"CDiff: a new reduction technique for constraint-based analysis of security protocols"
David Basin, Sebastian Modersheim, Luca Vigano, ... -- CCS 2003
"An Information-Theoretic Model for Adaptive Side-Channel Attacks"
Boris Koepf, David Basin, ... -- CCS 2007
"Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping"
Srdjan Capkun, Mario Strasser, Christina Popper, ... -- Oakland 2008
"Location Privacy of Distance Bounding Protocols"
Kasper Bonne Rasmussen, Srdjan Capkun, ... -- CCS 2008
"Unbounded Verification, Falsification, and Characterization of Security Protocols by Pattern Refinement"
Cas Cremers, ... -- CCS 2008
"A Class of Probabilistic Models for Role Engineering"
Mario Frank, David Basin, Joachim M. Buhmann, ... -- CCS 2008
"A probabilistic approach to hybrid role mining"
Mario Frank, Andreas P. Streich, David Basin, Joachim M. Buhmann, ... -- CCS 2009
"Proximity-based access control for implantable medical devices"
Kasper Bonne Rasmussen, Thomas Heydt-Benjamin, Srdjan Capkun, ... -- CCS 2009
"Physical-layer Identification of RFID Devices"
Srdjan Capkun, Boris Danev, ... -- Usenix 2009
"Jamming-resistant Broadcast Communication without Shared Keys"
Srdjan Capkun, Mario Strasser, Christina Popper, ... -- Usenix 2009
"Developing security protocols by refinement"
Christoph Sprenger, David Basin, ... -- CCS 2010
"On the soundness of authenticate-then-encrypt: formalizing the malleability of symmetric encryption"
Ueli Maurer, Bjorn Tackmann, ... -- CCS 2010
"SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics"
Martin Burkhart, Mario Strasser, Dilip Many, Xenofontas Dimitropoulos, ... -- Usenix 2010
"Realization of RF Distance Bounding"
Kasper Bonne Rasmussen, Srdjan Capkun, ... -- Usenix 2010
"Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars"
Aurelien Francillon, Boris Danev, Srdjan Capkun, ... -- NDSS 2011
"On the Requirements for Successful GPS Spoofing Attacks"
Nils Ole Tippenhauer, Christina Popper, Srdjan Capkun, ... -- CCS 2011
"Safe Loading - A Foundation for Secure Execution of Untrusted Programs"
Mathias Payer, Tobias Hartmann, Thomas R. Gross, ... -- Oakland 2012
"Distance Hijacking Attacks on Distance Bounding Protocols"
Cas Cremers, Benedikt Schmidt, Srdjan Capkun, ... -- Oakland 2012
"Double-Spending Fast Payments in Bitcoin"
Elli Androulaki, Srdjan Capkun, ... -- CCS 2012
"Data Node Encrypted File System: Efficient Secure Deletion for Flash Memory"
Joel Reardon, Srdjan Capkun, David Basin, ... -- Usenix 2012
"Tailing RFID Tags for Clone Detection"
Davide Zanetti, Srdjan Capkun, ... -- NDSS 2013
"On Limitations of Friendly Jamming for Confidentiality"
Nils Ole Tippenhauer, Luka Malisa, Aanjhan Ranganathan, Srdjan Capkun, ... -- Oakland 2013
"SoK: Secure Data Deletion"
Joel Reardon, David Basin, Srdjan Capkun, ... -- Oakland 2013
"OASIS: On Achieving a Sanctuary for Integrity and Secrecy on Untrusted Platforms"
Adrian Perrig, ... -- CCS 2013
"Secure Data Deletion from Persistent Media"
Joel Reardon, Hubert Ritzdorf, David Basin, Srdjan Capkun, ... -- CCS 2013
"Smartphones as Practical and Secure Location Verification Tokens for Payments"
Claudio Marforio, Nikolaos Karapanos, Claudio Soriente, Kari Kostiainen, Srdjan Capkun, ... -- NDSS 2014
"Automated Verification of Group Key Agreement Protocols"
Ralf Sasse, David Basin, ... -- Oakland 2014
"Fail-Secure Access Control"
Petar Tsankov, Srdjan Marinovic, Mohammad Torabi Dashti, David Basin, ... -- CCS 2014
"Mechanized Network Origin and Path Authenticity Proofs"
Cristina Basescu, Adrian Perrig, ... -- CCS 2014
"PoliCert: Secure and Flexible TLS Certificate Management"
