jacquelyn Martino, Kapil Singh, Shay Ben-David
Proceedings of the 28th Annual Computer Security Applications Conference (ACSAC), 2012
Limitations of Generating a Secret Key Using Wireless Fading Under Active Adversary
M. Zafer, D. Agrawal, M. Srivatsa
IEEE/ACM Transactions on Networking, IEEE, 2012
M. Zafer, D. Agrawal, M. Srivatsa
IEEE/ACM Transactions on Networking, IEEE, 2012
The Impact of TLS on SIP Server Performance: Measurement and Modeling
Charles Shen and Erich Nahum and Henning Schulzrinne and Charles P. Wright
IEEE/ACM Transactions on Networking 20(4), IEEE, 2012
Charles Shen and Erich Nahum and Henning Schulzrinne and Charles P. Wright
IEEE/ACM Transactions on Networking 20(4), IEEE, 2012
On the Confidentiality of Information Dispersal Algorithms and Their Erasure Codes
M. Li
arXiv preprint arXiv:1206.4123, 2012
M. Li
arXiv preprint arXiv:1206.4123, 2012
Biometric authentication on a mobile device: a study of user effort, error and task disruption (Paper)
Shari Trewin, Calvin Swart, Larry Koved, Jacquelyn Martino, Kapil Singh, Shay Ben-David
28th Annual Computer Security Applications Conference, ACSAC 2012, ACSA
Abstract
Shari Trewin, Calvin Swart, Larry Koved, Jacquelyn Martino, Kapil Singh, Shay Ben-David
28th Annual Computer Security Applications Conference, ACSAC 2012, ACSA
Abstract
2011
Atlantis: Robust, Extensible Execution Environments for Web Applications
James Mickens, Mohan Dhawan
23rd ACM Symposium on Operating Systems Principles (SOSP'11), pp. 217--231, 2011
James Mickens, Mohan Dhawan
23rd ACM Symposium on Operating Systems Principles (SOSP'11), pp. 217--231, 2011
Adversaries' Holy Grail: access control analytics
I Molloy, J Lobo, S Chari
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, pp. 54--61, 2011
I Molloy, J Lobo, S Chari
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, pp. 54--61, 2011
Attack on the GridCode one-time password
I Molloy, N Li
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, pp. 306--315, 2011
I Molloy, N Li
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, pp. 306--315, 2011
Data Kindness on the Internet
Christan Grant, Tyrone Grandison, Kun Liu
Richard Tapia Celebration of Diversity in Computing Conference., 2011
Christan Grant, Tyrone Grandison, Kun Liu
Richard Tapia Celebration of Diversity in Computing Conference., 2011
A Global Virtual Machine Attribute Access Control Policy for Auditing Federated Digital Identities within a Compute Cloud
Sean Thorpe, Indrajit Ray, Indrakshi Ray, Tyrone Grandison, Abbie Barbir
International Journal of Information Assurance and Security (JIAS)6, 2011
Sean Thorpe, Indrajit Ray, Indrakshi Ray, Tyrone Grandison, Abbie Barbir
International Journal of Information Assurance and Security (JIAS)6, 2011
Enabling Security Uniformly Across Cloud Systems
Sean Thorpe, Indrajit Ray, Tyrone Grandison
ACM ASPLOS (Architectural Support for Programming Languages and Operating Systems) RESOLVE (Runtime Environments/Systems, Layering, and Virtualized Environments), ACM Press, 2011
Sean Thorpe, Indrajit Ray, Tyrone Grandison
ACM ASPLOS (Architectural Support for Programming Languages and Operating Systems) RESOLVE (Runtime Environments/Systems, Layering, and Virtualized Environments), ACM Press, 2011
PCTA: Privacy-constrained Clustering-based Transaction Data Anonymization
A. Gkoulalas-Divanis, G. Loukides
4th International Workshop on Privacy and Anonymity in the Information Society, pp. 5, ACM, 2011
A. Gkoulalas-Divanis, G. Loukides
4th International Workshop on Privacy and Anonymity in the Information Society, pp. 5, ACM, 2011
Lessons Learned Building the Caernarvon High-Assurance Smart Card Operating System
P A Karger, S K McIntosh, E R Palmer, D C Toll, S M Weber
IEEE Security and Privacy pp. 99, 1--1, IEEE, 2011
P A Karger, S K McIntosh, E R Palmer, D C Toll, S M Weber
IEEE Security and Privacy pp. 99, 1--1, IEEE, 2011
2010
The Case for JavaScript Transactions: Position Paper
Mohan Dhawan, Chung-chieh Shan, Vinod Ganapathy
5th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS'10), pp. 6, 2010
Mohan Dhawan, Chung-chieh Shan, Vinod Ganapathy
5th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS'10), pp. 6, 2010
Towards an Integrated Approach to Role Engineering
Chris Giblin, Marcel Graf, Gunter Karjoth, Andreas Wespi, Ian Molloy, Jorge Lobo, Seraphin Calo
2nd ACM Workshop on Assurable & Usable Security Configuration (SafeConfig), 2010
