2024
Stealthy Misreporting Attacks Against Load Balancing.
IEEE/ACM Trans. Netw., August, 2024
Interest-disclosing Mechanisms for Advertising are Privacy-Exposing (not Preserving).
Proc. Priv. Enhancing Technol., January, 2024
Verifiable Sustainability in Data Centers.
IEEE Secur. Priv., 2024
Err on the Side of Texture: Texture Bias on Real Data.
CoRR, 2024
On Synthetic Texture Datasets: Challenges, Creation, and Curation.
CoRR, 2024
Cloud Storage Integrity at Scale: A Case for Dynamic Hash Trees.
CoRR, 2024
A New Era in LLM Security: Exploring Security Concerns in Real-World LLM-based Systems.
CoRR, 2024
ParTEETor: A System for Partial Deployments of TEEs within Tor.
Proceedings of the 23rd Workshop on Privacy in the Electronic Society, 2024
A Public and Reproducible Assessment of the Topics API on Real Data.
Proceedings of the IEEE Security and Privacy, 2024
Explorations in Texture Learning.
Proceedings of the Second Tiny Papers Track at ICLR 2024, 2024
2023
Joint Caching and Routing in Cache Networks With Arbitrary Topology.
IEEE Trans. Parallel Distributed Syst., August, 2023
Misreporting Attacks Against Load Balancers in Software-Defined Networking.
Mob. Networks Appl., August, 2023
Specializing Neural Networks for Cryptographic Code Completion Applications.
IEEE Trans. Software Eng., June, 2023
Systematic Evaluation of Geolocation Privacy Mechanisms.
CoRR, 2023
Securing Cloud File Systems using Shielded Execution.
CoRR, 2023
The Space of Adversarial Strategies.
Proceedings of the 32nd USENIX Security Symposium, 2023
DScope: A Cloud-Native Internet Telescope.
Proceedings of the 32nd USENIX Security Symposium, 2023
mMLSnet: Multilevel Security Network with Mobility.
Proceedings of the IEEE Military Communications Conference, 2023
The Efficacy of Transformer-based Adversarial Attacks in Security Domains.
Proceedings of the IEEE Military Communications Conference, 2023
Characterizing the Modification Space of Signature IDS Rules.
Proceedings of the IEEE Military Communications Conference, 2023
The CVE Wayback Machine: Measuring Coordinated Disclosure from Exploits against Two Years of Zero-Days.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023
Host-Based Flow Table Size Inference in Multi-Hop SDN.
Proceedings of the IEEE Global Communications Conference, 2023
2022
Attack Resilience of Cache Replacement Policies: A Study Based on TTL Approximation.
IEEE/ACM Trans. Netw., 2022
Enforcing Multilevel Security Policies in Unstable Networks.
IEEE Trans. Netw. Serv. Manag., 2022
Who's Controlling My Device? Multi-User Multi-Device-Aware Access Control System for Shared Smart Home Environment.
ACM Trans. Internet Things, 2022
IoTRepair: Flexible Fault Handling in Diverse IoT Deployments.
ACM Trans. Internet Things, 2022
Building a Privacy-Preserving Smart Camera System.
Proc. Priv. Enhancing Technol., 2022
Adversarial examples for network intrusion detection systems.
J. Comput. Secur., 2022
EIPSIM: Modeling Secure IP Address Allocation at Cloud Scale.
CoRR, 2022
Privacy-Preserving Protocols for Smart Cameras and Other IoT Devices.
CoRR, 2022
A Machine Learning and Computer Vision Approach to Geomagnetic Storm Forecasting.
CoRR, 2022
Generating Practical Adversarial Network Traffic Flows Using NIDSGAN.
CoRR, 2022
Improving Radioactive Material Localization by Leveraging Cyber-Security Model Optimizations.
CoRR, 2022
Measuring and Mitigating the Risk of IP Reuse on Public Clouds.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Performant Binary Fuzzing without Source Code using Static Instrumentation.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022
Sustainability is a Security Problem.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Flow Table Security in SDN: Adversarial Reconnaissance and Intelligent Attacks.