Pawel Szalachowski, Stephanos Matsumoto, Adrian Perrig, ... -- CCS 2014
"ARPKI: Attack Resilient Public-key Infrastructure"
David Basin, Adrian Perrig, Ralf Sasse, Pawel Szalachowski, ... -- CCS 2014
"Quantifying Web-Search Privacy"
Arthur Gervais, Reza Shokri, Adish Singla, Srdjan Capkun, ... -- CCS 2014
"On the Effective Prevention of TLS Man-in-the-Middle Attacks in Web Applications"
Nikolaos Karapanos, Srdjan Capkun, ... -- Usenix 2014
"Predicting Users' Motivations behind Location Check-Ins and Utility Implications of Privacy Protection Mechanisms"
Reza Shokri, ... -- NDSS 2015
"ADSNARK: Nearly Practical and Privacy-Preserving Proofs on Authenticated Data"
Raphael M. Reischuk, ... -- Oakland 2015
"Secure Sampling of Public Parameters for Succinct Zero Knowledge Proofs"
Alessandro Chiesa, ... -- Oakland 2015
"HORNET: High-speed Onion Routing at the Network Layer"
Chen Chen, Daniele Enrico Asoni, David Barrera, Adrian Perrig, ... -- CCS 2015
"Tampering with the Delivery of Blocks and Transactions in Bitcoin"
Arthur Gervais, Hubert Ritzdorf, Srdjan Capkun, ... -- CCS 2015
"Automated Symbolic Proofs of Observational Equivalence"
David Basin, Jannik Dreier, Ralf Sasse, ... -- CCS 2015
"Control-Flow Bending: On the Effectiveness of Control-Flow Integrity"
Antonio Barresi, Thomas R. Gross, ... -- Usenix 2015
"RAPTOR: Routing Attacks on Privacy in Tor"
Laurent Vanbever, ... -- Usenix 2015
"Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound"
Nikolaos Karapanos, Claudio Marforio, Claudio Soriente, Srdjan Capkun, ... -- Usenix 2015
"Thermal Covert Channels on Multi-core Platforms"
Ramya Jayaram Masti, Devendra Rai, Aanjhan Ranganathan, Christian Muller, Lothar Thiele, Srdjan Capkun, ... -- Usenix 2015
"SIBRA: Scalable Internet Bandwidth Reservation Architecture"
Cristina Basescu, Raphael M. Reischuk, Pawel Szalachowski, Adrian Perrig, ... -- NDSS 2016
"High-Speed Inter-domain Fault Localization"
Cristina Basescu, Adrian Perrig, ... -- Oakland 2016
"Verena: End-to-End Integrity Protection for Web Applications"
Nikolaos Karapanos, Alexandros Filios, Raluca Ada Popa, Srdjan Capkun, ... -- Oakland 2016
"On the Security and Performance of Proof of Work Blockchains"
Arthur Gervais, Karl Wust, Glykantzis Vasileios, Hubert Ritzdorf, Srdjan Capkun, ... -- CCS 2016
"Computational Soundness of Dalvik Bytecode"
Esfandiar Mohammadi, ... -- CCS 2016
"Statistical Deobfuscation of Android Applications"
Benjamin Bichsel, Veselin Raychev, Petar Tsankov, Martin Vechev, ... -- CCS 2016
"Hijacking Bitcoin: Routing Attacks on Cryptocurrencies"
Maria Apostolaki, Laurent Vanbever, ... -- Oakland 2017
"IKP: Turning a PKI Around with Decentralized Automated Incentives"
Stephanos Matsumoto, Raphael M. Reischuk, ... -- Oakland 2017
"One TPM to Bind Them All: Fixing TPM2.0 for Provably Secure Anonymous Attestation"
Manu Drijvers, ... -- Oakland 2017
"Practical UC-Secure Delegatable Credentials with Attributes and Their Application to Blockchain"
Manu Drijvers, ... -- CCS 2017
"Revive: Rebalancing Off-Blockchain Payment Networks"
Ramy Khalil, Arthur Gervais, ... -- CCS 2017
"Synthesis of Permissive Privacy Enforcement"
Martin Kucera, Petar Tsankov, Timon Gehr, Marco Guarnieri, Martin Vechev, ... -- CCS 2017
"walk2friends: Inferring Social Links from Mobility Profiles"
Mathias Humbert, ... -- CCS 2017
"ROTE: Rollback Protection for Trusted Execution"
Sinisa Matetic, Mansoor Ahmed, Kari Kostiainen, Aritra Dhar, David Sommer, Arthur Gervais, Srdjan Capkun, ... -- Usenix 2017
"TLS-N: Non-repudiation over TLS Enablign Ubiquitous Content Signing."
