"A Trend Analysis of Exploitations"
          Hilary Browne, William A. Arbaugh, ... -- Oakland 2001
        
        
          "P5: A Protocol for Scalable Anonymous Communication"
          Rob Sherwood, Bobby Bhattacharjee, Aravind Srinivasan, ... -- Oakland 2002
        
        
          "A key-management scheme for distributed sensor networks"
          Laurent Eschenauer, Virgil Gligor, ... -- CCS 2002
        
        
          "Secret Handshakes from Pairing-Based Key Agreements"
          Narendar Shankar, ... -- Oakland 2003
        
        
          "Efficiency improvements for signature schemes with tight security reductions"
          Jonathan Katz, Nan Wang, ... -- CCS 2003
        
        
          "Securing OLAP Data Cubes Against Privacy Breaches"
          Virgil Gligor, ... -- Oakland 2004
        
        
          "Copilot - a Coprocessor-based Kernel Runtime Integrity Monitor"
          Nick Petroni, Timothy Fraser, Jesus Molina, William A. Arbaugh, ... -- Usenix 2004
        
        
          "Distributed Detection of Node Replication Attacks in Sensor Networks"
          Virgil Gligor, ... -- Oakland 2005
        
        
          "Modeling Insider Attacks on Group Key-Exchange Protocols"
          Jonathan Katz, Ji Sun Shin, ... -- CCS 2005
        
        
          "Misbehaving TCP Receivers Can Cause Internet-Wide Congestion Collapse"
          Rob Sherwood, Bobby Bhattacharjee, ... -- CCS 2005
        
        
          "A Framework for the Evaluation of Intrusion Detection Systems"
          Alvaro A. Cardenas, Karl Seamon, John S. Baras, ... -- Oakland 2006
        
        
          "Rule-Based Static Analysis of Network Protocol Implementations"
          Octavian Udrea, Cristian Lumezanu, Jeffrey S. Foster, ... -- Usenix 2006
        
        
          "An Architecture for Specification-Based Detection of Semantic Integrity Violations in Kernel Dynamic Data"
          Nick Petroni, Timothy Fraser, William A. Arbaugh, ... -- Usenix 2006
        
        
          "Automated Detection of Persistent Kernel Control-Flow Attacks"
          Nick Petroni, Michael Hicks, ... -- CCS 2007
        
        
          "A New Privacy-Enhanced Matchmaking Protocol"
          Ji Sun Shin, ... -- NDSS 2008
        
        
          "Fable: A Language for Enforcing User-defined Security Policies"
          Michael Hicks, Nikhil Swamy, Brian Corcoran, ... -- Oakland 2008
        
        
          "Attacking cryptographic schemes based on 'perturbation polynomials'"
          Jonathan Katz, ... -- CCS 2009
        
        
          "Secure text processing with applications to private DNA matching"
          Jonathan Katz, Lior Malka, ... -- CCS 2010
        
        
          "A new framework for efficient password-based authenticated key exchange"
          Adam Groce, Jonathan Katz, ... -- CCS 2010
        
        
          "Symbolic security analysis of ruby-on-rails web applications"
          Avik Chaudhuri, Jeffrey S. Foster, ... -- CCS 2010
        
        
          "Scantegrity II Municipal Election at Takoma Park: The First E2E Binding Governmental Election with Ballot Privacy"
          Paul S. Herrnson, ... -- Usenix 2010
        
        
          "Efficient Privacy-Preserving Biometric Identification"
          Jonathan Katz, ... -- NDSS 2011
        
        
          "VMCrypt - Modular Software Architecture for Scalable Secure Computation"
          Jonathan Katz, ... -- CCS 2011
        
        
          "Faster Secure Two-Party Computation Using Garbled Circuits"
          Jonathan Katz, ... -- Usenix 2011
        
        
          "Private Set Intersection: Are Garbled Circuits Better than Custom Protocols?"
          Jonathan Katz, ... -- NDSS 2012
        
        
          "Quid-Pro-Quo-tocols: Strengthening Semi-Honest Protocols with Dual Execution"
          Jonathan Katz, ... -- Oakland 2012
        
