Benjamin Livshits

Orcid: 0000-0002-4921-8452

Affiliations:
  • Imperial College, London, UK
  • Microsoft Research (former)


According to our database1, Benjamin Livshits authored at least 149 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
The Ouroboros of ZK: Why Verifying the Verifier Unlocks Longer-Term ZK Innovation.
IACR Cryptol. ePrint Arch., 2024

Analyzing and Benchmarking ZK-Rollups.
IACR Cryptol. ePrint Arch., 2024

Rorqual: Speeding up Narwhal with TEEs.
CoRR, 2024

A Public Dataset For the ZKsync Rollup.
CoRR, 2024

TierDrop: Harnessing Airdrop Farmers for User Growth.
CoRR, 2024

Towards a Formal Foundation for Blockchain Rollups.
CoRR, 2024

Layer-2 Arbitrage: An Empirical Analysis of Swap Dynamics and Price Disparities on Rollups.
CoRR, 2024

The Writing is on the Wall: Analyzing the Boom of Inscriptions and its Impact on EVM-compatible Blockchains.
CoRR, 2024

Clap: a Rust eDSL for PlonKish Proof Systems with a Semantics-preserving Optimizing Compiler.
CoRR, 2024

The Writing is on the Wall: Analyzing the Boom of Inscriptions and its Impact on Rollup Performance and Cost Efficiency.
CoRR, 2024

Mechanism Design for ZK-Rollup Prover Markets.
CoRR, 2024

Quantifying Arbitrage in Automated Market Makers: An Empirical Study of Ethereum ZK Rollups.
CoRR, 2024

SoK: What don't we know? Understanding Security Vulnerabilities in SNARKs.
Proceedings of the 33rd USENIX Security Symposium, 2024

Smart Contract and DeFi Security Tools: Do They Meet the Needs of Practitioners?
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

2023
On How Zero-Knowledge Proof Blockchain Mixers Improve, and Worsen User Privacy.
IACR Cryptol. ePrint Arch., 2023

zk-Bench: A Toolset for Comparative Evaluation and Performance Benchmarking of SNARKs.
IACR Cryptol. ePrint Arch., 2023

Airdrops: Giving Money Away Is Harder Than It Seems.
CoRR, 2023

SoK: Decentralized Sequencers for Rollups.
CoRR, 2023

From Social Engineering to Quantum Threats: Safeguarding User Wallets with FailSafe.
CoRR, 2023

Smart Contract and DeFi Security: Insights from Tool Evaluations and Practitioner Surveys.
CoRR, 2023

Auto.gov: Learning-based On-chain Governance for Decentralized Finance (DeFi).
CoRR, 2023

Pool-Party: Exploiting Browser Resource Pools for Web Tracking.
Proceedings of the 32nd USENIX Security Symposium, 2023

The Blockchain Imitation Game.
Proceedings of the 32nd USENIX Security Symposium, 2023

2022
Blocked or Broken? Automatically Detecting When Privacy Interventions Break Websites.
Proc. Priv. Enhancing Technol., 2022

A study of inline assembly in solidity smart contracts.
Proc. ACM Program. Lang., 2022

BatteryLab: A Collaborative Platform for Power Monitoring.
CoRR, 2022

Measuring the Privacy vs. Compatibility Trade-off in Preventing Third-Party Stateful Tracking.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022

Finding typing compiler bugs.
Proceedings of the PLDI '22: 43rd ACM SIGPLAN International Conference on Programming Language Design and Implementation, San Diego, CA, USA, June 13, 2022

BatteryLab: A Collaborative Platform for Power Monitoring - https: //batterylab.dev.
Proceedings of the Passive and Active Measurement - 23rd International Conference, 2022

STAR: Secret Sharing for Private Threshold Aggregation Reporting.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
ZKSENSE: A Friction-less Privacy-Preserving Human Attestation Mechanism for Mobile Devices.
Proc. Priv. Enhancing Technol., 2021

Pool-Party: Exploiting Browser Resource Pools as Side-Channels for Web Tracking.
CoRR, 2021

Towards Private On-Chain Algorithmic Trading.
CoRR, 2021

STAR: Distributed Secret Sharing for Private Threshold Aggregation Reporting.
CoRR, 2021

PrivateFetch: Scalable Catalog Delivery in Privacy-Preserving Advertising.
CoRR, 2021