Hubert Ritzdorf, Karl Wust, Guillaume Felley, Srdjan Capkun, ... -- NDSS 2018
"AI2: Safety and Robustness Certification of Neural Networks with Abstract Interpretation"
Timon Gehr, Matthew Mirman, Dana Drachsler Cohen, Petar Tsankov, Martin Vechev, ... -- Oakland 2018
"Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency --- Choose Two"
Esfandiar Mohammadi, ... -- Oakland 2018
"Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks"
Daniel Moser, ... -- Oakland 2018
"Tight on Budget? Tight Bounds for r-Fold Approximate Differential Privacy"
Esfandiar Mohammadi, ... -- CCS 2018
"SECURIFY: Practical Security Analysis of Smart Contracts"
Petar Tsankov, Andrei Marian Dan, Dana Drachsler Cohen, Florian Buenzli, Martin Vechev, ... -- CCS 2018
"Secure Opportunistic Multipath Key Exchange"
Sergiu Costea, ... -- CCS 2018
"An End-to-End System for Large Scale P2P MPC-as-a-Service and Low-Bandwidth MPC for Weak Participants"
Martin Hirt, ... -- CCS 2018
"Formal Analysis of 5G Authentication"
David Basin, Lucca Hirschi, Ralf Sasse, Vincent Stettler, ... -- CCS 2018
"Ouroboros Genesis: Composable Proof-of-Stake Blockchains with Dynamic Availability"
Christian Badertscher, ... -- CCS 2018
"Lattice-Based Group Signatures and Zero-Knowledge Proofs of Automorphism Stability"
Gregor Seiler, ... -- CCS 2018
"DP-Finder: Finding Differential Privacy Violations by Sampling and Optimization"
Benjamin Bichsel, Timon Gehr, Dana Drachsler Cohen, Petar Tsankov, Martin Vechev, ... -- CCS 2018
"Debin: Predicting Debug Information in Stripped Binaries"
Jingxuan He, Pesho Ivanov, Petar Tsankov, Veselin Raychev, Martin Vechev, ... -- CCS 2018
"NetHide: Secure and Practical Network Topology Obfuscation"
Roland Meier, Petar Tsankov, Laurent Vanbever, Martin Vechev, ... -- Usenix 2018
"Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts"
Lorenz Breidenbach, ... -- Usenix 2018
"DelegaTEE: Brokered Delegation Using Trusted Execution Environments"
Sinisa Matetic, Moritz Schneider, Srdjan Capkun, ... -- Usenix 2018
"UWB with Pulse Reordering: Securing Ranging against Relay and Physical-Layer Attacks"
Mridula Singh, Patrick Leu, Srdjan Capkun, ... -- NDSS 2019
"SABRE: Protecting Bitcoin against Routing Attacks"
Maria Apostolaki, Gian Marti, Jan Muller, Laurent Vanbever, ... -- NDSS 2019
"KHyperLogLog: Estimating Reidentifiability and Joinability of Large Data at Scale"
Damien Desfontaines, ... -- Oakland 2019
"On the Security of Two-Round Multi-Signatures"
Manu Drijvers, ... -- Oakland 2019
"Learning to Fuzz from Symbolic Execution with Application to Smart Contracts"
Jingxuan He, Mislav Balunovic, Nodar Ambroladze, Petar Tsankov, Martin Vechev, ... -- CCS 2019
"Seems Legit: Automated Analysis of Subtle Attacks on Protocols that use Signatures"
Ralf Sasse, ... -- CCS 2019
"Tesseract: Real-Time Cryptocurrency Exchange Using Trusted Hardware"
Lorenz Breindenbach, ... -- CCS 2019
"The Next 700 Policy Miners: A Universal Method for Building Policy Miners"
Carlos Cotrini, Luca Corinzia, Thilo Weghorn, David Basin, ... -- CCS 2019
"User Account Access Graphs"
Sven Hammann, Ralf Sasse, David Basin, ... -- CCS 2019
"zkay: Specifying and Enforcing Data Privacy in Smart Contracts"
Samuel Steffen, Benjamin Bichsel, Mario Gersbach, Noa Melchior, Petar Tsankov, Martin Vechev, ... -- CCS 2019