        
          "Deanonymizing Mobility Traces: Using Social Network as a Side-Channel"
          Mike Hicks, ... -- CCS 2012
        
        
          "How Secure are Power Network Signature Based Time Stamps?"
          Wei-Hong Chuang, Ravi Garg, Min Wu, ... -- CCS 2012
        
        
          "Verifiable Data Streaming"
          Dominique Schroeder, ... -- CCS 2012
        
        
          "Secure Two-Party Computation in Sublinear (Amortized) Time"
          Jonathan Katz, ... -- CCS 2012
        
        
          "ObliviStore: High Performance Oblivious Cloud Storage"
          Elaine Shi, ... -- Oakland 2013
        
        
          "Anon-Pass: Practical Anonymous Subscriptions"
          Jonathan Katz, ... -- Oakland 2013
        
        
          "Path ORAM: An Extremely Simple Oblivious RAM Protocol"
          Elaine Shi, ... -- CCS 2013
        
        
          "Practical Dynamic Proofs of Retrievability"
          Elaine Shi, Charalampos Papamanthou, ... -- CCS 2013
        
        
          "Multi-Cloud Oblivious Storage"
          Elaine Shi, ... -- CCS 2013
        
        
          "PHANTOM: Practical Oblivious Computation in a Secure Processor"
          Elaine Shi, ... -- CCS 2013
        
        
          "Practical Dynamic Searchable Encryption with Small Leakage"
          Charalampos Papamanthou, Elaine Shi, ... -- NDSS 2014
        
        
          "Scambaiter: Understanding Targeted Nigerian Scams on Craigslist"
          Youngsam Park, Elaine Shi, ... -- NDSS 2014
        
        
          "PermaCoin: Repurposing Bitcoin Work for Data Preservation"
          Andrew Miller, Elaine Shi, Jonathan Katz, ... -- Oakland 2014
        
        
          "Quantifying Information Flow for Dynamic Secrets"
          Piotr Mardziel, Michael Hicks, ... -- Oakland 2014
        
        
          "Automating Efficient RAM-Model Secure Computation"
          Chang Liu, Yan Huang, Elaine Shi, Michael Hicks, Jonathan Katz, ... -- Oakland 2014
        
        
          "Wysteria: A Programming Language for Generic, Mixed-mode Multiparty Computations"
          Aseem Rastogi, Matthew A. Hammer, Michael Hicks, ... -- Oakland 2014
        
        
          "Oblivious Data Structures"
          Xiao Wang, Kartik Nayak, Chang Liu, Elaine Shi, ... -- CCS 2014
        
        
          "ALITHEIA: Towards Practical Verifiable Graph Processing"
          Yupeng Zhang, Charalampos Papamanthou, Jonathan Katz, ... -- CCS 2014
        
        
          "SCORAM: Oblivious RAM for Secure Computation"
          Xiao Wang, Elaine Shi, ... -- CCS 2014
        
        
          "RevCast: Fast, Private Certificate Revocation over FM Radio"
          Dave Levin, Neil Spring, ... -- CCS 2014
        
        
          "ShadowCrypt: Encrypted Web Applications for Everyone"
          Elaine Shi, ... -- CCS 2014
        
        
          "SDDR: Light-Weight, Secure Mobile Encounters"
          Matthew Lentz, Elaine Shi, Bobby Bhattacharjee, ... -- Usenix 2014
        
        
          "Brahmastra: Driving Apps to Test the Security of Third-Party Components"
          Jinseong Jeon, ... -- Usenix 2014
        
        
          "TRUESET: Nearly Practical Verifiable Set Computations"
          Ahmed E. Kosba, Charalampos Papamanthou, Mahmoud F. Sayed, Elaine Shi, ... -- Usenix 2014
        
        
          "Burst ORAM: Minimizing ORAM Response Times for Bursty Access Patterns"
          Elaine Shi, ... -- Usenix 2014
        
        
          "ObliVM: A Programming Framework for Secure Computation"
          Chang Liu, Xiao Wang, Kartik Nayak, Elaine Shi, ... -- Oakland 2015
        