Chris Giblin, Marcel Graf, Gunter Karjoth, Andreas Wespi, Ian Molloy, Jorge Lobo, Seraphin Calo
2nd ACM Workshop on Assurable & Usable Security Configuration (SafeConfig), 2010
Mining roles with noisy data
I Molloy, N Li, Y A Qi, J Lobo, L Dickens
Proceeding of the 15th ACM symposium on Access control models and technologies, pp. 45--54, ACM, 2010
I Molloy, N Li, Y A Qi, J Lobo, L Dickens
Proceeding of the 15th ACM symposium on Access control models and technologies, pp. 45--54, ACM, 2010
Towards an integrated approach to role engineering
C Giblin, M Graf, G Karjoth, A Wespi, I Molloy, J Lobo, S Calo
Proceedings of the 3rd ACM workshop on Assurable and usable security configuration, pp. 63--70, 2010
C Giblin, M Graf, G Karjoth, A Wespi, I Molloy, J Lobo, S Calo
Proceedings of the 3rd ACM workshop on Assurable and usable security configuration, pp. 63--70, 2010
METHOD AND SYSTEM FOR HARDWARE BASED PROGRAM FLOW MONITOR FOR EMBEDDED SOFTWARE
S McIntosh, D Brand, M Kaplan, P A Karger, M G McIntosh, E R Palmer, A M Paradkar, D Toll, S M Weber
US Patent US7861305B2
Abstract
S McIntosh, D Brand, M Kaplan, P A Karger, M G McIntosh, E R Palmer, A M Paradkar, D Toll, S M Weber
US Patent US7861305B2
Abstract
Lessons Learned Building the Caernarvon High-Assurance Operating System
P Karger, S McIntosh, E Palmer, D Toll, S Weber
IEEE Security and Privacy, 22--30, IEEE Computer Society, 2010
P Karger, S McIntosh, E Palmer, D Toll, S Weber
IEEE Security and Privacy, 22--30, IEEE Computer Society, 2010
A Declarative Framework for Intrusion Analysis
Matthew Fredrikson, Mihai Christodorescu, Jonathon Giffin, Somesh Jha
Cyber Situational Awareness, 179--200, Springer, 2010
Matthew Fredrikson, Mihai Christodorescu, Jonathon Giffin, Somesh Jha
Cyber Situational Awareness, 179--200, Springer, 2010
Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors
Matt Fredrikson, Somesh Jha, Mihai Christodorescu, Reiner Sailer, Xifeng Yan
IEEE Symposium on Security and Privacy, pp. 45-60, 2010
Matt Fredrikson, Somesh Jha, Mihai Christodorescu, Reiner Sailer, Xifeng Yan
IEEE Symposium on Security and Privacy, pp. 45-60, 2010
AccessMiner: Using System-Centric Models for Malware Protection
Andrea Lanzi, Davide Balzarotti, Christopher Kruegel, Mihai Christodorescu, Engin Kirda
ACM Conference on Computer and Communications Security, pp. 399-412, ACM, 2010
Abstract
Andrea Lanzi, Davide Balzarotti, Christopher Kruegel, Mihai Christodorescu, Engin Kirda
ACM Conference on Computer and Communications Security, pp. 399-412, ACM, 2010
Abstract
Almost optimal bounds for direct product threshold theorem
C Jutla
Theory of Cryptography, 37--51, Springer, 2010
C Jutla
Theory of Cryptography, 37--51, Springer, 2010
Where Do You Want to Go Today? Escalating Privileges by Pathname Manipulation
Suresh Chari, Shai Halevi, Wietse Venema
17th Annual Network and Distributed System Security Symposium (NDSS), 2010
Suresh Chari, Shai Halevi, Wietse Venema
17th Annual Network and Distributed System Security Symposium (NDSS), 2010
Cryptographic Extraction and Key Derivation: The HKDF Scheme
Hugo Krawczyk
2010
\urlhttp://eprint.iacr.org/2010/264
Hugo Krawczyk
2010
\urlhttp://eprint.iacr.org/2010/264
One-Pass HMQV and Asymmetric Key-Wrapping
Shai Halevi, Hugo Krawczyk
2010
\urlhttp://eprint.iacr.org/2010/638
Shai Halevi, Hugo Krawczyk
2010
\urlhttp://eprint.iacr.org/2010/638
i-hop homomorphic encryption and rerandomizable Yao circuits
C Gentry, S Halevi, V Vaikuntanathan
Advances in Cryptology--CRYPTO 2010, 155--172, Springer
C Gentry, S Halevi, V Vaikuntanathan
Advances in Cryptology--CRYPTO 2010, 155--172, Springer
Toward basing fully homomorphic encryption on worst-case hardness
C Gentry
Advances in Cryptology--CRYPTO 2010, 116--137, Springer
C Gentry
Advances in Cryptology--CRYPTO 2010, 116--137, Springer
The Geometry of Provable Security: some proofs of Security in which Lattices make a Surprise Appearance
C Gentry
The LLL Algorithm, 391--426, Springer, 2010
C Gentry
The LLL Algorithm, 391--426, Springer, 2010
Computing arbitrary functions of encrypted data
C Gentry
Communications of the ACM 53(3), 97--105, ACM, 2010
C Gentry
Communications of the ACM 53(3), 97--105, ACM, 2010
A simple BGN-type cryptosystem from LWE
C Gentry, S Halevi, V Vaikuntanathan
Advances in Cryptology--EUROCRYPT 2010, 506--522, Springer
C Gentry, S Halevi, V Vaikuntanathan
Advances in Cryptology--EUROCRYPT 2010, 506--522, Springer