IEEE/ACM Trans. Netw., 2021
MLSNet: A Policy Complying Multilevel Security Framework for Software Defined Networking.
IEEE Trans. Netw. Serv. Manag., 2021
Real-time Analysis of Privacy-(un)aware IoT Applications.
Proc. Priv. Enhancing Technol., 2021
A survey on IoT platforms: Communication, security, and privacy perspectives.
Comput. Networks, 2021
HoneyModels: Machine Learning Honeypots.
Proceedings of the 2021 IEEE Military Communications Conference, 2021
Sentinel: A Robust Intrusion Detection System for IoT Networks Using Kernel-Level System Information.
Proceedings of the IoTDI '21: International Conference on Internet-of-Things Design and Implementation, 2021
Attack Resilience of Cache Replacement Policies.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021
On the Robustness of Domain Constraints.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
Adversarial Examples in Constrained Domains.
CoRR, 2020
IoTRepair: Systematically Addressing Device Faults in Commodity IoT (Extended Paper).
CoRR, 2020
Kratos: multi-user multi-device-aware access control system for the smart home.
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020
Improving Robustness of a Popular Probabilistic Clustering Algorithm Against Insider Attacks.
Proceedings of the Security and Privacy in Communication Networks, 2020
Misreporting Attacks in Software-Defined Networking.
Proceedings of the Security and Privacy in Communication Networks, 2020
IoTRepair: Systematically Addressing Device Faults in Commodity IoT.
Proceedings of the Fifth IEEE/ACM International Conference on Internet-of-Things Design and Implementation, 2020
Flow Table Security in SDN: Adversarial Reconnaissance and Intelligent Attacks.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Co-residency Attacks on Containers are Real.
Proceedings of the CCSW'20, 2020
2019
Catch Me if You Can: A Closer Look at Malicious Co-Residency on the Cloud.
IEEE/ACM Trans. Netw., 2019
Verifying Internet of Things Safety and Security in Physical Spaces.
IEEE Secur. Priv., 2019
How Relevant Is the Turing Test in the Age of Sophisbots?
IEEE Secur. Priv., 2019
Program Analysis of Commodity IoT Applications for Security and Privacy: Challenges and Opportunities.
ACM Comput. Surv., 2019
Multi-User Multi-Device-Aware Access Control System for Smart Home.
CoRR, 2019
EnTrust: Regulating Sensor Access by Cooperating Programs via Delegation Graphs.
Proceedings of the 28th USENIX Security Symposium, 2019
Application Transiency: Towards a Fair Trade of Personal Information for Application Services.
Proceedings of the Security and Privacy in Communication Networks, 2019
IoTGuard: Dynamic Enforcement of Security and Safety Policy in Commodity IoT.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Curie: Policy-based Secure Data Exchange.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019
2018
More or Less? Predict the Social Influence of Malicious URLs on Social Media.
CoRR, 2018
Regulating Access to System Sensors in Cooperating Programs.
CoRR, 2018
Deep k-Nearest Neighbors: Towards Confident, Interpretable and Robust Deep Learning.
CoRR, 2018
Making machine learning robust against adversarial inputs.
Commun. ACM, 2018
Sensitive Information Tracking in Commodity IoT.
Proceedings of the 27th USENIX Security Symposium, 2018
Soteria: Automated IoT Safety and Security Analysis.
Proceedings of the 2018 USENIX Annual Technical Conference, 2018
Extending Detection with Privileged Information via Generalized Distillation.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018
Mission-Oriented Security Model, Incorporating Security Risk, Cost and Payout.
Proceedings of the Security and Privacy in Communication Networks, 2018
Enablers of Adversarial Attacks in Machine Learning.
Proceedings of the 2018 IEEE Military Communications Conference, 2018
Ensemble Adversarial Training: Attacks and Defenses.
Proceedings of the 6th International Conference on Learning Representations, 2018
SoK: Security and Privacy in Machine Learning.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018
IotSan: fortifying the safety of IoT systems.
Proceedings of the 14th International Conference on emerging Networking EXperiments and Technologies, 2018
Detection under Privileged Information.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
2017
Deceiving Network Reconnaissance Using SDN-Based Virtual Topologies.