        
          "GraphSC: Parallel Secure Computation Made Easy"
          Kartik Nayak, Xiao Wang, Elaine Shi, ... -- Oakland 2015
        
        
          "SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies"
          Andrew Miller, ... -- Oakland 2015
        
        
          "The Attack of the Clones: A Study of the Impact of Shared Code on Vulnerability Patching"
          Richard Johnson, Tudor Dumitras, ... -- Oakland 2015
        
        
          "Nonoutsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining Coalitions"
          Andrew Miller, Ahmed E. Kosba, Jonathan Katz, ... -- CCS 2015
        
        
          "Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound"
          Xiao Wang, ... -- CCS 2015
        
        
          "Automated Analysis and Synthesis of Authenticated Encryption Schemes"
          Viet Tung Hoang, Jonathan Katz, Alex J. Malozemoff, ... -- CCS 2015
        
        
          "IntegriDB: Verifiable SQL for Outsourced Databases"
          Jonathan Katz, Charalampos Papamanthou, Yupeng Zhang, ... -- CCS 2015
        
        
          "The Dropper Effect: Insights into Malware Distribution with Downloader Graph Analytics"
          Bum Jun Kwon, Jayanta Mondal, Tudor Dumitras, ... -- CCS 2015
        
        
          "Efficient Genome-Wide, Privacy-Preserving Similar Patient Query based on Private Edit Distance"
          Xiao Wang, ... -- CCS 2015
        
        
          "De-anonymizing Programmers via Code Stylometry"
          Andrew Liu, ... -- Usenix 2015
        
        
          "Vulnerability Disclosure in the Age of Social Media: Exploiting Twitter for Predicting Real-World Exploits"
          Carl Sabottke, Octavian-Petru Suciu, Tudor Dumitras, ... -- Usenix 2015
        
        
          "Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts"
          Ahmed E. Kosba, Andrew Miller, Charalampos Papamanthou, ... -- Oakland 2016
        
        
          "I Think They're Trying to Tell Me Something: Advice Sources and Selection for Digital Security"
          Elissa M. Redmiles, Amelia R. Malone, Michelle L. Mazurek, ... -- Oakland 2016
        
        
          "Revisiting Square-Root ORAM: Efficient Random Access in Multi-Party Computation"
          Xiao Wang, Jonathan Katz, ... -- Oakland 2016
        
        
          "You Get Where You're Looking For: The Impact Of Information Sources On Code Security"
          Michelle L. Mazurek, Doowon Kim, ... -- Oakland 2016
        
        
          "Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem"
          Frank Cangialosi, Dave Levin, ... -- CCS 2016
        
        
          "FeatureSmith: Automatically Engineering Features for Malware Detection by Mining the Security Literature"
          Ziyun Zhu, Tudor Dumitras, ... -- CCS 2016
        
        
          "How I Learned to be Secure: a Census-Representative Survey of Security Advice Sources and Behavior"
          Elissa M. Redmiles, Michelle L. Mazurek, ... -- CCS 2016
        
        
          "5Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs"
          Daniel Apon, Jonathan Katz, ... -- CCS 2016
        
        
          "POPE: Partial Order Preserving Encoding"
          Daniel Apon, ... -- CCS 2016
        
        
          "Attribute-based Key Exchange with General Policies"
          Alex J. Malozemoff, ... -- CCS 2016
        
        
          "The Ring of Gyges: Investigating the Future of Criminal Smart Contracts"
          Ahmed E. Kosba, ... -- CCS 2016
        
        
          "Build It, Break It, Fix It: Contesting Secure Development"
          Andrew Ruef, Michael Hicks, James Parker, Dave Levin, Michelle L. Mazurek, ... -- CCS 2016
        
        
          "The Honey Badger of BFT Protocols"
          Andrew Miller, ... -- CCS 2016
        
        
          "All Your Queries Are Belong to Us:The Power of File-Injection Attacks on Searchable Encryption"
          Yupeng Zhang, Jonathan Katz, Charalampos Papamanthou, ... -- Usenix 2016
        