Fully homomorphic encryption over the integers
M Van Dijk, C Gentry, S Halevi, V Vaikuntanathan
Advances in Cryptology--EUROCRYPT 2010, 24--43, Springer
M Van Dijk, C Gentry, S Halevi, V Vaikuntanathan
Advances in Cryptology--EUROCRYPT 2010, 24--43, Springer
Security for Signcryption: The Two-User Model
J H An, T Rabin
Practical Signcryption, 21--42, Springer, 2010
J H An, T Rabin
Practical Signcryption, 21--42, Springer, 2010
Designing a side channel resistant random number generator
S Chari, V Diluoffo, P Karger, E Palmer, T Rabin, J Rao, P Rohotgi, H Scherzer, M Steiner, D Toll
Smart Card Research and Advanced Application, 49--64, Springer, 2010
S Chari, V Diluoffo, P Karger, E Palmer, T Rabin, J Rao, P Rohotgi, H Scherzer, M Steiner, D Toll
Smart Card Research and Advanced Application, 49--64, Springer, 2010
Protecting circuits from leakage: The computationally-bounded and noisy cases
S Faust, T Rabin, L Reyzin, E Tromer, V Vaikuntanathan
Advances in Cryptology--EUROCRYPT 2010, 135--156, Springer
S Faust, T Rabin, L Reyzin, E Tromer, V Vaikuntanathan
Advances in Cryptology--EUROCRYPT 2010, 135--156, Springer
A New and Improved Paradigm for Hybrid Encryption Secure Against Chosen-Ciphertext Attack
Y Desmedt, R Gennaro, K Kurosawa, V Shoup
Journal of cryptology 23(1), 91--120, Springer, 2010
Y Desmedt, R Gennaro, K Kurosawa, V Shoup
Journal of cryptology 23(1), 91--120, Springer, 2010
Constructing certificateless encryption and id-based encryption from id-based key agreement
D Fiore, R Gennaro, N Smart
4th International Conference,, pp. 167--186, Springer, 2010
D Fiore, R Gennaro, N Smart
4th International Conference,, pp. 167--186, Springer, 2010
Identity-based key exchange protocols without pairings
D Fiore, R Gennaro
Transactions on computational science X, 42--77, Springer, 2010
D Fiore, R Gennaro
Transactions on computational science X, 42--77, Springer, 2010
Text search protocols with simulation based security
R Gennaro, C Hazay, J Sorensen
Public Key Cryptography--PKC 2010, 332--350, Springer
R Gennaro, C Hazay, J Sorensen
Public Key Cryptography--PKC 2010, 332--350, Springer
Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal OverheadÿÆ"
R Gennaro, H Krawczyk, T Rabin
Applied Cryptography and Network Security: 8th International Conference, ACNS 2010, , pp. 309
R Gennaro, H Krawczyk, T Rabin
Applied Cryptography and Network Security: 8th International Conference, ACNS 2010, , pp. 309
Making the Diffie-Hellman protocol identity-based
D Fiore, R Gennaro
Topics in Cryptology-CT-RSA 2010, 165--178, Springer
D Fiore, R Gennaro
Topics in Cryptology-CT-RSA 2010, 165--178, Springer
Non-interactive verifiable computing: Outsourcing computation to untrusted workers
R Gennaro, C Gentry, B Parno
Advances in Cryptology--CRYPTO 2010, 465--482, Springer
R Gennaro, C Gentry, B Parno
Advances in Cryptology--CRYPTO 2010, 465--482, Springer
The Impact of TLS on SIP Server Performance
C. Shen, E. Nahum, H. Schulzrinne, C.P. Wright
IPTComm 2010: Principles, Systems and Applications of IP Telecommunications, pp. 59--70, Springer
C. Shen, E. Nahum, H. Schulzrinne, C.P. Wright
IPTComm 2010: Principles, Systems and Applications of IP Telecommunications, pp. 59--70, Springer
Social-Aware Data Diffusion in Delay Tolerant MANETs
Y Zhang, W Gao, G Cao, T La Porta, B Krishnamachari, A Iyengar
Technical Report, 2010
Y Zhang, W Gao, G Cao, T La Porta, B Krishnamachari, A Iyengar
Technical Report, 2010
Providing K-Anonymity in Location Based Services
A Gkoulalas-Divanis, P Kalnis, and V S Verykios
ACM SIGKDD Explorations 12(1), 3--10, ACM, 2010
A Gkoulalas-Divanis, P Kalnis, and V S Verykios
ACM SIGKDD Explorations 12(1), 3--10, ACM, 2010
Towards a Formal Definition of a Computing Cloud
Tyrone Grandison, E Michael Maximilien, Sean Thorpe, Alfredo Alba
The IEEE World Congress on Services (SERVICES), pp. 191--192, 2010
Tyrone Grandison, E Michael Maximilien, Sean Thorpe, Alfredo Alba
The IEEE World Congress on Services (SERVICES), pp. 191--192, 2010
Making Privacy a Fundamental Component of Web Resources
Thomas Duebendorfer, Christoph Renner, Tyrone Grandison, Michael Maximilien, Mark Weitzel
W3C Workshop on Privacy for Advanced Web APIs, 2010
Thomas Duebendorfer, Christoph Renner, Tyrone Grandison, Michael Maximilien, Mark Weitzel
W3C Workshop on Privacy for Advanced Web APIs, 2010
There's Something Stuck In My Shoe (Paper)
Koved, Larry
