"Expander Graphs for Digital Stream Authentication and Robust Overlay Networks"
          David Zuckerman, ... -- Oakland 2002
        
        
          "Obfuscated Databases and Group Privacy"
          Arvind Narayanan, Vitaly Shmatikov, ... -- CCS 2005
        
        
          "Fast Dictionary Attacks on Human-Memorable Passwords Using Time-Space Tradeoff"
          Arvind Narayanan, Vitaly Shmatikov, ... -- CCS 2005
        
        
          "Privacy-Preserving Remote Diagnostics"
          Justin Brickell, Don Porter, Vitaly Shmatikov, Emmett Witchel, ... -- CCS 2007
        
        
          "Robust De-anonymization of Large Sparse Datasets"
          Arvind Narayanan, Vitaly Shmatikov, ... -- Oakland 2008
        
        
          "Towards Practical Privacy for Genomic Computation"
          Vitaly Shmatikov, ... -- Oakland 2008
        
        
          "Efficient and Extensible Security Enforcement Using Dynamic Data Flow Analysis"
          Walter Chang, Brandon Streiff, Calvin Li, ... -- CCS 2008
        
        
          "De-anonymizing Social Networks"
          Arvind Narayanan, Vitaly Shmatikov, ... -- Oakland 2009
        
        
          "Efficient pseudorandom functions from the decisional linear assumption and weaker variants"
          Allison B. Lewko, Brent Waters, ... -- CCS 2009
        
        
          "Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs"
          Owen S. Hofmann, Christopher J. Rossbach, Brent Waters, Emmett Witchel, ... -- NDSS 2010
        
        
          "Revocation Systems with Very Small Private Keys"
          Allison B. Lewko, Brent Waters, ... -- Oakland 2010
        
        
          "Building efficient fully collusion-resilient traitor tracing and revocation schemes"
          Brent Waters, ... -- CCS 2010
        
        
          "Practical leakage-resilient identity-based encryption from simple assumptions"
          Yannis Rouselakis, Brent Waters, ... -- CCS 2010
        
        
          "'You Might Also Like:' Privacy Risks of Collaborative Filtering"
          Ann Kilzer, Vitaly Shmatikov, ... -- Oakland 2011
        
        
          "TxBox: Building Secure, Efficient Sandboxes with System Transactions"
          Suman Jana, Vitaly Shmatikov, ... -- Oakland 2011
        
        
          "Privacy and Accountability for Location-based Aggregate Statistics"
          Andrew J. Blumberg, ... -- CCS 2011
        
        
          "Cloaking Malware with the Trusted Platform Module"
          Alan M. Dunn, Owen S. Hofmann, Brent Waters, Emmett Witchel, ... -- Usenix 2011
        
        
          "Outsourcing the Decryption of ABE Ciphertexts"
          Brent Waters, ... -- Usenix 2011
        
        
          "Making argument systems for outsourced computation practical (sometimes)"
          Srinath Setty, Richard McPherson, Andrew J. Blumberg, Michael Walfish, ... -- NDSS 2012
        
        
          "Abusing File Processing in Malware Detectors for Fun and Profit"
          Suman Jana, Vitaly Shmatikov, ... -- Oakland 2012
        
        
          "Memento: Learning Secrets from Process Footprints"
          Suman Jana, Vitaly Shmatikov, ... -- Oakland 2012
        
        
          "The Most Dangerous Code in the World: Validating SSL Certificates in Non-Browser Software"
          Martin Georgiev, Suman Jana, Vitaly Shmatikov, ... -- CCS 2012
        
        
          "Taking Proof-Based Verified Computation a Few Steps Closer to Practicality"
          Srinath Setty, Victor Vu, Nikhil Panpalia, Benjamin Braun, Andrew J. Blumberg, Michael Walfish, ... -- Usenix 2012
        
        
          "The Postman Always Rings Twice: Attacking and Defending postMessage in HTML5 Websites"
          Sooel Son, Vitaly Shmatikov, ... -- NDSS 2013
        
        
          "I want my voice to be heard: IP over Voice-over-IP for Unobservable Censorship Circumvention"
          Amir Houmansadr, ... -- NDSS 2013
        
        
          "Fix Me Up: Repairing Access-Control Bugs in Web Applications"
          Sooel Son, Kathryn S. McKinley, Vitaly Shmatikov, ... -- NDSS 2013
        
        
          "The Parrot is Dead: Observing Unobservable Network Communications"
          Amir Houmansadr, Chad Brubaker, Vitaly Shmatikov, ... -- Oakland 2013
        
        
          "A Hybrid Architecture for Interactive Verifiable Computation"
          Victor Vu, Srinath Setty, Andrew J. Blumberg, Michael Walfish, ... -- Oakland 2013
        
        
          "Anon-Pass: Practical Anonymous Subscriptions"
          Michael Z. Lee, Alan M. Dunn, Brent Waters, Emmett Witchel, ... -- Oakland 2013
        
        
          "A Scanner Darkly: Protecting User Privacy From Perceptual Applications"
          Suman Jana, Vitaly Shmatikov, ... -- Oakland 2013
        
