Vitaly Shmatikov
According to our database1,
Vitaly Shmatikov
authored at least 129 papers
between 1998 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proc. Priv. Enhancing Technol., January, 2024
Controlled Generation of Natural Adversarial Documents for Stealthy Retrieval Poisoning.
CoRR, 2024
CoRR, 2024
CoRR, 2024
Machine Against the RAG: Jamming Retrieval-Augmented Generation with Blocker Documents.
CoRR, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the Twelfth International Conference on Learning Representations, 2024
Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, 2024
Mithridates: Auditing and Boosting Backdoor Resistance of Machine Learning Pipelines.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
CoRR, 2023
CoRR, 2023
CoRR, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, 2023
2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020
Proceedings of the 8th International Conference on Learning Representations, 2020
Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing, 2020
Proceedings of the 23rd International Conference on Artificial Intelligence and Statistics, 2020
2019
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Proceedings of the Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, 2019
Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2019
2018
CoRR, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
2016
GetMobile Mob. Comput. Commun., 2016
Proc. Priv. Enhancing Technol., 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the 2016 IEEE Winter Conference on Applications of Computer Vision, 2016
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
2015
Proceedings of the 24th International Conference on World Wide Web, 2015
Proceedings of the 24th International Conference on World Wide Web, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Using Frankencerts for Automated Adversarial Testing of Certificate Validation in SSL/TLS Implementations.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014
Proceedings of the Privacy Enhancing Technologies - 14th International Symposium, 2014
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
2013
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013
Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation, 2013
The Postman Always Rings Twice: Attacking and Defending postMessage in HTML5 Websites.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
Proceedings of the IEEE Symposium on Security and Privacy, 2012
Proceedings of the IEEE Symposium on Security and Privacy, 2012
Eternal Sunshine of the Spotless Machine: Protecting Privacy with Ephemeral Channels.
Proceedings of the 10th USENIX Symposium on Operating Systems Design and Implementation, 2012
The most dangerous code in the world: validating SSL certificates in non-browser software.
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011
A security policy oracle: detecting security holes using multiple API implementations.
Proceedings of the 32nd ACM SIGPLAN Conference on Programming Language Design and Implementation, 2011
Proceedings of the 2011 Workshop on Programming Languages and Analysis for Security, 2011
Proceedings of the 26th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2011
Proceedings of the 3rd USENIX Workshop on Hot Topics in Cloud Computing, 2011
Get off my prefix! the need for dynamic, gerontocratic policies in inter-domain routing.
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011
2010
Proceedings of the Security and Privacy in Communication Networks, 2010
Proceedings of the 2010 Workshop on Programming Languages and Analysis for Security, 2010
Proceedings of the 7th USENIX Symposium on Networked Systems Design and Implementation, 2010
2009
Proceedings of the 30th IEEE Symposium on Security and Privacy (SP 2009), 2009
Proceedings of the Financial Cryptography and Data Security, 2009
Proceedings of the 22nd IEEE Computer Security Foundations Symposium, 2009
2008
Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP 2008), 2008
Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP 2008), 2008
The cost of privacy: destruction of data-mining utility in anonymized data publishing.
Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2008
2007
Proceedings of the 2007 Workshop on Large Scale Attack Defense, 2007
Proceedings of the Twenty-Sixth Annual ACM Symposium on Principles of Distributed Computing, 2007
Proceedings of the 4th Symposium on Networked Systems Design and Implementation (NSDI 2007), 2007
Proceedings of the Advances in Cryptology, 2007
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007
Proceedings of the Advances in Computer Science, 2007
2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the 2006 ACM Workshop on Privacy in the Electronic Society, 2006
Large-scale collection and sanitization of network security data: risks and challenges.
Proceedings of the New Security Paradigms Workshop 2006, 2006
Proceedings of the Twelfth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2006
Proceedings of the Computer Security, 2006
2005
Symbolic protocol analysis with an Abelian group operator or Diffie-Hellman exponentiation.
J. Comput. Secur., 2005
IACR Cryptol. ePrint Arch., 2005
Proceedings of the Automata, Languages and Programming, 32nd International Colloquium, 2005
Proceedings of the Financial Cryptography and Data Security, 2005
Proceedings of the 18th IEEE Computer Security Foundations Workshop, 2005
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005
Proceedings of the Advances in Cryptology, 2005
2004
J. Comput. Secur., 2004
Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, 2004
Proceedings of the Privacy Enhancing Technologies, 4th International Workshop, 2004
Proceedings of the Advances in Cryptology, 2004
Decidable Analysis of Cryptographic Protocols with Products and Modular Exponentiation.
Proceedings of the Programming Languages and Systems, 2004
2003
Intruder Deductions, Constraint Solving and Insecurity Decision in Presence of Exclusive or.
Proceedings of the 18th IEEE Symposium on Logic in Computer Science (LICS 2003), 2003
Proceedings of the 16th IEEE Computer Security Foundations Workshop (CSFW-16 2003), 30 June, 2003
2002
Proceedings of the Software Security -- Theories and Systems, 2002
Proceedings of the 15th IEEE Computer Security Foundations Workshop (CSFW-15 2002), 2002
2001
Proceedings of the CCS 2001, 2001
2000
Proceedings of the Network and Distributed System Security Symposium, 2000
Proceedings of the Financial Cryptography, 2000
1999
Proceedings of the Fifteenth Conference on Mathematical Foundations of Progamming Semantics, 1999
1998
Proceedings of the 7th USENIX Security Symposium, 1998
Proceedings of the 11th IEEE Computer Security Foundations Workshop, 1998