Security & Privacy Usability Technology Transfer: Emerging Research (SPUTTER) Workshop, Carnegie Mellon CyLab and Microsoft, 2010
Abstract
Koved, Larry
Security & Privacy Usability Technology Transfer: Emerging Research (SPUTTER) Workshop, Carnegie Mellon CyLab and Microsoft, 2010
Abstract
Physical layer enhanced wireless secret key exchange
C. Capar, M. Zafer, D. Goeckel, D. Towsley, D. Agrawal
Annual conference of ITA, 2010
C. Capar, M. Zafer, D. Goeckel, D. Towsley, D. Agrawal
Annual conference of ITA, 2010
Checkpointing virtual machines against transient errors
L Wang, Z Kalbarczyk, R K Iyer, A Iyengar
On-Line Testing Symposium (IOLTS), 2010 IEEE 16th International, pp. 97--102
L Wang, Z Kalbarczyk, R K Iyer, A Iyengar
On-Line Testing Symposium (IOLTS), 2010 IEEE 16th International, pp. 97--102
HIPAA Compliance and Patient Privacy Protection
T Grandison, R Bhatti
13th World Congress on Medical and Health Informatics (MEDINFO), Citeseer, 2010
T Grandison, R Bhatti
13th World Congress on Medical and Health Informatics (MEDINFO), Citeseer, 2010
Privacy for Healthcare Social Networks
E M Maximilien, T Grandison
13th World Congress on Medical and Health Informatics (MEDINFO), Citeseer, 2010
E M Maximilien, T Grandison
13th World Congress on Medical and Health Informatics (MEDINFO), Citeseer, 2010
Hardware Based Mandatory Access Control
W E Hall, G H D Hunt, P A Karger, M F Mergen, D R Safford, D C Toll
W E Hall, G H D Hunt, P A Karger, M F Mergen, D R Safford, D C Toll
ROADTRACK: Scaling Location Updates for Mobile Clients on Road Networks with Query Awareness
P Pesti, L Liu, B Bamba, A Iyengar, M Weber
Proceedings of the VLDB Endowment 3(2), 2010
P Pesti, L Liu, B Bamba, A Iyengar, M Weber
Proceedings of the VLDB Endowment 3(2), 2010
Exploiting cryptography for privacy-enhanced access control
Claudio A.~Ardagna, Jan Camenisch, Markulf Kohlweiss, Ronald Leenes, Gregory Neven, Bart Priem, Pierangela Samarati, Dieter Sommer, Mario Verdicchio
Journal of Computer Security 18(1), 123--160, 2010
Claudio A.~Ardagna, Jan Camenisch, Markulf Kohlweiss, Ronald Leenes, Gregory Neven, Bart Priem, Pierangela Samarati, Dieter Sommer, Mario Verdicchio
Journal of Computer Security 18(1), 123--160, 2010
Robust Encryption
Michel Abdalla, Mihir Bellare, Gregory Neven
7th Theory of Cryptography Conference, Springer-Verlag, 2010
Michel Abdalla, Mihir Bellare, Gregory Neven
7th Theory of Cryptography Conference, Springer-Verlag, 2010
Scalable integrity monitoring in virtualized environments
Kenneth Goldman, Reiner Sailer, Dimitrios Pendarakis, Deepa Srinivasan
Proceedings of the fifth ACM workshop on Scalable trusted computing, pp. 73--78, 2010
Kenneth Goldman, Reiner Sailer, Dimitrios Pendarakis, Deepa Srinivasan
Proceedings of the fifth ACM workshop on Scalable trusted computing, pp. 73--78, 2010
Evaluation of a just-in-time compiler retrofitted for PHP
Michiaki Tatsubori, Akihiko Tozawa, Toyotaro Suzumura, Scott Trent, Tamiya Onodera
Proceedings of the 6th International Conference on Virtual Execution Environments, VEE 2010, Pittsburgh, Pennsylvania, USA, March 17-19, 2010, pp. 121--132
Michiaki Tatsubori, Akihiko Tozawa, Toyotaro Suzumura, Scott Trent, Tamiya Onodera
Proceedings of the 6th International Conference on Virtual Execution Environments, VEE 2010, Pittsburgh, Pennsylvania, USA, March 17-19, 2010, pp. 121--132
Implementing a High-Assurance Smart-Card OS
P Karger, D Toll, E Palmer, S McIntosh, S Weber, J Edwards
Financial Cryptography and Data Security, 51--65, Springer, 2010
P Karger, D Toll, E Palmer, S McIntosh, S Weber, J Edwards
Financial Cryptography and Data Security, 51--65, Springer, 2010
Anonymization of Electronic Medical Records for Validating Genome-Wide Association Studies
G Loukides, A Gkoulalas-Divanis, B Malin
Proceedings of the National Academy of Sciences 107(17), 7898, National Acad Sciences, 2010
G Loukides, A Gkoulalas-Divanis, B Malin
Proceedings of the National Academy of Sciences 107(17), 7898, National Acad Sciences, 2010
2009
Analyzing Information Flow in JavaScript-based Browser Extensions
Mohan Dhawan, Vinod Ganapathy
25th AnnualComputer Security Applications Conference (ACSAC'09), pp. 382--391, 2009
Mohan Dhawan, Vinod Ganapathy
25th AnnualComputer Security Applications Conference (ACSAC'09), pp. 382--391, 2009
Evaluating Role Mining Algorithms
Ian Molloy and Ninghui Li and Tiancheng Li and Ziqing Mao and Qihua Wang and Jorge Lobo
