"EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis"
          Engin Kirda, ... -- NDSS 2011
        
        
          "Automated Discovery of Parameter Pollution Vulnerabilities in Web Applications"
          Engin Kirda, ... -- NDSS 2011
        
        
          "PiOS: Detecting Privacy Leaks in iOS Applications"
          Engin Kirda, ... -- NDSS 2011
        
        
          "The Power of Procrastination: Detection and Mitigation of Execution-Stalling Malicious Code"
          Engin Kirda, ... -- CCS 2011
        
        
          "Insights into User Behavior in Dealing with Internet Attacks"
          Kaan Onarlioglu, Engin Kirda, ... -- NDSS 2012
        
        
          "PUBCRAWL: Protecting Users and Businesses from CRAWLers"
          Engin Kirda, ... -- Usenix 2012
        
        
          "A Practical, Targeted, and Stealthy Attack Against WPA Enterprise Authentication"
          Aldo Cassola, William Robertson, Engin Kirda, Guevara Noubir, ... -- NDSS 2013
        
        
          "Clickonomics: Determining the Effect of Anti-Piracy Measures for One-Click Hosting"
          Tobias Lauinger, Kaan Onarlioglu, Engin Kirda, ... -- NDSS 2013
        
        
          "PrivExec: Private Execution as an Operating System Service"
          Kaan Onarlioglu, Collin Mulliner, William Robertson, Engin Kirda, ... -- Oakland 2013
        
        
          "Security Analysis of Pseudo-Random Number Generators with Input: /dev/random is not Robust"
          Daniel Wichs, ... -- CCS 2013
        
        
          "You Are How You Click: Clickstream Analysis for Sybil Detection"
          Christo Wilson, ... -- Usenix 2013
        
        
          "Efficient Private File Retrieval by Combining ORAM and PIR"
          Travis Mayberry, Erik-Oliver Blass, Agnes Hui Chan, ... -- NDSS 2014
        
        
          "Hidden GEMs: Automated Discovery of Access Control Vulnerabilities in Graphical User Interfaces"
          Collin Mulliner, William Robertson, Engin Kirda, ... -- Oakland 2014
        
        
          "AutoCog: Measuring the Description-to-permission Fidelity in Android Applications"
          Tiantian Zhu, ... -- CCS 2014
        
        
          "Toward Robust Hidden Volumes using Write-Only Oblivious RAM"
          Erik-Oliver Blass, Travis Mayberry, Guevara Noubir, Kaan Onarlioglu, ... -- CCS 2014
        
        
          "A Look at Targeted Attacks Through the Lense of an NGO"
          Engin Kirda, ... -- Usenix 2014
        
        
          "Towards Detecting Anomalous User Behavior in Online Social Networks"
          Alan Mislove, ... -- Usenix 2014
        
        
          "Authenticating Privately over Public Hotspots"
          Aldo Cassola, Guevara Noubir, ... -- CCS 2015
        
        
          "ZigZag: Automatically Hardening Web Applications Against Client-side Validation Vulnerabilities"
          Michael Weissbacher, William Robertson, Engin Kirda, ... -- Usenix 2015
        
        
          "CrossFire:  An Analysis of Firefox Extension-Reuse Vulnerabilities"
          Ahmet Salih Buyukkayhan, Kaan Onarlioglu, William Robertson, Engin Kirda, ... -- NDSS 2016
        
        
          "Inferring User Routes and Locations using Zero-Permission Mobile Sensors"
          Sashank Narain, Triet Vo Huu, Kenneth Block, Guevara Noubir, ... -- Oakland 2016
        
        
          "LAVA: Large-scale Automated Vulnerability Addition"
          Engin Kirda, Andrea Mambretti, Wil Robertson, ... -- Oakland 2016
        
        
          "TriggerScope: Towards Detecting Logic Bombs in Android Applications"
          William Robertson, Engin Kirda, ... -- Oakland 2016
        
        
          "Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem"
          Taejoong Chung, David Choffnes, Alan Mislove, Christo Wilson, ... -- CCS 2016
        
        
          "UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware"
          Amin Kharaz, Sajjad Arshad, William Robertson, Engin Kirda, ... -- Usenix 2016
        
        
          "Caught Red Handed: Tracing Information Flows Between Ad Exchanges Using Retargeted Ads"
          Muhammad Ahmad Bashir, Sajjad Arshad, William Robertson, Christo Wilson, ... -- Usenix 2016
        