IEEE Trans. Netw. Serv. Manag., 2017
Securing ARP/NDP From the Ground Up.
IEEE Trans. Inf. Forensics Secur., 2017
Dawn of the Dead Domain: Measuring the Exploitation of Residual Trust in Domains.
IEEE Secur. Priv., 2017
The Space of Transferable Adversarial Examples.
CoRR, 2017
Ensemble Adversarial Training: Attacks and Defenses.
CoRR, 2017
Extending Defensive Distillation.
CoRR, 2017
On the (Statistical) Detection of Adversarial Examples.
CoRR, 2017
Adversarial Network Forensics in Software Defined Networking: Demo.
Proceedings of the Symposium on SDN Research, 2017
Adversarial Network Forensics in Software Defined Networking.
Proceedings of the Symposium on SDN Research, 2017
Cimplifier: automatically debloating containers.
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017
Defining and Detecting Environment Discrimination in Android Apps.
Proceedings of the Security and Privacy in Communication Networks, 2017
Patient-Driven Privacy Control through Generalized Distillation.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017
Achieving Secure and Differentially Private Computations in Multiparty Settings.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017
Malicious co-residency on the cloud: Attacks and defense.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017
Stealth migration: Hiding virtual machines on the network.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017
Adversarial Examples for Malware Detection.
Proceedings of the Computer Security - ESORICS 2017, 2017
Tracing the Arc of Smartphone Application Security.
Proceedings of the 2nd ACM Workshop on Attribute-Based Access Control, 2017
Feature Cultivation in Privileged Information-augmented Detection.
Proceedings of the 3rd ACM on International Workshop on Security And Privacy Analytics, 2017
Attacking strategies and temporal analysis involving Facebook discussion groups.
Proceedings of the 13th International Conference on Network and Service Management, 2017
Practical Black-Box Attacks against Machine Learning.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
2016
Composite Constant Propagation and its Application to Android Program Analysis.
IEEE Trans. Software Eng., 2016
Machine Learning in Adversarial Settings.
IEEE Secur. Priv., 2016
Towards Least Privilege Containers with Cimplifier.
CoRR, 2016
Towards the Science of Security and Privacy in Machine Learning.
CoRR, 2016
Practical Black-Box Attacks against Deep Learning Systems using Adversarial Examples.
CoRR, 2016
Transferability in Machine Learning: from Phenomena to Black-Box Attacks using Adversarial Samples.
CoRR, 2016
On the Effectiveness of Defensive Distillation.
CoRR, 2016
Adversarial Perturbations Against Deep Neural Networks for Malware Classification.
CoRR, 2016
cleverhans v0.1: an adversarial machine learning library.
CoRR, 2016
Building Better Detection with Privileged Information.
CoRR, 2016
On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis.
Proceedings of the 25th USENIX Security Symposium, 2016
Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks.
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Domain-Z: 28 Registrations Later Measuring the Exploitation of Residual Trust in Domains.
Proceedings of the IEEE Symposium on Security and Privacy, 2016
SoK: Lessons Learned from Android Security Research for Appified Software Platforms.
Proceedings of the IEEE Symposium on Security and Privacy, 2016
BinDNN: Resilient Function Matching Using Deep Learning.
Proceedings of the Security and Privacy in Communication Networks, 2016
Combining static analysis with probabilistic models to enable market-scale Android inter-component analysis.
Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2016
Crafting adversarial input sequences for recurrent neural networks.
Proceedings of the 2016 IEEE Military Communications Conference, 2016
Mapping sample scenarios to operational models.
,
,
,
,
,
,
,
,
,
,
Proceedings of the 2016 IEEE Military Communications Conference, 2016
The Limitations of Deep Learning in Adversarial Settings.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016
Modeling Privacy and Tradeoffs in Multichannel Secret Sharing Protocols.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016
Cyber Fighter Associate: A Decision Support System for cyber agility.
Proceedings of the 2016 Annual Conference on Information Science and Systems, 2016
Cyber Deception: Virtual Networks to Defend Insider Reconnaissance.
Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, 2016
2015
Six Potential Game-Changers in Cyber Security: Towards Priorities in Cyber Science and Engineering.