        
          "The Cut-and-Choose Game and its Application to Cryptographic Protocols"
          Jonathan Katz, ... -- Usenix 2016
        
        
          "Catching Worms, Trojan Horses and PUPs: Unsupervised Detection of Silent Delivery Campaigns"
          Bum Jun Kwon, Virinchi Srinivas, Amol Deshpande, Tudor Dumitras, ... -- NDSS 2017
        
        
          "HOP: Hardware makes Obfuscation Practical"
          Kartik Nayak, ... -- NDSS 2017
        
        
          "CRLite: A Scalable System for Pushing All TLS Revocations to All Browsers"
          Dave Levin, ... -- Oakland 2017
        
        
          "Comparing the Usability of Cryptographic APIs"
          Doowon Kim, Michelle L. Mazurek, ... -- Oakland 2017
        
        
          "SecureML: A System for Scalable Privacy-Preserving Machine Learning"
          Yupeng Zhang, ... -- Oakland 2017
        
        
          "vSQL: Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases"
          Yupeng Zhang, Daniel Genkin, Jonathan Katz, Dimitrios Papadopoulos, Charalampos Papamanthou, ... -- Oakland 2017
        
        
          "Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation"
          Xiao Wang, Samuel Ranellucci, Jonathan Katz, ... -- CCS 2017
        
        
          "Certified Malware: Measuring Breaches of Trust in the Windows Code-Signing PKI"
          Doowon Kim, Bum Jun Kwon, Tudor Dumitras, ... -- CCS 2017
        
        
          "Global-Scale Secure Multiparty Computation"
          Xiao Wang, Samuel Ranellucci, Jonathan Katz, ... -- CCS 2017
        
        
          "May the Fourth Be With You: A Microarchitectural Side Channel Attack on Real-World Applications of Curve25519"
          Daniel Genkin, ... -- CCS 2017
        
        
          "Solidus: Confidential Distributed Ledger Transactions via PVORM"
          Ahmed E. Kosba, ... -- CCS 2017
        
        
          "DeTor: Provably Avoiding Geographic Regions in Tor"
          Zhihao Li, Stephen Herwig, Dave Levin, ... -- Usenix 2017
        
        
          "Assessing User Perceptions of Online Targeted Advertising"
          Angelisa C. Plane, Elissa M. Redmiles, Michelle L. Mazurek, ... -- Usenix 2017
        
        
          "USB Snooping Made Easy: Crosstalk Leakage Attacks on USB Hubs"
          Daniel Genkin, ... -- Usenix 2017
        
        
          "A Longitudinal, End-to-End View of the DNSSEC Ecosystem"
          Dave Levin, ... -- Usenix 2017
        
        
          "Qapla: Policy compliance for database-backed systems"
          Katura Harvey, ... -- Usenix 2017
        
        
          "Another Flip in the Wall of Rowhammer Defenses"
          Daniel Genkin, ... -- Oakland 2018
        
        
          "Hackers vs. Testers: A Comparison of Software Vulnerability Discovery Processes"
          Daniel Votipka, Rock Stevens, Elissa Redmiles, Jeremy Hu, Michelle L. Mazurek, ... -- Oakland 2018
        
        
          "vRAM: Faster Verifiable RAM With Program-Independent Preprocessing"
          Yupeng Zhang, Daniel Genkin, Jonathan Katz, Charalampos Papamanthou, ... -- Oakland 2018
        
        
          "xJsnark: A Framework for Efficient Verifiable Computation"
          Ahmed E. Kosba, Charalampos Papamanthou, ... -- Oakland 2018
        
        
          "Asking for a Friend: Evaluating Response Biases in Security User Studies"
          Elissa M. Redmiles, Ziyun Zhu, Tudor Dumitras, Michelle L. Mazurek, ... -- CCS 2018
        
        
          "What was that site doing with my Facebook password?, Designing Password-Reuse Notifications"
          Elissa M. Redmiles, ... -- CCS 2018
        