        
          "Thou Shalt Not Depend on Me: Analysing the Use of Outdated JavaScript Libraries on the Web"
          Tobias Lauinger, Abdelberi Chaabane, Sajjad Arshad, William Robertson, Christo Wilson, Engin Kirda, ... -- NDSS 2017
        
        
          "FBS-Radar: Uncovering Fake Base Stations at Scale in the Wild"
          Christo Wilson, ... -- NDSS 2017
        
        
          "CRLite: A Scalable System for Pushing All TLS Revocations to All Browsers"
          James Larisch, David Choffnes, Alan Mislove, Christo Wilson, ... -- Oakland 2017
        
        
          "SymCerts: Practical Symbolic Execution For Exposing Noncompliance in X.509 Certificate Validation Implementations"
          Cristina Nita-Rotaru, ... -- Oakland 2017
        
        
          "Full accounting for verifiable outsourcing"
          Abhi Shelat, ... -- CCS 2017
        
        
          "Rise of the HaCRS: Augmenting Autonomous Cyber Reasoning Systems with Human Assistance"
          Michael Weissbacher, ... -- CCS 2017
        
        
          "Scaling ORAM for Secure Computation"
          Jack Doerner, Abhi Shelat, ... -- CCS 2017
        
        
          "Identifier Binding Attacks and Defenses in Software-Defined Networks"
          Cristina Nita-Rotaru, ... -- Usenix 2017
        
        
          "Game of Registrars: An Empirical Analysis of Post-Expiration Domain Name Takeovers"
          Tobias Lauinger, Ahmet Salih Buyukkayhan, Wil Robertson, ... -- Usenix 2017
        
        
          "A Longitudinal, End-to-End View of the DNSSEC Ecosystem"
          Taejoong Chung, David Choffnes, Alan Mislove, Christo Wilson, ... -- Usenix 2017
        
        
          "Automated Attack Discovery in TCP Congestion Control Using a Model-guided Approach."
          David Choffnes, Alan Mislove, Cristina Nita-Rotaru, ... -- NDSS 2018
        
        
          "Bug Fixes, Improvements, ... and Privacy Leaks - A Longitudinal Study of PII Leaks Across Android App Versions."
          Jingjing Ren, Daniel J. Dubois, David Choffnes, ... -- NDSS 2018
        
        
          "InstaGuard: Instantly Deployable Hot-patches for Vulnerable System Programs on Android."
          Yaohui Chen, Long Lu, ... -- NDSS 2018
        
        
          "Investigating Ad Transparency Mechanisms in Social Media: A Case Study of Facebooks Explanations."
          Giridhari Venkatadri, Alan Mislove, ... -- NDSS 2018
        
        
          "Compiler-assisted Code Randomization"
          Yaohui Chen, Long Lu, ... -- Oakland 2018
        
        
          "Doubly-efficient zkSNARKs without trusted setup"
          Abhi Shelat, ... -- Oakland 2018
        
        
          "Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning"
          Matthew Jagielski, Alina Oprea, Cristina Nita-Rotaru, ... -- Oakland 2018
        
        
          "Privacy Risks with Facebook's PII-based Targeting: Auditing a Data Broker's Advertising Interface"
          Giridhari Venkatadri, Yabing Liu, Alan Mislove, ... -- Oakland 2018
        
        
          "Secure Two-party Threshold ECDSA from ECDSA Assumptions"
          Jack Doerner, Yashvanth Kondi, Eysa Lee, Abhi shelat, ... -- Oakland 2018
        
        
          "Surveylance: Automatically Detecting Online Survey Scams"
          William Robertson, Engin Kirda, ... -- Oakland 2018
        
        
          "PrinTracker: Fingerprinting 3D Printers using Commodity Scanners"
          Yanzhi Wang, ... -- CCS 2018
        
        
          "Cross-App Poisoning in Software-Defined Networking"
          Cristina Nita-Rotaru, ... -- CCS 2018
        
        
          "A better method to analyze blockchain consistency"
          Lucianna Kiffer, Abhi Shelat, Rajmohan Rajaraman, ... -- CCS 2018
        
        
          "Web's Sixth Sense: A Study of Scripts Accessing Smartphone Sensors"
          Amogh Pradeep, ... -- CCS 2018
        
        
          "An Empirical Study of Web Resource Manipulation in Real-world Mobile Applications"
          Long Lu, ... -- Usenix 2018
        