CoRR, 2015
Adaptive protocol switching using Dynamically Insertable Bumps in the stack.
Proceedings of the 34th IEEE Military Communications Conference, 2015
Enforcing agile access control policies in relational databases using views.
Proceedings of the 34th IEEE Military Communications Conference, 2015
Computational ontology of network operations.
Proceedings of the 34th IEEE Military Communications Conference, 2015
Malware traffic detection using tamper resistant features.
Proceedings of the 34th IEEE Military Communications Conference, 2015
Detection of stealthy TCP-based DoS attacks.
Proceedings of the 34th IEEE Military Communications Conference, 2015
Measuring the Impact and Perception of Acceptable Advertisements.
Proceedings of the 2015 ACM Internet Measurement Conference, 2015
Composite Constant Propagation: Application to Android Inter-Component Communication Analysis.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015
IccTA: Detecting Inter-Component Privacy Leaks in Android Apps.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015
A New Science of Security Decision Making.
Proceedings of the ICISSP 2015, 2015
MICSS: A Realistic Multichannel Secrecy Protocol.
Proceedings of the 2015 IEEE Global Communications Conference, 2015
Securing ARP From the Ground Up.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015
2014
Guest Editors' Introduction: Special Issue on Trust, Security, and Privacy in Parallel and Distributed Systems.
IEEE Trans. Parallel Distributed Syst., 2014
TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones.
ACM Trans. Comput. Syst., 2014
Toward a Science of Secure Environments.
IEEE Secur. Priv., 2014
I know what leaked in your pocket: uncovering privacy leaks on Android Apps with Static Taint Analysis.
CoRR, 2014
Security Outlook: Six Cyber Game Changers for the Next 15 Years.
Computer, 2014
TaintDroid: an information flow tracking system for real-time privacy monitoring on smartphones.
Commun. ACM, 2014
Duet: library integrity verification for android applications.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014
Building an Ontology of Cyber Security.
Proceedings of the Ninth Conference on Semantic Technology for Intelligence, 2014
FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps.
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, 2014
A Trusted Safety Verifier for Process Controller Code.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
Android market reconstruction and analysis.
Proceedings of the 2014 IEEE Military Communications Conference, 2014
An Analysis of Anonymity in Bitcoin Using P2P Network Traffic.
Proceedings of the Financial Cryptography and Data Security, 2014
Security and Science of Agility.
,
,
,
,
,
,
,
,
,
,
Proceedings of the First ACM Workshop on Moving Target Defense, 2014
2013
Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security Analysis.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
2012
Scalable Web Content Attestation.
IEEE Trans. Computers, 2012
Semantically rich application-centric security in Android.
Secur. Commun. Networks, 2012
Bloatware Comes to the Smartphone.
IEEE Secur. Priv., 2012
Retargeting Android applications to Java bytecode.
Proceedings of the 20th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-20), 2012
A Detection Mechanism for SMS Flooding Attacks in Cellular Networks.
Proceedings of the Security and Privacy in Communication Networks, 2012
Structured security testing in the smart grid.
Proceedings of the 5th International Symposium on Communications, 2012
Minimizing private data disclosures in the smart grid.
Proceedings of the ACM Conference on Computer and Communications Security, 2012
SABOT: specification-based payload generation for programmable logic controllers.
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Scalable Integrity-Guaranteed AJAX.
Proceedings of the Web Technologies and Applications - 14th Asia-Pacific Web Conference, 2012
Hi-Fi: collecting high-fidelity whole-system provenance.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012
2011
From mobile phones to responsible devices.
Secur. Commun. Networks, 2011
Network-Based Root of Trust for Installation.
IEEE Secur. Priv., 2011
Data Provenance and Security.
IEEE Secur. Priv., 2011
A Study of Android Application Security.
Proceedings of the 20th USENIX Security Symposium, 2011
Protecting consumer privacy from electric load monitoring.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
A logical specification and analysis for SELinux MLS policy.
ACM Trans. Inf. Syst. Secur., 2010
malnets: large-scale malicious networks <i>via</i> compromised wireless access points.
Secur. Commun. Networks, 2010
A Survey of BGP Security Issues and Solutions.