What's in Your Wallet? Privacy and Security Issues in Web 3.0.
CoRR, 2021

THEMIS: A Decentralized Privacy-Preserving Ad Platform with Reporting Integrity.
CoRR, 2021

BrowseLite: A Private Data Saving Solution for the Web.
Proceedings of the WWW '21: The Web Conference 2021, 2021

Towards Realistic and ReproducibleWeb Crawl Measurements.
Proceedings of the WWW '21: The Web Conference 2021, 2021

Smart Contract Vulnerabilities: Vulnerable Does Not Imply Exploited.
Proceedings of the 30th USENIX Security Symposium, 2021

Shedding (Some) Light on Mobile Browsers Energy Consumption.
Proceedings of the 5th Network Traffic Measurement and Analysis Conference, 2021

On the Just-In-Time Discovery of Profit-Generating Transactions in DeFi Protocols.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Detecting Filter List Evasion with Event-Loop-Turn Granularity JavaScript Signatures.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Stronger Privacy for Federated Collaborative Filtering With Implicit Feedback.
Proceedings of the RecSys '21: Fifteenth ACM Conference on Recommender Systems, Amsterdam, The Netherlands, 27 September 2021, 2021

VPN-Zero: A Privacy-Preserving Decentralized Virtual Private Network.
Proceedings of the IFIP Networking Conference, 2021

Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit.
Proceedings of the Financial Cryptography and Data Security, 2021

Liquidations: DeFi on a Knife-Edge.
Proceedings of the Financial Cryptography and Data Security, 2021

SugarCoat: Programmatically Generating Privacy-Preserving, Web-Compatible Resource Replacements for Content Blocking.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Who Filters the Filters: Understanding the Growth, Usefulness and Efficiency of Crowdsourced Ad Blocking.
Proc. ACM Meas. Anal. Comput. Syst., 2020

There's No Trick, Its Just a Simple Trick: A Web-Compat and Privacy Improving Approach to Third-party Web Storage.
CoRR, 2020

On the Battery Consumption of Mobile Browsers.
CoRR, 2020

THEMIS: Decentralized and Trustless Ad Platform with Reporting Integrity.
CoRR, 2020

Improving Web Content Blocking With Event-Loop-Turn Granularity JavaScript Signatures.
CoRR, 2020

We Know What They've Been Put Through: Revisiting High-scalability Blockchain Transactions.
CoRR, 2020

The Decentralized Financial Crisis: Attacking DeFi.
CoRR, 2020

Technical perspective: Analyzing smart contracts with MadMax.
Commun. ACM, 2020

Filter List Generation for Underserved Regions.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

Keeping out the Masses: Understanding the Popularity and Implications of Internet Paywalls.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

PERCIVAL: Making In-Browser Perceptual Ad Blocking Practical with Deep Learning.
Proceedings of the 2020 USENIX Annual Technical Conference, 2020

AdGraph: A Graph-Based Approach to Ad and Tracker Blocking.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Broken Metre: Attacking Resource Metering in EVM.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Privacy-Preserving Bandits.
Proceedings of the Third Conference on Machine Learning and Systems, 2020

Revisiting Transactional Statistics of High-scalability Blockchains.
Proceedings of the IMC '20: ACM Internet Measurement Conference, 2020

The Decentralized Financial Crisis.
Proceedings of the Crypto Valley Conference on Blockchain Technology, 2020

Evaluating the End-User Experience of Private Browsing Mode.
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020

2019
BLENDER: Enabling Local Search with a Hybrid Differential Privacy Model.
J. Priv. Confidentiality, 2019

ZKSENSE: a Privacy-Preserving Mechanism for Bot Detection in Mobile Devices.
CoRR, 2019

VPN0: A Privacy-Preserving Decentralized Virtual Private Network.
CoRR, 2019

The Blind Men and the Internet: Multi-Vantage Point Web Measurements.
CoRR, 2019

Another Brick in the Paywall: The Popularity and Privacy Implications of Paywalls.
CoRR, 2019

Smart Contract Vulnerabilities: Does Anyone Care?
CoRR, 2019

SpeedReader: Reader Mode Made Fast and Private.
Proceedings of the World Wide Web Conference, 2019

The Anatomy of a Cryptocurrency Pump-and-Dump Scheme.
Proceedings of the 28th USENIX Security Symposium, 2019