"UWB-ED: Distance Enlargement Attack Detection in Ultra-Wideband"
Mridula Singh, Patrick Leu, AbdelRahman Abdou, Srdjan Capkun, ... -- Usenix 2019
"BITE: Bitcoin Lightweight Client Privacy using Trusted Execution"
Sinisa Matetic, Karl Wuest, Moritz Schneider, Kari Kostiainen, Srdjan Capkun, ... -- Usenix 2019
"ProtectIOn: Root-of-Trust for IO in Compromised Platforms"
Aritra Dhar, Enis Ulqinaku, Kari Kostiainen, Srdjan Capkun, ... -- NDSS 2020
"Snappy: Fast On-chain Payments with Practical Collaterals"
Karl Wust, Aritra Dhar, Kari Kostiainen, Srdjan Capkun, ... -- NDSS 2020
"SVLAN: Secure & Scalable Network Virtualization"
Jonghoon Kwon, Taeho Lee, Claude Hahni, Adrian Perrig, ... -- NDSS 2020
"Are We Susceptible to Rowhammer? An End-to-End Methodology for Cloud Providers"
Jeremie Kim, Minesh Patel, Onur Mutlu, ... -- Oakland 2020
"Flash Boys 2.0: Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability"
Lorenz Breidenbach, ... -- Oakland 2020
"Message Time of Arrival Codes: A Fundamental Primitive for Secure Distance Measurement"
Patrick Leu, Mridula Singh, Marc Roeschlin, Kenneth G. Paterson, Srdjan Capkun, ... -- Oakland 2020
"NetCAT: Practical Cache Attacks for the Network"
Michael Kurth, ... -- Oakland 2020
"TRRespass: Exploiting the Many Sides of Target Row Refresh"
Hasan Hassan, Onur Mutlu, ... -- Oakland 2020
"VerX: Safety Verification of Smart Contracts"
Dimitar Dimitrov, Dana Drachsler Cohen, Martin Vechev, ... -- Oakland 2020
"ACE: Asynchronous and Concurrent Execution of Complex Smart Contracts"
Karl Wust, Sinisa Matetic, Silvan Egli, Kari Kostiainen, Srdjan Capkun, ... -- CCS 2020
"A Performant, Misuse-Resistant API for Primality Testing"
Kenny Paterson, ... -- CCS 2020
"Speculative Probing: Hacking Blind in the Spectre Era"
Kaveh Razavi, ... -- CCS 2020
"EPIC: Every Packet Is Checked in the Data Plane of a Path-Aware Internet"
Markus Legner, Tobias Klenze, Marc Wyss, Christoph Sprenger, Adrian Perrig, ... -- Usenix 2020
"A Spectral Analysis of Noise: A Comprehensive, Automated, Formal Analysis of Diffie-Hellman Protocols"
Ralf Sasse, David Basin, ... -- Usenix 2020
"Droplet: Decentralized Authorization and Access Control for Encrypted Data Streams"
Hossein Shafagh, Lukas Burkhalter, Anwar Hithnawi, ... -- Usenix 2020
"Remote Side-Channel Attacks on Anonymous Transactions"
Kenny Paterson, ... -- Usenix 2020
"Forward and Backward Private Conjunctive Searchable Symmetric Encryption"
Sikhar Patranabis, ... -- NDSS 2021
"Bitcontracts: Supporting Smart Contracts in Legacy Blockchains"
Karl Wust, Loris Diana, and Kari Kostiainen, Sinisa Matetic, Srdjan Capkun, ... -- NDSS 2021
"Mondrian: Comprehensive Inter-domain Network Zoning Architecture"
Jonghoon Kwon, Hahni Claude, Adrian Perrig, ... -- NDSS 2021
"A Security Model and Fully Verified Implementation for the IETF QUIC Record Layer"
Joseph Lallemand, ... -- Oakland 2021
"Bitcoin-Compatible Virtual Channels"
Kristina Hostakova, ... -- Oakland 2021
"CrossTalk: Speculative Data Leaks Across Cores Are Real"
Kaveh Razavi, ... -- Oakland 2021
"DP-Sniper: Black-Box Discovery of Differential Privacy Violations using Classifiers"
Benjamin Bichsel, Samuel Steffen, Ilija Bogunovic, Martin Vechev, ... -- Oakland 2021
"SoK: Fully Homomorphic Encryption Compilers"