Proc. IEEE, 2010
Secure attribute-based systems.
J. Comput. Secur., 2010
Not So Great Expectations: Why Application Markets Haven't Failed Security.
IEEE Secur. Priv., 2010
New Security Architectures Based on Emerging Disk Functionality.
IEEE Secur. Priv., 2010
Embedded Firmware Diversity for Smart Electric Meters.
Proceedings of the 5th USENIX Workshop on Hot Topics in Security, 2010
Towards a Secure and Efficient System for End-to-End Provenance.
Proceedings of the 2nd Workshop on the Theory and Practice of Provenance, 2010
Realizing a Source Authentic Internet.
Proceedings of the Security and Privacy in Communication Networks, 2010
An architecture for enforcing end-to-end access control over web applications.
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010
TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones.
Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation, 2010
Disk-enabled authenticated encryption.
Proceedings of the IEEE 26th Symposium on Mass Storage Systems and Technologies, 2010
Constructing Secure Localization Systems with Adjustable Granularity Using Commodity Hardware.
Proceedings of the Global Communications Conference, 2010
Seeding clouds with trust anchors.
Proceedings of the 2nd ACM Cloud Computing Security Workshop, 2010
Protecting portable storage with host validation.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
Porscha: policy oriented secure content handling in Android.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
Multi-vendor penetration testing in the advanced metering infrastructure.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
Kells: a protection framework for portable data.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
2009
ASR: anonymous and secure reporting of traffic forwarding activity in mobile ad hoc networks.
Wirel. Networks, 2009
Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems.
IEEE Trans. Parallel Distributed Syst., 2009
Mitigating attacks on open functionality in SMS-capable cellular networks.
IEEE/ACM Trans. Netw., 2009
Configuration management at massive scale: system design and experience.
IEEE J. Sel. Areas Commun., 2009
Security and Privacy Challenges in the Smart Grid.
IEEE Secur. Priv., 2009
Understanding Android Security.
IEEE Secur. Priv., 2009
Proceedings of the Security Protocols XVII, 2009
Energy Theft in the Advanced Metering Infrastructure.
Proceedings of the Critical Information Infrastructures Security, 2009
On cellular botnets: measuring the impact of malicious devices on a cellular network core.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
On lightweight mobile phone application certification.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
Justifying Integrity Using a Virtual Machine Verifier.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009
2008
Guest Editors' Introduction: Special Section on Software Engineering for Secure Systems.
IEEE Trans. Software Eng., 2008
Noninvasive Methods for Host Certification.
ACM Trans. Inf. Syst. Secur., 2008
Exploiting open functionality in SMS-capable cellular networks.
J. Comput. Secur., 2008
Systemic Issues in the Hart InterCivic and Premier Voting Systems: Reflections on Project EVEREST.
Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Workshop, 2008
Realizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems.
Proceedings of the Network and Distributed System Security Symposium, 2008
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008
PinUP: Pinning User Files to Known Applications.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008
Defending Against Attacks on Main Memory Persistence.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008
Security for Telecommunications Networks
Advances in Information Security 40, Springer, ISBN: 978-0-387-72441-6, 2008
2007
TARP: Ticket-based address resolution protocol.
Comput. Networks, 2007
On Attack Causality in Internet-Connected Cellular Networks.
Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007
From Trusted to Secure: Building and Executing Applications That Enforce System Security.
Proceedings of the 2007 USENIX Annual Technical Conference, 2007
Configuration Management at Massive Scale: System Design and Experience.
Proceedings of the 2007 USENIX Annual Technical Conference, 2007
Privacy Preserving Communication in MANETs.
Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, 2007
Jifclipse: development tools for security-typed languages.
Proceedings of the 2007 Workshop on Programming Languages and Analysis for Security, 2007
Analysis of the IPv4 Address Space Delegation Structure.
Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), 2007
Limiting Sybil Attacks in Structured P2P Networks.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007
Towards Automated Privilege Separation.
Proceedings of the Information Systems Security, Third International Conference, 2007
Toward Valley-Free Inter-domain Routing.