When the Signal is in the Noise: Exploiting Diffix's Sticky Noise.
Proceedings of the 28th USENIX Security Symposium, 2019

A Puff of Steem: Security Analysis of Decentralized Content Curation.
Proceedings of the International Conference on Blockchain Economics, 2019

BatteryLab, a distributed power monitoring platform for mobile devices: demo abstract.
Proceedings of the 17th Conference on Embedded Networked Sensor Systems, 2019

BatteryLab, A Distributed Power Monitoring Platform For Mobile Devices.
Proceedings of the 18th ACM Workshop on Hot Topics in Networks, 2019

Static Analysis for Asynchronous JavaScript Programs.
Proceedings of the 33rd European Conference on Object-Oriented Programming, 2019

2018
AdGraph: A Machine Learning Approach to Automatic and Effective Adblocking.
CoRR, 2018

Toward an Evidence-based Design for Reactive Security Policies and Mechanisms.
CoRR, 2018

SYNODE: Understanding and Automatically Preventing Injection Attacks on NODE.JS.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

EthIR: A Framework for High-Level Analysis of Ethereum Bytecode.
Proceedings of the Automated Technology for Verification and Analysis, 2018

2017
Prepose: Privacy, Security, and Reliability for Gesture-Based Programming.
IEEE Secur. Priv., 2017

Toward full elasticity in distributed static analysis: the case of callgraph analysis.
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017

Just-in-time static analysis.
Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis, Santa Barbara, CA, USA, July 10, 2017

Cheetah: just-in-time taint analysis for Android apps.
Proceedings of the 39th International Conference on Software Engineering, 2017

2016
Kizzle: A Signature Compiler for Detecting Exploit Kits.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

2015
Fast: A Transducer-Based Language for Tree Manipulation.
ACM Trans. Program. Lang. Syst., 2015

In defense of soundiness: a manifesto.
Commun. ACM, 2015

PriVaricator: Deceiving Fingerprinters with Little White Lies.
Proceedings of the 24th International Conference on World Wide Web, 2015

SurroundWeb: Mitigating Privacy Concerns in a 3D Web Browser.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

InterPoll: Crowd-Sourced Internet Polls.
Proceedings of the 1st Summit on Advances in Programming Languages, 2015

Detecting JavaScript races that matter.
Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, 2015

Data-Parallel String-Manipulating Programs.
Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2015

Program Boosting: Program Synthesis via Crowd-Sourcing.
Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2015

2014
Preface.
J. Comput. Secur., 2014

ZØ: An Optimizing Distributing Zero-Knowledge Compiler.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

I Know It When I See It: Observable Races in JavaScript Applications.
Proceedings of the Workshop on Dynamic Languages and Applications, 2014

Automated migration of build scripts using dynamic analysis and search-based refactoring.
Proceedings of the 2014 ACM International Conference on Object Oriented Programming Systems Languages & Applications, 2014

Saving Money While Polling with InterPoll Using Power Analysis.
Proceedings of the Seconf AAAI Conference on Human Computation and Crowdsourcing, 2014

Let's do it at my place instead?: attitudinal and behavioral study of privacy in client-side personalization.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

MoRePriv: mobile OS support for application personalization and privacy.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
Automatic Mediation of Privacy-Sensitive Resource Access in Smartphone Applications.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Practical static analysis of JavaScript applications in the presence of frameworks and libraries.
Proceedings of the Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, 2013

Towards fully automatic placement of security sanitizers and declassifiers.
Proceedings of the 40th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2013

Fully abstract compilation to JavaScript.
Proceedings of the 40th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2013

Verifying higher-order programs with the dijkstra monad.
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, 2013

Operating System Support for Augmented Reality Applications.
Proceedings of the 14th Workshop on Hot Topics in Operating Systems, 2013

2012
Browser Security Case Study: Appearances Can Be Deceiving.
ACM Queue, 2012

Web Application Security (Dagstuhl Seminar 12401).
Dagstuhl Reports, 2012

Rozzle: De-cloaking Internet Malware.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

Symbolic finite state transducers: algorithms and applications.
Proceedings of the 39th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2012

Private Client-Side Profiling with Random Forests and Hidden Markov Models.
Proceedings of the Privacy Enhancing Technologies - 12th International Symposium, 2012