Proceedings of the Fourteenth ACM Symposium on Access Control Models and Technologies (SACMAT'09), 2009
Ian Molloy and Ninghui Li and Tiancheng Li and Ziqing Mao and Qihua Wang and Jorge Lobo
Proceedings of the Fourteenth ACM Symposium on Access Control Models and Technologies (SACMAT'09), 2009
Evaluating role mining algorithms
I Molloy, N Li, T Li, Z Mao, Q Wang, J Lobo
Proceedings of the 14th ACM symposium on Access control models and technologies, pp. 95--104, 2009
I Molloy, N Li, T Li, Z Mao, Q Wang, J Lobo
Proceedings of the 14th ACM symposium on Access control models and technologies, pp. 95--104, 2009
Defeating cross-site request forgery attacks with browser-enforced authenticity protection
Z Mao, N Li, I Molloy
Financial Cryptography and Data Security, 238--255, Springer, 2009
Z Mao, N Li, I Molloy
Financial Cryptography and Data Security, 238--255, Springer, 2009
On the (in) security and (im) practicality of outsourcing precise association rule mining
I Molloy, N Li, T Li
Data Mining, 2009, pp. 872--877
I Molloy, N Li, T Li
Data Mining, 2009, pp. 872--877
Slicing: A New Approach for Privacy Preserving Data Publishing
T Li, N Li, J Zhang, I Molloy
Knowledge and Data Engineering, IEEE Transactions on pp. 99, 1--1, IEEE, 2009
T Li, N Li, J Zhang, I Molloy
Knowledge and Data Engineering, IEEE Transactions on pp. 99, 1--1, IEEE, 2009
Using Recommenders for Discretionary Access Control (Paper)
Suresh Chari, Larry Koved, and Mary Ellen Zurko
Web 2.0 Security and Privacy, IEEE, 2009
Abstract Held in conjunction with the 2009 IEEE Symposium on Security and Privacy
Suresh Chari, Larry Koved, and Mary Ellen Zurko
Web 2.0 Security and Privacy, IEEE, 2009
Abstract Held in conjunction with the 2009 IEEE Symposium on Security and Privacy
Bootstrapping Coalition MANETs: Physical-Layer Security under Active Adversary
M A Zafer, D Agrawal, M Srivatsa
Annual Conference of ITA, 2009
M A Zafer, D Agrawal, M Srivatsa
Annual Conference of ITA, 2009
Stealthy Deployment and Execution of In-Guest Kernel Agents
T. Chiueh, M. Conover, M. Lu, B. Montague
Proc. of The Black Hat, USA, 2009
T. Chiueh, M. Conover, M. Lu, B. Montague
Proc. of The Black Hat, USA, 2009
Method, Apparatus and System for Resistance to Side Channel Attacks on Random Number Generators
S N Chari, V V Diluoffo, P A Karger, E R Palmer, T Rabin, J R Rao, P Rohatgi, H Scherzer, M Steiner, D C Toll
US Patent US7496616B2
Abstract
S N Chari, V V Diluoffo, P A Karger, E R Palmer, T Rabin, J R Rao, P Rohatgi, H Scherzer, M Steiner, D C Toll
US Patent US7496616B2
Abstract
A Note on Information-theoretic Secret Key Exchange over Wireless Channels
M. Zafer, D. Agrawal, and M. Srivatsa
47th Annual Allerton Conference on Communication, Control and Computing, 2009
M. Zafer, D. Agrawal, and M. Srivatsa
47th Annual Allerton Conference on Communication, Control and Computing, 2009
Secure Network Coding Over the Integers
Rosario Gennaro, Jonathan Katz, Hugo Krawczyk, Tal Rabin
2009
\urlhttp://eprint.iacr.org/2009/569
Rosario Gennaro, Jonathan Katz, Hugo Krawczyk, Tal Rabin
2009
\urlhttp://eprint.iacr.org/2009/569
2008
Enforcing Authorization Policies using Transactional Memory Introspection
Arnar Birgisson, Mohan Dhawan, Ulfar Erlingsson, Vinod Ganapathy, Liviu Iftode
15th ACM Conference on Computer and Communications Security (CCS'08), pp. 223--234, 2008
Arnar Birgisson, Mohan Dhawan, Ulfar Erlingsson, Vinod Ganapathy, Liviu Iftode
15th ACM Conference on Computer and Communications Security (CCS'08), pp. 223--234, 2008
Mining Roles with Semantic Meanings
Ian Molloy, Hong Chen, Tiancheng Li, Qihua Wang, Ninghui Li, Elisa Bertino, Seraphin Calo, Jorge Lobo
Proceedings of the Thirteenth ACM Symposium on Access Control Models and Technologies (SACMAT'08), 2008
Ian Molloy, Hong Chen, Tiancheng Li, Qihua Wang, Ninghui Li, Elisa Bertino, Seraphin Calo, Jorge Lobo
Proceedings of the Thirteenth ACM Symposium on Access Control Models and Technologies (SACMAT'08), 2008
Trading in Risk: Using Markets to Improve Access Control
Ian Molloy, Pau-Chen Cheng, Pankaj Rohatgi
Proceedings of the Fifteenth New Security Paradigms Workshop (NSPW'08), 2008
Ian Molloy, Pau-Chen Cheng, Pankaj Rohatgi
Proceedings of the Fifteenth New Security Paradigms Workshop (NSPW'08), 2008
Mining roles with semantic meanings
I Molloy, H Chen, T Li, Q Wang, N Li, E Bertino, S Calo, J Lobo
Proceedings of the 13th ACM symposium on Access control models and technologies, pp. 21--30, 2008