        
          "Evaluating Fuzz Testing"
          George Klees, Andrew Ruef, Benji Cooper, Michael Hicks, ... -- CCS 2018
        
        
          "Improved Non-Interactive Zero Knowledge with Applications to Post-Quantum Signatures"
          Jonathan Katz, Xiao Wang, ... -- CCS 2018
        
        
          "New Constructions for Forward and Backward Private Symmetric Searchable Encryption"
          Charalampos Papamanthou, ... -- CCS 2018
        
        
          "The Battle for New York: A Case Study of Applied Digital Threat Modeling at the Enterprise Level"
          Rock Stevens, Daniel Votipka, Elissa M. Redmiles, Michelle L. Mazurek, ... -- Usenix 2018
        
        
          "The Broken Shield: Measuring Revocation Effectiveness in the Windows Code-Signing PKI"
          Doowon Kim, Bum Jun Kwon, Tudor Dumitras, ... -- Usenix 2018
        
        
          "From Patching Delays to Infection Symptoms: Using Risk Profiles for an Early Discovery of Vulnerabilities Exploited in the Wild"
          Tudor Dumitras, ... -- Usenix 2018
        
        
          "Fast and Service-preserving Recovery from Malware Infections Using CRIU"
          Ashton Webster, Ryan Eckenrod, James Purtilo, ... -- Usenix 2018
        
        
          "When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning Attacks"
          Octavian Suciu, Radu Marginean, Yigitcan Kaya, Hal Daume III, Tudor Dumitras, ... -- Usenix 2018
        
        
          "Measurement and Analysis of Hajime, a Peer-to-peer IoT Botnet"
          Stephen Herwig, Katura Harvey, George Hughey, Richard Roberts, Dave Levin, ... -- NDSS 2019
        
        
          "Data Recovery on Encrypted Databases With k-Nearest Neighbor Query Leakage"
          Charalampos Papamanthou, ... -- Oakland 2019
        
        
          "How Well Do My Results Generalize? Comparing Security and Privacy Survey Results from MTurk, Web, and Telephone Samples"
          Elissa M. Redmiles, Michelle L. Mazurek, ... -- Oakland 2019
        
        
          ""Should I Worry?" A Cross-Cultural Examination of Account Security Incident Response"
          Elissa M. Redmiles, ... -- Oakland 2019
        
        
          "Geneva: Evolving Censorship Evasion Strategies"
          Kevin Bock, George Hughey, Dave Levin, ... -- CCS 2019
        
        
          "Oh, the Places You've Been! User Reactions to Longitudinal Transparency About Third-Party Web Tracking and Inferencing"
          Michelle L. Mazurek, ... -- CCS 2019
        
        
          "Traceback for End-to-End Encrypted Messaging"
          Ian Miers, ... -- CCS 2019
        
        
          "Transparency Logs via Append-only Authenticated Dictionaries"
          Charalampos Papamanthou, ... -- CCS 2019
        
        
          "Two-party Private Set Intersection with an Untrusted Third Party."
          Samuel Ranellucci, ... -- CCS 2019
        
        
          "VoltJockey: Breaching TrustZone by Software-Controlled Voltage Manipulation over Multi-core Frequencies"
          Gang Qu, ... -- CCS 2019
        
        
          "You Are Who You Appear to Be: A Longitudinal Study of Domain Impersonation in TLS Certificates"
          Richard Roberts, Yaelle Goldschlag, Rachel Walter, Dave Levin, ... -- CCS 2019
        
        
          "Terminal Brain Damage: Exposing the Graceless Degradation in Deep Neural Networks Under Hardware Fault Attacks"
          Sanghyun Hong, Yigitcan Kaya, Tudor Dumitras, ... -- Usenix 2019
        
        
          "Users Really Do Answer Telephone Scams"
          Huahong Tu, ... -- Usenix 2019
        
        
          "Compliance Cautions: Investigating Security Issues Associated with U.S. Digital-Security Standards"
          Rock Stevens, Kevin Halliday, Michelle L. Mazurek, ... -- NDSS 2020
        