        
          "A First Look into the Facebook Advertising Ecosystem"
          Alan Mislove, ... -- NDSS 2019
        
        
          "Quantity vs. Quality: Evaluating User Interest Profiles Using Ad Preference Managers"
          Muhammad Ahmad Bashir, Christo Wilson, ... -- NDSS 2019
        
        
          "Blind Certificate Authorities"
          Abhi Shelat, ... -- Oakland 2019
        
        
          "Dominance as a New Trusted Computing Primitive for the Internet of Things"
          Zhichuang Sun, ... -- Oakland 2019
        
        
          "Security of GPS/INS based On-road Location Tracking Systems"
          Sashank Narain, Aanjhan Ranganathan, Guevara Noubir, ... -- Oakland 2019
        
        
          "Threshold ECDSA from ECDSA Assumptions"
          Jack Doerner, Yashvanth Kondi, Eysa Lee, Abhi shelat, ... -- Oakland 2019
        
        
          "Securely Sampling Biased Coins with Applications to Differential Privacy"
          Jeffrey Champion, Abhi Shelat, Jonathan Ullman, ... -- CCS 2019
        
        
          "You Are Who You Appear to Be: A Longitudinal Study of Domain Impersonation in TLS Certificates"
          Alan Mislove, ... -- CCS 2019
        
        
          "A Billion Open Interfaces for Eve and Mallory: MitM, DoS, and Tracking Attacks on iOS and macOS Through Apple Wireless Direct Link"
          Sashank Narain, Guevara Noubir, ... -- Usenix 2019
        
        
          "Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks"
          Matthew Jagielski, Alina Oprea, Cristina Nita-Rotaru, ... -- Usenix 2019
        
        
          "Wireless Attacks on Aircraft Instrument Landing Systems"
          Harshad Sathaye, Domien Schepers, Aanjhan Ranganathan, Guevara Noubir, ... -- Usenix 2019
        
        
          "Reading the Tea leaves: A Comparative Analysis of Threat Intelligence"
          Matthew Dunn, ... -- Usenix 2019
        
        
          "FlowPrint: Semi-Supervised Mobile-App Fingerprinting on Encrypted Network Traffic"
          Jingjing Ren, Daniel J. Dubois, David Choffnes, ... -- NDSS 2020
        
        
          "HotFuzz: Discovering Algorithmic Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing"
          Andrea Mambretti, Sajjad Arshad, Michael Weissbacher, William Robertson, Engin Kirda, ... -- NDSS 2020
        
        
          "Even Black Cats Cannot Stay Hidden in the Dark: Full-band De-anonymization of Bluetooth Classic Devices"
          Guevara Noubir, ... -- Oakland 2020
        
        
          "FlyClient: Super-Light Clients for Cryptocurrencies"
          Lucianna Kiffer, ... -- Oakland 2020
        
        
          "OAT: Attesting Operation Integrity of Embedded Devices"
          Zhichuang Sun, Bo Feng, Long Lu, ... -- Oakland 2020
        
        
          "SAVIOR: Towards Bug-Driven Hybrid Testing"
          Yaohui Chen, Long Lu, ... -- Oakland 2020
        
        
          "Cached and Confused: Web Cache Deception in the Wild"
          Sajjad Arshad, Engin Kirda, William Robertson, ... -- Usenix 2020
        
        
          "P2IM: Scalable and Hardware-independent Firmware Testing via Automatic Peripheral Interface Modeling"
          Bo Feng, Alejandro Mera, Long Lu, ... -- Usenix 2020
        
        
          "High Accuracy and High Fidelity Extraction of Neural Networks"
          Matthew Jagielski, ... -- Usenix 2020
        
        
          "More than a Fair Share: Network Data Remanence Attacks against Secret Sharing-based Schemes"
          Daniel Kostecki, Anthony Peterson, Cristina Nita-Rotaru, ... -- NDSS 2021
        
        
          "KUBO: Precise and Scalable Detection of User-triggerable Undefined Behavior Bugs in OS Kernel"
          Changming Liu, Long Lu, ... -- NDSS 2021
        
        
          "DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis"
          Alejandro Mera, Bo Feng, Long Lu, Engin Kirda, ... -- Oakland 2021
        
        
          "Diogenes: Lightweight Scalable RSA Modulus Generation with a Dishonest Majority"
          Megan Chen, abhi shelat, ... -- Oakland 2021
        