I Molloy, H Chen, T Li, Q Wang, N Li, E Bertino, S Calo, J Lobo
Proceedings of the 13th ACM symposium on Access control models and technologies, pp. 21--30, 2008
Secure Delegation for Web 2.0 and Mashups
P.Austel S. Bhola, S. Chari, L. Koved, M. McIntosh, M. Steiner, S. Weber
Web 2.0 Security and Privacy, IEEE, 2008
Abstract Held in conjunction with the 2008 IEEE Symposium on Security and Privacy
P.Austel S. Bhola, S. Chari, L. Koved, M. McIntosh, M. Steiner, S. Weber
Web 2.0 Security and Privacy, IEEE, 2008
Abstract Held in conjunction with the 2008 IEEE Symposium on Security and Privacy
Secure Delegation for Web 2.0 and Mashups
S Chari, L Koved, M Mcintosh, M Steiner, S Weber
W2SP 2008: Web 2.0 Security and Privacy
S Chari, L Koved, M Mcintosh, M Steiner, S Weber
W2SP 2008: Web 2.0 Security and Privacy
SWORD4J: Security WORkbench Development environment 4 Java
Ted Habeck; Larry Koved; Marco Pistoia
IBM Research Report RC24554, IBM T. J. Watson Research Center, 2008
Abstract
Ted Habeck; Larry Koved; Marco Pistoia
IBM Research Report RC24554, IBM T. J. Watson Research Center, 2008
Abstract
The Caernarvon secure embedded operating system
D C Toll, P A Karger, E R Palmer, S K McIntosh, S Weber
ACM SIGOPS Operating Systems Review 42(1), 32--39, ACM, 2008
D C Toll, P A Karger, E R Palmer, S K McIntosh, S Weber
ACM SIGOPS Operating Systems Review 42(1), 32--39, ACM, 2008
Tooling in support of Common Criteria evaluation of a high assurance operating system
DC Toll, S Weber, PA Karger, ER Palmer, SK McIntosh
IBM Thomas J. Watson Research Center Report, 2008
DC Toll, S Weber, PA Karger, ER Palmer, SK McIntosh
IBM Thomas J. Watson Research Center Report, 2008
The Feasibility of Automated Feedback-Directed Specification-Based Test Generation: A Case Study of a High-Assurance Operating System
S Weber, A Paradkar, S K McIntosh, D C Toll, P A Karger, M Kaplan, E R Palmer
19th International Symposium on Software Reliability Engineering, pp. 229--238, 2008
S Weber, A Paradkar, S K McIntosh, D C Toll, P A Karger, M Kaplan, E R Palmer
19th International Symposium on Software Reliability Engineering, pp. 229--238, 2008
Satisfying Common Criteria Security Evaluation Testing Requirements: Two Case Studies Using a High-Assurance Operating System
M Kaplan, P A Karger, S K McIntosh, E Palmer, A Paradkar, D C Toll, S Weber
Technical Report RC 24531, 2008
M Kaplan, P A Karger, S K McIntosh, E Palmer, A Paradkar, D C Toll, S Weber
Technical Report RC 24531, 2008
Design of a Secure Smart Card Operating System for Pervasive Applications
P A Karger, D C Toll, E R Palmer, S K McIntosh, S M Weber
Technical Report RC 24687, 2008
P A Karger, D C Toll, E R Palmer, S K McIntosh, S M Weber
Technical Report RC 24687, 2008
Designing a Secure Smart Card Operating System
P A Karger, D C Toll, E R Palmer, S K McIntosh, S M Weber
Technical Report RC 24531, 2008
P A Karger, D C Toll, E R Palmer, S K McIntosh, S M Weber
Technical Report RC 24531, 2008
2007
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems
Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin
Journal of Cryptology 20(1), 51--83, Springer, Heidelberg, Germany, 2007
Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin
Journal of Cryptology 20(1), 51--83, Springer, Heidelberg, Germany, 2007
Making large hash functions from small compression functions
W R Speirs, I Molloy
Technical Report, 2007
W R Speirs, I Molloy
Technical Report, 2007
Dynamic virtual credit card numbers
I Molloy, J Li, N Li
Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security, pp. 208--223, 2007
I Molloy, J Li, N Li
Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security, pp. 208--223, 2007
Cryptographic strength of SSL/TLS servers: Current and recent practices
H K Lee, T Malkin, E Nahum
Proceedings of the 7th ACM SIGCOMM Internet Measurement Conference, pp. 83--92, 2007
H K Lee, T Malkin, E Nahum
Proceedings of the 7th ACM SIGCOMM Internet Measurement Conference, pp. 83--92, 2007
Used trusted co-servers to enhance security of web interaction
D M Chess, J Dyer, N Itoi, J Kravitz, E R Palmer, R Perez, S W Smith, others
US Patent US7194759B1
Abstract
D M Chess, J Dyer, N Itoi, J Kravitz, E R Palmer, R Perez, S W Smith, others
US Patent US7194759B1
Abstract
2006
The case for analysis preserving language transformation
X Zhang, L Koved, M Pistoia, S Weber, T Jaeger, G Marceau, L Zeng
Proceedings of the 2006 international symposium on Software testing and analysis, pp. 202, ACM