        
          "SoK: The Evolution of Sybil Defense via Social Networks"
          Lorenzo Alvisi, ... -- Oakland 2013
        
        
          "Practical Constructions and New Proof Methods for Large Universe Attribute-Based Encryption"
          Yannis Rouselakis, Brent Waters, ... -- CCS 2013
        
        
          "Catching Click-Spam in Search Ad Networks"
          Yin Zhang, ... -- CCS 2013
        
        
          "PHANTOM: Practical Oblivious Computation in a Secure Processor"
          Mohit Tiwari, ... -- CCS 2013
        
        
          "Diglossia: Detecting Code Injection Attacks With Precision and Efficiency"
          Sooel Son, Kathryn S. McKinley, Vitaly Shmatikov, ... -- CCS 2013
        
        
          "Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers"
          Suman Jana, Alan M. Dunn, ... -- Usenix 2013
        
        
          "No Direction Home: The True Cost of Routing Around Decoys"
          Amir Houmansadr, Vitaly Shmatikov, ... -- NDSS 2014
        
        
          "Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks"
          Martin Georgiev, Suman Jana, Vitaly Shmatikov, ... -- NDSS 2014
        
        
          "Using Frankencerts for Automated Adversarial Testing of Certificate Validation in SSL/TLS Implementations"
          Chad Brubaker, Suman Jana, Sarfraz Khurshid, Vitaly Shmatikov, ... -- Oakland 2014
        
        
          "Fully Secure and Fast Signing from Obfuscation"
          Kim Ramchen, Brent Waters, ... -- CCS 2014
        
        
          "Efficient RAM and control flow in verifiable outsourced computation"
          Srinath Setty, Zuocheng Ren, Andrew J. Blumberg, ... -- NDSS 2015
        
        
          "Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems"
          Yuanzhong Xu, ... -- Oakland 2015
        
        
          "Detecting and Exploiting Second Order Denial-of-Service Vulnerabilities in Web Applications"
          Oswaldo Olivo, Isil Dillig, Calvin Lin, ... -- CCS 2015
        
        
          "Privacy-Preserving Deep Learning"
          Reza Shokri, ... -- CCS 2015
        
        
          "Raccoon: Digital Side-Channel Freedom through Obfuscated Execution"
          Ashay Rane, Mohit Tiwari, Calvin Lin, ... -- Usenix 2015
        
        
          "Synthesizing Plausible Privacy-Preserving Location Traces"
          Reza Shokri, ... -- Oakland 2016
        
        
          "Breaking web applications built on top of encrypted data"
          Richard McPherson, ... -- CCS 2016
        
        
          "Defending against malicious peripherals with Cinch"
          Sebastian Angel, Andrew J. Blumberg, ... -- Usenix 2016
        
        
          "Secure, Precise, and Fast Floating-Point Operations on x86 Processors"
          Ashay Rane, Calvin Lin, Mohit Tiwari, ... -- Usenix 2016
        
        
          "Automated Synthesis of Semantic Malware Signatures using Maximum Satisfiability"
          Yu Feng, Ruben Martins, Isil Dillig, ... -- NDSS 2017
        
        
          "Full accounting for verifiable outsourcing"
          Andrew J. Blumberg, ... -- CCS 2017
        
        
          "Precise Detection of Side-Channel Vulnerabilities using Quantitative Cartesian Hoare Logic"
          Jia Chen, Yu Feng, Isil Dillig, ... -- CCS 2017
        
        
          "Vale: Verifying High-Performance Cryptographic Assembly Code"
          Ashay Rane, ... -- Usenix 2017
        
        
          "PIR with Compressed Queries and Amortized Query Processing"
          Sebastian Angel, ... -- Oakland 2018
        
        
          "Are These Pairing Elements Correct? Automated Verification and Applications"
          Satyanarayana Vusirikala, ... -- CCS 2019
        
        
          "DeMiCPU: Device Fingerprinting with Magnetic Signals Radiated by CPU"
          Yi-Chao Chen, ... -- CCS 2019
        
        
          "Not Everything is Dark and Gloomy: Power Grid Protections Against IoT Demand Attacks"
          Bing Huang, Ross Baldick, ... -- Usenix 2019
        
        
          "PPE Circuits: Formal Definition to Software Automation"
          Satyanarayana Vusirikala, Brent Waters, ... -- CCS 2020
        
        
          "Retrofitting Fine Grain Isolation in the Firefox Renderer"
          Hovav Shacham, ... -- Usenix 2020
        
        
          "SmartPulse: Automated Checking of Temporal Properties in Smart Contracts"
          Jon Stephens, Kostas Ferles, Benjamin Mariano, Isil Dillig, ... -- Oakland 2021
        
        
          "PPE Circuits for Rational Polynomials"
          Satyanarayana Vusirikala, ... -- CCS 2021
        
        
          "Swivel: Hardening WebAssembly against Spectre"
          Hovav Shacham, ... -- Usenix 2021
        
        
          "Spiral: Fast, High-Rate Single-Server PIR via FHE Composition"
          David J. Wu, ... -- Oakland 2022
        
        
          "Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86"
          Yingchen Wang, Hovav Shacham, ... -- Usenix 2022