"Using Model Checking to Analyze Network Vulnerabilities"
          Paul Ammann, ... -- Oakland 2000
        
        
          "Kronos: A Scalable Group Re-Keying Approach for Secure Multicast"
          Sanjeev Setia, Samir Koussih, Sushil Jajodia, ... -- Oakland 2000
        
        
          "Performance of Public Key-Enabled Kerberos Authentication in Large Networks"
          Daniel A. Menasce, ... -- Oakland 2001
        
        
          "Policy algebras for access control: the propositional case"
          Duminda Wijesekera, Sushil Jajodia, ... -- CCS 2001
        
        
          "The performance of public key-enabled kerberos authentication in mobile computing applications"
          Daniel A. Menasce, ... -- CCS 2001
        
        
          "Policy algebras for access control the predicate case"
          Duminda Wijesekera, Sushil Jajodia, ... -- CCS 2002
        
        
          "Scalable, graph-based network vulnerability analysis"
          Paul Ammann, Duminda Wijesekera, Saket Kaushik, ... -- CCS 2002
        
        
          "LEAP: efficient security mechanisms for large-scale distributed sensor networks"
          Sencun Zhu, Sanjeev Setia, Sushil Jajodia, ... -- CCS 2003
        
        
          "Balancing confidentiality and efficiency in untrusted relational DBMSs"
          Sushil Jajodia, ... -- CCS 2003
        
        
          "Safety in Automated Trust Negotiation"
          William H. Winsborough, ... -- Oakland 2004
        
        
          "Securing OLAP Data Cubes Against Privacy Breaches"
          Lingyu Wang, Sushil Jajodia, Duminda Wijesekera, ... -- Oakland 2004
        
        
          "An Interleaved Hop-by-Hop Authentication Scheme for Filtering False Data Injection in Sensor Networks"
          Sencun Zhu, Sanjeev Setia, Sushil Jajodia, ... -- Oakland 2004
        
        
          "Tracking Anonymous Peer-to-Peer VoIP Calls on the Internet"
          Xinyuan Wang, Shiping Chen, Sushil Jajodia, ... -- CCS 2005
        
        
          "Providing Witness Anonymity in Peer-to-Peer Systems"
          Bo Zhu, Sanjeev Setia, Sushil Jajodia, ... -- CCS 2006
        
        
          "Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems"
          Xinyuan Wang, Sushil Jajodia, ... -- Oakland 2007
        
        
          "Stealthy Malware Detection Through VMM-Based 'Out-of-the-Box' Semantic View Reconstruction"
          Xuxian Jiang, Xinyuan Wang, ... -- CCS 2007
        
        
          "Information Disclosure under Realistic Assumptions: Privacy versus Optimality"
          Lei Zhang, Sushil Jajodia, Alexander Brodsky, ... -- CCS 2007
        
        
          "Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution"
          Xuxian Jiang, ... -- NDSS 2008
        
        
          "Casting out Demons: Sanitizing Training Data for Anomaly Sensors"
          Angelos Stavrou, ... -- Oakland 2008
        
        
          "Assessing Query Privileges via Safe and Efficient Permission Composition"
          Sushil Jajodia, ... -- CCS 2008
        
        
          "SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes"
          Kun Sun, Jiang Wang, Fengwei Zhang, Angelos Stavrou, ... -- NDSS 2012
        
        
          "Chrome Extensions: Threat Analysis and Countermeasures"
          Songqing Chen, ... -- NDSS 2012
        
        
          "Priceless: The Role of Payments in Abuse-advertised Goods"
          Damon McCoy, Hitesh Dharmdasani, ... -- CCS 2012
        
        
          "Manufacturing Compromise: The Emergence of Exploit-as-a-Service"
          Damon McCoy, ... -- CCS 2012
        
        
          "Vigilare: Toward Snoop-based Kernel Integrity Monitor"
          Brent Byunghoon Kang, ... -- CCS 2012
        
        
          "PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs"
          Damon McCoy, ... -- Usenix 2012
        
        
          "Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse"
          Damon McCoy, ... -- Usenix 2013
        
        
          "Scambaiter: Understanding Targeted Nigerian Scams on Craigslist"
          Jackie Jones, Damon McCoy, ... -- NDSS 2014
        
        
          "Botcoin: Monetizing Stolen Cycles"
          Hitesh Dharmdasani, Damon McCoy, ... -- NDSS 2014
        
        
          "Doppelganger Finder: Taking Stylometry To The Underground"
          Damon McCoy, ... -- Oakland 2014
        
        
          "Dialing Back Abuse on Phone Verified Accounts"
          Damon McCoy, ... -- CCS 2014
        
        
          "Characterizing Large-Scale Click Fraud in ZeroAccess"
          Damon McCoy, ... -- CCS 2014
        
        
          "Ad Injection at Scale: Assessing Deceptive Advertisement Modifications"
          Damon McCoy, ... -- Oakland 2015
        
        
          "Using Hardware Features for Increased Debugging Transparency"
          Fengwei Zhang, Angelos Stavrou, ... -- Oakland 2015
        
        
          "When a Tree Falls:  Using Diversity in Ensemble Classifiers to Identify Evasion in Malware Detectors"
          Charles Smutz, Angelos Stavrou, ... -- NDSS 2016
        
        
          "You've Got Vulnerability: Exploring Effective Vulnerability Notifications"
          Mohammad Karami, ... -- Usenix 2016
        
        
          "TumbleBit: An Untrusted Bitcoin-Compatible Anonymous Payment Hub"
          Foteini Baldimtsi, ... -- NDSS 2017
        
        
          "To Catch a Ratter: Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild"
          Mohammad Rezaeirad, ... -- Oakland 2017
        