Abstract
X Zhang, L Koved, M Pistoia, S Weber, T Jaeger, G Marceau, L Zeng
Proceedings of the 2006 international symposium on Software testing and analysis, pp. 202, ACM
Abstract
2005
Interprocedural analysis for privileged code placement and tainted variable detection
M. Pistoia, R. Flynn, L. Koved, V. Sreedhar
ECOOP 2005-Object-Oriented Programming, 734--734, Springer
Abstract
M. Pistoia, R. Flynn, L. Koved, V. Sreedhar
ECOOP 2005-Object-Oriented Programming, 734--734, Springer
Abstract
System and method to grant or refuse access to a system
H Scherzer, E Palmer
US Patent App. 11/274,619
H Scherzer, E Palmer
US Patent App. 11/274,619
2004
Experiences with Building Security Checking and Understanding Tool
T Habeck, L Koved, O Marquez, VC Sreedhar, M Steiner, W Venema, S Weber
Technical Report RC24243, IBM Research, 2004
Abstract
T Habeck, L Koved, O Marquez, VC Sreedhar, M Steiner, W Venema, S Weber
Technical Report RC24243, IBM Research, 2004
Abstract
Applying Static Analysis to Verifying Security Properties
X Zhang, T Jaegert, L Koved
Proceedings of the 2004 Grace Hopper Celebration of Women in Computing Conference
Abstract
X Zhang, T Jaegert, L Koved
Proceedings of the 2004 Grace Hopper Celebration of Women in Computing Conference
Abstract
Enterprise Java 2 Security: Building Secure and Robust J2EE Applications
M Pistoia, N Nagaratnam, L Koved, A Nadalin
2004 - portal.acm.org, Addison Wesley Longman Publishing Co., Inc. Redwood City, CA, USA
Abstract
M Pistoia, N Nagaratnam, L Koved, A Nadalin
2004 - portal.acm.org, Addison Wesley Longman Publishing Co., Inc. Redwood City, CA, USA
Abstract
Detecting Unwanted Synchronization in Java Programs
Leeman, G., Kershenbaum, A., Koved, L., and Reimer, D.
Software Engineering and Applications (SEA 2004). Sponsored by International Association of Science and Technology for Development (IASTED)., MIT
Abstract
Leeman, G., Kershenbaum, A., Koved, L., and Reimer, D.
Software Engineering and Applications (SEA 2004). Sponsored by International Association of Science and Technology for Development (IASTED)., MIT
Abstract
Enterprise Java ™ Security: Building Secure and Robust J2EE Applications
M. Pistoia, N. Nagaratnam, L. Koved, A. Nadalin
2004 - books.google.com, Addison-Wesley Professional
M. Pistoia, N. Nagaratnam, L. Koved, A. Nadalin
2004 - books.google.com, Addison-Wesley Professional
2003
Template attacks
Suresh Chari, Josyula R Rao, Pankaj Rohatgi
Cryptographic Hardware and Embedded Systems-CHES 2002, pp. 13--28, Springer, 2003
Suresh Chari, Josyula R Rao, Pankaj Rohatgi
Cryptographic Hardware and Embedded Systems-CHES 2002, pp. 13--28, Springer, 2003
Authenticated electronic coupon issuing and redemption
C C Palmer, E R Palmer, S W Smith
US Patent 6,505,773, European Patent EP1068581B1, Germany Patent DE69902454.4, Great Britain and France Patent 1068581, Spain Patent 2178390, Great Britain Patent 106858
Abstract
C C Palmer, E R Palmer, S W Smith
US Patent 6,505,773, European Patent EP1068581B1, Germany Patent DE69902454.4, Great Britain and France Patent 1068581, Spain Patent 2178390, Great Britain Patent 106858
Abstract
Method and system for processing electronic documents
M Anderson, F Jaffe, C Hibbert, J Virkki, J Kravitz, S Chang, E Palmer, others
US Patent 6,609,200
Abstract
M Anderson, F Jaffe, C Hibbert, J Virkki, J Kravitz, S Chang, E Palmer, others
US Patent 6,609,200
Abstract
2002
Access rights analysis for Java
L. Koved, M. Pistoia, A. Kershenbaum
OOPSLA '02 Proceedings of the 17th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications, pp. 359--372, ACM, 2002
Abstract
L. Koved, M. Pistoia, A. Kershenbaum
OOPSLA '02 Proceedings of the 17th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications, pp. 359--372, ACM, 2002
Abstract
User authentication and authorization in the Java platform
C Lai, L Gong, L Koved, A Nadalin, R Schemers
Computer Security Applications Conference, 1999, pp. 285--290, 2002
Abstract
C Lai, L Gong, L Koved, A Nadalin, R Schemers
Computer Security Applications Conference, 1999, pp. 285--290, 2002
Abstract
METHOD AND APPARATUS FOR COLLECTING INFORMATION ASSOCIATED WITH MOVEMENT BETWEEN LOCATIONS
Lawrence E Ashery, Kenneth Alan Goldman, Elaine Rivette Palmer, Pankaj Rohatgi, Sean William Smith
European Patent EP1076872B1, Germany Patent DE69903805D1
Abstract
Lawrence E Ashery, Kenneth Alan Goldman, Elaine Rivette Palmer, Pankaj Rohatgi, Sean William Smith