        
          "Dynamic Searchable Encryption with Small Client Storage"
          Ioannis Demertzis, Charalampos Papamanthou, ... -- NDSS 2020
        
        
          "Finding Safety in Numbers with Secure Allegation Escrows"
          Bobby Bhattacharjee, ... -- NDSS 2020
        
        
          "Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers"
          Jonathan Katz, ... -- Oakland 2020
        
        
          "The State of the Uniform: Attacks on Encrypted Databases Beyond the Uniform Query Distribution"
          Charalampos Papamanthou, ... -- Oakland 2020
        
        
          "A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web"
          Elissa M. Redmiles, Noel Warford, Amritha Jayanti, Aravind Koneru, Rock Stevens, Michelle L. Mazurek, ... -- Usenix 2020
        
        
          "Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix It"
          Daniel Votipka, Kelsey R. Fulton, James Parker, Matthew Hou, Michelle L. Mazurek, Michael Hicks, ... -- Usenix 2020
        
        
          "What Twitter Knows: Characterizing Ad Targeting Practices, User Perceptions, and Ad Explanations Through Users' Own Twitter Data"
          Nathan Reitinger, Justin Goodman, Michelle L. Mazurek, ... -- Usenix 2020
        
        
          "Achieving Keyless CDNs with Conclaves"
          Stephen Herwig, Dave Levin, ... -- Usenix 2020
        
        
          "An Observational Investigation of Reverse Engineers’ Processes"
          Daniel Votipka, Seth Rabin, Michelle L. Mazurek, ... -- Usenix 2020
        
        
          "MIRAGE: Succinct Arguments for Randomized Algorithms with Applications to Universal zk-SNARKs"
          Charalampos Papamanthou, ... -- Usenix 2020
        
        
          "SEAL: Attack Mitigation for Encrypted Databases via Adjustable Leakage"
          Ioannis Demertzis, Charalampos Papamanthou, ... -- Usenix 2020
        
        
          "EarArray: Defending against DolphinAttack via Acoustic Attenuation"
          Gang Qu, ... -- NDSS 2021
        
        
          "HackEd: A Pedagogical Analysis of Online Vulnerability Discovery Exercises"
          Eric Zhang, Michelle L. Mazurek, ... -- Oakland 2021
        
        
          "Response-Hiding Encrypted Ranges: Revisiting Security via Parametrized Leakage-Abuse Attacks"
          Charalampos Papamanthou, ... -- Oakland 2021
        
        
          "Wolverine: Fast, Scalable, and Communication-Efficient Zero-Knowledge Proofs for Boolean and Arithmetic Circuits"
          Jonathan Katz, ... -- Oakland 2021
        
        
          "Fuzzy Message Detection"
          Ian Miers, ... -- CCS 2021
        
        
          "Labeled PSI from Homomorphic Encryption with Reduced Computation and Communication"
          Michael Rosenberg, ... -- CCS 2021
        
        
          "EasyPQC: Verifying Post-Quantum Cryptography"
          Xiong Fan, Shih-Han Hung, Jonathan Katz, Xiaodi Wu, ... -- CCS 2021
        
        
          "Compressed Oblivious Encoding for Homomorphically Encrypted Search"
          Dana Dachman-Soled, ... -- CCS 2021
        
        
          "Constant-Overhead Zero-Knowledge for RAM Programs"
          Jonathan Katz, ... -- CCS 2021
        
        
          "The Exact Security of BIP32 Wallets"
          Julian Loss, ... -- CCS 2021
        
        
          "'Passwords Keep Me Safe' – Understanding What Children Think about Passwords"
          Olivia Murphy, ... -- Usenix 2021
        
        
          ""It's stressful having all these phones": Investigating Sex Workers' Safety Goals, Risks, and Practices Online"
          Michelle L. Mazurek, ... -- Usenix 2021
        
        
          "Evaluating In-Workflow Messages for Improving Mental Models of End-to-End Encryption"
          Omer Akgul, Wei Bai, Shruti Das, Michelle L. Mazurek, ... -- Usenix 2021
        