Finding Malware on a Web Scale.
Proceedings of the Computer Network Security, 2012

2011
Fast and Precise Sanitizer Analysis with BEK.
Proceedings of the 20th USENIX Security Symposium, 2011

ZOZZLE: Fast and Precise In-Browser JavaScript Malware Detection.
Proceedings of the 20th USENIX Security Symposium, 2011

Verified Security for Browser Extensions.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

RePriv: Re-imagining Content Personalization and In-browser Privacy.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

SCRIPTGARD: automatic context-sensitive sanitization for large-scale legacy web applications.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Towards ensuring client-side computational integrity.
Proceedings of the 3rd ACM Cloud Computing Security Workshop, 2011

2010
AjaxScope: A Platform for Remotely Monitoring the Client-Side Behavior of Web 2.0 Applications.
ACM Trans. Web, 2010

JSMeter: Comparing the Behavior of JavaScript Benchmarks with Real Web Applications.
Proceedings of the USENIX Conference on Web Application Development, 2010

ConScript: Specifying and Enforcing Fine-Grained Security Policies for JavaScript in the Browser.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

Fluxo: a system for internet service programming by non-expert developers.
Proceedings of the 1st ACM Symposium on Cloud Computing, 2010

2009
NOZZLE: A Defense Against Heap-spraying Code Injection Attacks.
Proceedings of the 18th USENIX Security Symposium, 2009

GATEKEEPER: Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code.
Proceedings of the 18th USENIX Security Symposium, 2009

CatchAndRetry: extending exceptions to handle distributed system failures and recovery.
Proceedings of the Fifth Workshop on Programming Languages and Operating Systems, 2009

Merlin: specification inference for explicit information flow problems.
Proceedings of the 2009 ACM SIGPLAN Conference on Programming Language Design and Implementation, 2009

FLUXO: A Simple Service Compiler.
Proceedings of HotOS'09: 12th Workshop on Hot Topics in Operating Systems, 2009

Improving the responsiveness of internet services with automatic cache placement.
Proceedings of the 2009 EuroSys Conference, Nuremberg, Germany, April 1-3, 2009, 2009

09141 Executive Summary - Web Application Security.
Proceedings of the Web Application Security, 29.03. - 03.04.2009, 2009

09141 Abstracts Collection - Web Application Security.
Proceedings of the Web Application Security, 29.03. - 03.04.2009, 2009

Ripley: automatically securing web 2.0 applications through replicated execution.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Volta: Developing Distributed Applications by Recompiling.
IEEE Softw., 2008

Spectator: Detection and Containment of JavaScript Worms.
Proceedings of the 2008 USENIX Annual Technical Conference, 2008

Doloto: code splitting for network-bound web 2.0 applications.
Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2008

Securing web applications with static and dynamic information flow tracking.
Proceedings of the 2008 ACM SIGPLAN Symposium on Partial Evaluation and Semantics-based Program Manipulation, 2008

2007
Improving software insecurity with precise static and runtime analysis.
PhD thesis, 2007

Using web application construction frameworks to protect against code injection attacks.
Proceedings of the 2007 Workshop on Programming Languages and Analysis for Security, 2007

End-to-End Web Application Security.
Proceedings of HotOS'07: 11th Workshop on Hot Topics in Operating Systems, 2007

2006
Mining Additions of Method Calls in ArgoUML.
Proceedings of the Aspects For Legacy Applications, 26.07. - 29.07.2006, 2006

2005
Finding Security Vulnerabilities in Java Applications with Static Analysis.
Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, July 31, 2005

DynaMine: finding common error patterns by mining software revision histories.
Proceedings of the 10th European Software Engineering Conference held jointly with 13th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2005

Context-sensitive program analysis as database queries.
Proceedings of the Twenty-fourth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, 2005

Finding application errors and security flaws using PQL: a program query language.
Proceedings of the 20th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2005

Improving software security with a C pointer analysis.
Proceedings of the 27th International Conference on Software Engineering (ICSE 2005), 2005

Reflection Analysis for Java.
Proceedings of the Programming Languages and Systems, Third Asian Symposium, 2005

2003
Tracking pointers with path and context sensitivity for bug detection in C programs.
Proceedings of the 11th ACM SIGSOFT Symposium on Foundations of Software Engineering 2003 held jointly with 9th European Software Engineering Conference, 2003


  Loading...