European Patent EP1076872B1, Germany Patent DE69903805D1
Abstract
Vehicle customization, restriction, and data logging
Kenneth Alan Goldman, Charles Campbell Palmer, Elaine Rivette Palmer
US Patent 6,430,488
Abstract
Kenneth Alan Goldman, Charles Campbell Palmer, Elaine Rivette Palmer
US Patent 6,430,488
Abstract
2001
Security challenges for Enterprise Java in an e-business environment
L Koved, A Nadalin, N Nagaratnam, M Pistoia, T Shrader
IBM Systems Journal 40(1), 130--152, International Business Machines, 2001
Abstract
L Koved, A Nadalin, N Nagaratnam, M Pistoia, T Shrader
IBM Systems Journal 40(1), 130--152, International Business Machines, 2001
Abstract
1999
Towards sound approaches to counteract power-analysis attacks
Suresh Chari, Charanjit S Jutla, Josyula R Rao, Pankaj Rohatgi
Advances in Cryptology—CRYPTO’99, pp. 398--412, 1999
Suresh Chari, Charanjit S Jutla, Josyula R Rao, Pankaj Rohatgi
Advances in Cryptology—CRYPTO’99, pp. 398--412, 1999
Adaptive Security for Threshold Cryptosystems
Ran Canetti, Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin
Advances in Cryptology -- CRYPTO" "'99, pp. 98--115, springer, 1999
Ran Canetti, Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin
Advances in Cryptology -- CRYPTO" "'99, pp. 98--115, springer, 1999
Secure hash-and-sign signatures without the random oracle
Rosario Gennaro, Shai Halevi, Tal Rabin
Advances in Cryptology—EUROCRYPT’99, pp. 123--139, 1999
Rosario Gennaro, Shai Halevi, Tal Rabin
Advances in Cryptology—EUROCRYPT’99, pp. 123--139, 1999
Identification bracelet for child and guardian matching
J K Kravitz, E R Palmer
US Patent 5,978,493, China Patent CN1080423C
Abstract
J K Kravitz, E R Palmer
US Patent 5,978,493, China Patent CN1080423C
Abstract
1998
Simplified VSS and fast-track multiparty computations with applications to threshold cryptography
Rosario Gennaro, Michael O Rabin, Tal Rabin
Proceedings of the seventeenth annual ACM symposium on Principles of distributed computing, pp. 101--111, 1998
Rosario Gennaro, Michael O Rabin, Tal Rabin
Proceedings of the seventeenth annual ACM symposium on Principles of distributed computing, pp. 101--111, 1998
The evolution of Java security
L Koved, AJ Nadalin, D Neal, T Lawson
IBM Systems Journal 37(3), 349-364, International Business Machines Corporation, 1998
Abstract
L Koved, AJ Nadalin, D Neal, T Lawson
IBM Systems Journal 37(3), 349-364, International Business Machines Corporation, 1998
Abstract
Using a high-performance, programmable secure coprocessor
S Smith, E Palmer, S Weingart
Financial Cryptography, pp. 73--89, 1998
S Smith, E Palmer, S Weingart
Financial Cryptography, pp. 73--89, 1998
1996
Robust Threshold DSS Signatures
Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin
EUROCRYPT'96, 1996
Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin
EUROCRYPT'96, 1996
Robust and Efficient Sharing of RSA Functions
Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin
CRYPTO'96, 1996
Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin
CRYPTO'96, 1996
Parallelized network security protocols
E Nahum, D Yates, SOMalley, H Orman, R ÿ&
ISOC Symposium on Networked and Distributed System Security (NDSS), 1996
E Nahum, D Yates, SOMalley, H Orman, R ÿ&
ISOC Symposium on Networked and Distributed System Security (NDSS), 1996
1995
Towards High Performance Cryptographic Software
E Nahum, SOMalley, H Orman, R Schroeppel
Third IEEE Workshop on the Architecture and Implementation of High Performance Communications Subsystems (HPCS), 1995
E Nahum, SOMalley, H Orman, R Schroeppel
Third IEEE Workshop on the Architecture and Implementation of High Performance Communications Subsystems (HPCS), 1995
1991
Introduction to the Citadel architecture: Security in physically exposed environments
S R White, S H Weingart, W C Arnold, E R Palmer
Technical Report RC 16672, IBM Research, 1991
S R White, S H Weingart, W C Arnold, E R Palmer
Technical Report RC 16672, IBM Research, 1991
An Introduction to Citadel: a secure crypto coprocessor for workstations
Elaine Palmer
Technical Report RC 18373, IBM TJ Watson Research Center, 1991
Elaine Palmer
Technical Report RC 18373, IBM TJ Watson Research Center, 1991
Year Unknown
Role Mining for Engineering and Optimizing Role Based Access Control Systems
N L T L I Molloy, Q W E Bertino, S C J Lobo
cerias.purdue.edu, 0
N L T L I Molloy, Q W E Bertino, S C J Lobo
cerias.purdue.edu, 0