        
          "Mystique: Efficient Conversions for Zero-Knowledge Proofs with Applications to Machine Learning"
          Jonathan Katz, ... -- Usenix 2021
        
        
          "Database Reconstruction from Noisy Volumes: A Cache Side-Channel Attack on SQLite"
          Aria Shahverdi, Dana Dachman-Soled, ... -- Usenix 2021
        
        
          "Strategies and Perceived Risks of Sending Sensitive Documents"
          Noel Warford, Ashna Mediratta, Michelle L. Mazurek, ... -- Usenix 2021
        
        
          "Weaponizing Middleboxes for TCP Reflected Amplification"
          Kevin Bock, Yair Fax, Kyle Hurley, Dave Levin, ... -- Usenix 2021
        
        
          "When Malware Changed Its Mind: An Empirical Study of Variable Program Behaviors in the Real World"
          Erin Avllazagaj, Tudor Dumitras, ... -- Usenix 2021
        
        
          "Fooling the Eyes of Autonomous Vehicles: Robust Physical Adversarial Examples Against Traffic Sign Recognition Systems"
          Gang Qu, ... -- NDSS 2022
        
        
          "Above and Beyond: Organizational Efforts to Complement U.S. Digital Security Compliance Mandates"
          Rock Stevens, Michelle L. Mazurek, ... -- NDSS 2022
        
        
          "Investigating Influencer VPN Ads on YouTube"
          Omer Akgul, Richard Roberts, Dave Levin, Michelle L. Mazurek, ... -- Oakland 2022
        
        
          "SNARKBlock: Federated Anonymous Blocklisting from Hidden Common Input Aggregate Proofs"
          Michael Rosenberg, Ian Miers, ... -- Oakland 2022
        
        
          "SoK: A Framework for Unifying At-Risk User Research"
          Noel Warford, Kaitlyn Yang, Omer Akgul, Nathan Malkin, Michelle L. Mazurek, ... -- Oakland 2022
        
        
          "Batching, Aggregation, and Zero-Knowledge Proofs in Bilinear Accumulators"
          Shravan Srinivasan, ... -- CCS 2022
        
        
          "Foundations of Coin Mixing Services"
          Noemi Glaeser, ... -- CCS 2022
        
        
          "Hammurabi: A Framework for Pluggable, Logic-Based X.509 Certificate Validation Policies"
          Michael Lum, Yaelle Goldschlag, Leah Kannan, Kasra Torshizi, Yujie Wang, Dave Levin, ... -- CCS 2022
        
        
          "Thora: Atomic and Privacy-Preserving Multi-Channel Updates"
          Kasra Abbaszadeh, ... -- CCS 2022
        
        
          "Understanding the How and the Why: Exploring Secure Development Practices through a Course Competition"
          Kelsey R. Fulton, Desiree Abrokwa, Michelle L. Mazurek, Michael Hicks, ... -- CCS 2022
        
        
          "When Frodo Flips: End-to-End Key Recovery on FrodoKEM via Rowhammer"
          Hunter Kippen, Dana Dachman-Soled, ... -- CCS 2022
        
        
          "Orca: Blocklisting in Sender-Anonymous Messaging"
          Ian Miers, ... -- Usenix 2022
        
        
          "Expected Exploitability: Predicting the Development of Functional Vulnerability Exploits"
          Octavian Suciu, Tudor Dumitras, ... -- Usenix 2022
        
        
          "Hyperproofs: Aggregating and Maintaining Proofs in Vector Commitments"
          Shravan Srinivasan, ... -- Usenix 2022
        
        
          "Why Users (Don't) Use Password Managers at a Large Educational Institution"
          Michelle L. Mazurek, ... -- Usenix 2022
        
        
          "FIXREVERTER: A Realistic Bug Injection Methodology for Benchmarking Fuzz Testing"
          Michael Hicks, ... -- Usenix 2022
        
        
          "GET /out: Automated Discovery of Application-Layer Censorship Evasion Strategies"
          Michael Harrity, Kevin Bock, Frederick Sell, Dave Levin, ... -- Usenix 2022