        
          "Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation"
          Samuel Ranellucci, ... -- CCS 2017
        
        
          "Global-Scale Secure Multiparty Computation"
          Samuel Ranellucci, ... -- CCS 2017
        
        
          "Vulnerable Implicit Service: A Revisit"
          Lingguang Lei, Kun Sun, ... -- CCS 2017
        
        
          "Secure Computation with Differentially Private Access Patterns"
          Sahar Mazloom, S. Dov Gordon, ... -- CCS 2018
        
        
          "Schrödinger's RAT: Profiling the Stakeholders in the Remote Access Trojan Ecosystem"
          Mohammad Rezaeirad, ... -- Usenix 2018
        
        
          "End-Users Get Maneuvered: Empirical Analysis of Redirection Hijacking in Content Delivery Networks"
          Angelos Stavrou, ... -- Usenix 2018
        
        
          "Multisketches: Practical Secure Sketches Using Off-the-Shelf Biometric Matching Algorithms"
          Tanmoy Chowdhury, Emanuela Marasco, ... -- CCS 2019
        
        
          "Stormy: Statistics in Tor by Measuring Securely"
          S. Dov Gordon, ... -- CCS 2019
        
        
          "Two-party Private Set Intersection with an Untrusted Third Party."
          Phi Hung Le, Samuel Ranellucci, S. Dov Gordon, ... -- CCS 2019
        
        
          "The CrossPath Attack: Disrupting the SDN Control Channel via Shared Links"
          Kun Sun, ... -- Usenix 2019
        
        
          "Adversarial Classification Under Differential Privacy"
          Jonathan Katz, ... -- NDSS 2020
        
        
          "When Match Fields Do Not Need to Match: Buffered Packets Hijacking in SDN"
          Jiahao Cao, Kun Sun, ... -- NDSS 2020
        
        
          "SPECCFI: Mitigating Spectre Attacks Using CFI Imformed Speculation"
          Khaled Khasawneh, ... -- Oakland 2020
        
        
          "When the Differences in Frequency Domain are Compensated: Understanding and Defeating Modulated Replay Attacks on Automatic Speech Recognition"
          Shu Wang, Xu He, Kun Sun, ... -- CCS 2020
        
        
          "Off-Path TCP Exploits of the Mixed IPID Assignment"
          Kun Sun, ... -- CCS 2020
        
        
          "Cache-in-the-Middle (CITM) Attacks : Manipulating Sensitive Data in Isolated Execution Environments"
          Jie Wang, Kun Sun, ... -- CCS 2020
        
        
          "Secure parallel computation on national scale volumes of data"
          Sahar Mazloom, Phi Hung Le, S. Dov Gordon, ... -- Usenix 2020
        
        
          "Locating the Security Patches for Disclosed OSS Vulnerabilities with Vulnerability-Commit Correlation Ranking"
          Kun Sun, ... -- CCS 2021
        
        
          "SyncAttack: Double-spending in Bitcoin Without Mining Power"
          Songqing Chen, ... -- CCS 2021
        
        
          "Warmonger: Inflicting Denial-of-Service via Serverless Functions in the Cloud"
          Mingkui Wei, ... -- CCS 2021
        
        
          "Compressed Oblivious Encoding for Homomorphically Encrypted Search"
          S. Dov Gordon, ... -- CCS 2021
        
        
          "A Hard Label Black-box Adversarial Attack Against Graph Neural Networks"
          Kun Sun, ... -- CCS 2021
        
        
          "Domain Shadowing: Leveraging Content Delivery Networks for Robust Blocking-Resistant Communications"
          Mingkui Wei, ... -- Usenix 2021
        
        
          "Repttack: Exploiting Cloud Schedulers to Guide Co-Location Attacks"
          Behnam Omidi, Khaled N. Khasawneh, ... -- NDSS 2022
        
        
          "PMTUD is not Panacea: Revisiting IP Fragmentation Attacks against TCP"
          Kun Sun, ... -- NDSS 2022
        
        
          "AccEar: Accelerometer Acoustic Eavesdropping with Unconstrained Vocabulary"
          Panneer Selvam Santhalingam, Parth Pathak, ... -- Oakland 2022
        
        
          "Why Crypto-detectors Fail: A Systematic Evaluation of Cryptographic Misuse Detection Techniques"
          Kevin Moran, ... -- Oakland 2022
        
        
          "Batching, Aggregation, and Zero-Knowledge Proofs in Bilinear Accumulators"
          Ioanna Karantaidou, Foteini Baldimtsi, ... -- CCS 2022
        
        
          "Eluding Secure Aggregation in Federated Learning via Model Inconsistency"
          Giuseppe Ateniese, ... -- CCS 2022
        
        
          "Leakage Inversion: Towards Quantifying Privacy in Searchable Encryption"
          Evgenios M. Kornaropoulos, Nathaniel Moyer, ... -- CCS 2022
        
        
          "Narrator: Secure and Practical State Continuity for Trusted Execution in the Cloud"
          Xiaokuan Zhang, ... -- CCS 2022
        
        
          "Ready Raider One: Exploring the Misuse of Cloud Gaming Services"
          Kun Sun, ... -- CCS 2022
        
        
          "Exploring the Unchartered Space of Container Registry Typosquatting"
          Kun Sun, ... -- Usenix 2022
        
        
          "RapidPatch: Firmware Hotpatching for Real-Time Embedded Devices"
          Kun Sun, ... -- Usenix 2022
        
        
          "Off-Path Network Traffic Manipulation via Revitalized ICMP Redirect Attacks"
          Kun Sun, ... -- Usenix 2022