        
          "Keep the Dirt: Tainted TreeKEM, Adaptively and Actively Secure Continuous Group Key Agreement"
          Chethan Kamath, ... -- Oakland 2021
        
        
          "Linking Bluetooth LE & Classic and Implications for Privacy-Preserving Bluetooth-Based Protocols"
          Norbert Ludant, Tien D. Vo-Huu, Guevara Noubir, ... -- Oakland 2021
        
        
          "Manipulation Attacks in Local Differential Privacy"
          Albert Cheu, Jonathan Ullman, ... -- Oakland 2021
        
        
          "Proactive Threshold Wallets with Offline Devices"
          Yashvanth Kondi, ... -- Oakland 2021
        
        
          "Subpopulation Data Poisoning Attacks"
          Matthew Jagielski, Giorgio Severi, Niklas Pousette Harger, Alina Oprea, ... -- CCS 2021
        
        
          "HTTP Request Smuggling with Differential Fuzzing"
          Bahruz Jabiyev, Steven Sprecher, Engin Kirda, ... -- CCS 2021
        
        
          "PTAuth: Temporal Memory Safety via Robust Points-to Authentication"
          Reza Mirzazade Farkhani, Mansour Ahmadi, Long Lu, ... -- Usenix 2021
        
        
          "Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers"
          Giorgio Severi, Alina Oprea, ... -- Usenix 2021
        
        
          "Deep-Dup: An Adversarial Weight Duplication Attack Framework to Crush Deep Neural Network in Multi-Tenant FPGA"
          Yukui Luo, Xiaolin Xu, ... -- Usenix 2021
        
        
          "Mind Your Weight(s): A Large-scale Study on Insufficient Machine Learning Model Protection in Mobile Apps"
          Zhichuang Sun, Ruimin Sun, Long Lu, Alan Mislove, ... -- Usenix 2021
        
        
          "Finding Bugs Using Your Own Code: Detecting Functionally-similar yet Inconsistent Code"
          Mansour Ahmadi, Reza Mirzazade Farkhani, Ryan Williams, Long Lu, ... -- Usenix 2021
        
        
          "Extracting Training Data from Large Language Models"
          Matthew Jagielski, Alina Oprea, ... -- Usenix 2021
        
        
          "Dirty Road Can Attack: Security of Deep Learning based Automated Lane Centering under Physical-World Attack"
          Xue Lin, ... -- Usenix 2021
        
        
          "D-Box: DMA-enabled compartmentalization for embedded applications"
          Alejandro Mera, Yi Hui Chen, Ruimin Sun, Engin Kirda, Long Lu, ... -- NDSS 2022
        
        
          "SemperFi: Anti-spoofing GPS Receiver for UAVs"
          Harshad Sathaye, Gerald LaMountain, Pau Closas, Aanjhan Ranganathan, ... -- NDSS 2022
        
        
          "V-Range: Enabling Secure Ranging in 5G Wireless Networks"
          Aanjhan Ranganathan, ... -- NDSS 2022
        
        
          "Automated Attack Synthesis by Extracting Finite State Machines from Protocol Specification Documents"
          Max von Hippel, Ben Weintraub, Cristina Nita-Rotaru, ... -- Oakland 2022
        
        
          "ShorTor: Improving Tor Network Latency via Multi-hop Overlay Routing"
          Ben Weintraub, Cristina Nita-Rotaru, ... -- Oakland 2022
        
        
          "Hammurabi: A Framework for Pluggable, Logic-Based X.509 Certificate Validation Policies"
          Alan Mislove, Christo Wilson, ... -- CCS 2022
        
        
          "Order-Disorder: Imitation Adversarial Attacks for Black-box Neural Ranking Models"
          Kaisong Song, ... -- CCS 2022
        
        
          "Web Cache Deception Escalates!"
          Engin Kirda, ... -- Usenix 2022
        
        
          "An Experimental Study of GPS Spoofing and Takeover Attacks on UAVs"
          Harshad Sathaye, Aanjhan Ranganathan, ... -- Usenix 2022
        
        
          "FRAMESHIFTER: Security Implications of HTTP/2-to-HTTP/1 Conversion Anomalies"
          Bahruz Jabiyev, Steven Sprecher, Anthony Gavazzi, Tommaso Innocenti, Engin Kirda, ... -- Usenix 2022