Proceedings of IEEE International Conference on Communications, 2007
Email Communities of Interest.
Proceedings of the CEAS 2007, 2007
Protecting users from "themselves".
Proceedings of the 2007 ACM workshop on Computer Security Architecture, 2007
Non-volatile memory and disks: avenues for policy architectures.
Proceedings of the 2007 ACM workshop on Computer Security Architecture, 2007
Channels: Runtime System Infrastructure for Security-Typed Languages.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007
Establishing and Sustaining System Integrity via Root of Trust Installation.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007
2006
Methods and limitations of security policy reconciliation.
ACM Trans. Inf. Syst. Secur., 2006
Enforcing provisioning and authorization policy in the Antigone system.
J. Comput. Secur., 2006
The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense.
Int. J. Distributed Sens. Networks, 2006
Origin authentication in interdomain routing.
Comput. Networks, 2006
Shame on Trust in Distributed Systems.
Proceedings of the 1st USENIX Workshop on Hot Topics in Security, 2006
Design, implementation and evaluation of security in iSCSI-based network storage systems.
Proceedings of the 2006 ACM Workshop On Storage Security And Survivability, 2006
Non-Invasive Methods for Host Certification.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006
Trusted declassification: : high-level policy for a security-typed language.
Proceedings of the 2006 Workshop on Programming Languages and Analysis for Security, 2006
Enterprise Security: A Community of Interest Based Approach.
Proceedings of the Network and Distributed System Security Symposium, 2006
Characterizing Address Use Structure and Stability of Origin Advertisement in Inter-domain Routing.
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 2006
Password Exhaustion: Predicting the End of Password Usefulness.
Proceedings of the Information Systems Security, Second International Conference, 2006
Privacy Preserving Web-Based Email.
Proceedings of the Information Systems Security, Second International Conference, 2006
Optimizing BGP security by exploiting path stability.
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006
From Languages to Systems: Understanding Practical Application Development in Security-typed Languages.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006
2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Analysis of Communities of Interest in Data Networks.
Proceedings of the Passive and Active Network Measurement, 6th International Workshop, 2005
Secure Reporting of Traffic Forwarding Activity in Mobile Ad Hoc Networks.
Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005), 2005
Blocking-aware private record linkage.
Proceedings of the IQIS 2005, 2005
Understanding Mutable Internet Pathogens, or How I Learned to Stop Worrying and Love Parasitic Behavior.
Proceedings of the Information Systems Security, First International Conference, 2005
Privacy Preserving Clustering.
Proceedings of the Computer Security, 2005
2004
Security Policy Reconciliation in Distributed Computing Environments.
Proceedings of the 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), 2004
Searching for Privacy: Design and Implementation of a P3P-Enabled Search Engine.
Proceedings of the Privacy Enhancing Technologies, 4th International Workshop, 2004
2003
On context in authorization policy.
Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, 2003
Working around BGP: An Incremental Approach to Improving Security and Accuracy in Interdomain Routing.
Proceedings of the Network and Distributed System Security Symposium, 2003
Analysis of security vulnerabilities in the movie production and distribution process.
Proceedings of the 2003 ACM workshop on Digital rights management 2003, Washington, 2003
A Flexible Architecture for Security Policy Enforcement.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003
Antigone: Policy-based Secure Group Communication System and AMirD: Antigone-based Secure File Mirroring System.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003
On the performance, feasibility, and use of forward-secure signatures.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003
Origin authentication in interdomain routing.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003
2001
*Policy management in secure group communication.
PhD thesis, 2001
Principles of Policy in Secure Groups.
Proceedings of the Network and Distributed System Security Symposium, 2001
2000
Windowed Certificate Revocation.
Proceedings of the Proceedings IEEE INFOCOM 2000, 2000
A Response to ''Can We Eliminate Certificate Revocation Lists?''.
Proceedings of the Financial Cryptography, 2000
1999
Antigone: A Flexible Framework for Secure Group Communication.
Proceedings of the 8th USENIX Security Symposium, Washington, DC, USA, August 23-26, 1999, 1999
Secure Distributed Virtual Conferencing.
Proceedings of the Secure Information Networks: Communications and Multimedia Security, 1999