Alexander Viand, Patrick Jattke, Anwar Hithnawi, ... -- Oakland 2021
"The EMV Standard: Break, Fix, Verify"
David Basin, Ralf Sasse, Jorge Toro-Pozo, ... -- Oakland 2021
"The Provable Security of Ed25519: Theory and Practice"
Dennis Jackson, ... -- Oakland 2021
"Verifying Table-Based Elections"
David Basin, Sofia Giampietro, ... -- CCS 2021
"DataLens: Scalable Privacy Preserving Training via Gradient Compression and Aggregation"
Luka Rimanic, Ce Zhang, ... -- CCS 2021
"TSS: Transformation-Specific Smoothing for Robustness Certification"
Maurice Weber, Luka Rimanic, Ce Zhang, ... -- CCS 2021
"Learning to Explore Paths for Symbolic Execution"
Jingxuan He, Gishor Sivanrupan, Petar Tsankov, Martin Vechev, ... -- CCS 2021
"The Security of ChaCha20-Poly1305 in the Multi-User Setting"
Felix Gunther, Kenny Paterson, ... -- CCS 2021
"Faster Lattice-Based KEMs via a Generic Fujisaki-Okamoto Transform Using Prefix Hashing"
Gregor Seiler, ... -- CCS 2021
"SmashEx: Smashing SGX Enclaves Using Exceptions"
Shweta Shinde, ... -- CCS 2021
"Card Brand Mixup Attack: Bypassing the PIN in non-Visa Cards by Using Them for Visa Transactions"
David Basin, Ralf Sasse, Jorge Toro-Pozo, ... -- Usenix 2021
"Frontal Attack: Leaking Control-Flow in SGX via the CPU Frontend"
Ivan Puddu, Moritz Schneider, Miro Haller, Srdjan Capkun, ... -- Usenix 2021
"SMASH: Synchronized Many-sided Rowhammer Attacks from JavaScript"
Finn de Ridder, Kaveh Razavi, ... -- Usenix 2021
"Is Real-time Phishing Eliminated with FIDO? Social Engineering Downgrade Attacks against FIDO Protocols"
Enis Ulqinaku, Srdjan Capkun, ... -- Usenix 2021
"ReDMArk: Bypassing RDMA Security Mechanisms"
Benjamin Rothenberger, Konstantin Taranov, Adrian Perrig, Torsten Hoefler, ... -- Usenix 2021
"Evaluating Susceptibility of VPN Implementations to DoS Attacks Using Adversarial Testing"
Fabio Streun, Joel Wanner, Adrian Perrig, ... -- NDSS 2022
"ditto: WAN Traffic Obfuscation at Line Rate"
Roland Meier, Laurent Vanbever, ... -- NDSS 2022
"V-Range: Enabling Secure Ranging in 5G Wireless Networks"
Marc Roeschlin, Srdjan Capkun, ... -- NDSS 2022
"KASPER: Scanning for Generalized Transient Execution Gadgets in the Linux"
Kaveh Razavi, ... -- NDSS 2022
"F-PKI: Enabling Innovation and Trust Flexibility in the HTTPS Public-Key Infrastructure"
Laurent Chuat, Cyrill Krahenbuhl, Adrian Perrig, ... -- NDSS 2022
"Are We There Yet? Timing and Floating-Point Attacks on Differential Privacy Systems"
Eleanor McMurtry, ... -- Oakland 2022
"Blacksmith: Compromising Target Row Refresh by Rowhammering in the Frequency Domain"
Patrick Jattke, Stijn Gunter, Kaveh Razavi, ... -- Oakland 2022
"Four Attacks and a Proof for Telegram"
Kenneth G. Paterson, Igors Stepanovs, ... -- Oakland 2022
"LinkTeller: Recovering Private Edges from Graph Neural Networks via Influence Analysis"
Ce Zhang, ... -- Oakland 2022
"PROTRR: Principled yet Optimal In-DRAM Target Row Refresh"
Michele Marazzi, Patrick Jattke, Flavien Solt, Kaveh Razavi, ... -- Oakland 2022
"Phishing in Organizations: Findings from a Large-Scale and Long-Term Study"
Daniele Lain, Kari Kostiainen, Srdjan Capkun, ... -- Oakland 2022
"ZeeStar: Private Smart Contracts by Homomorphic Encryption and Zero-knowledge Proofs"
Samuel Steffen, Benjamin Bichsel, Roger Baumgartner, Martin Vechev, ... -- Oakland 2022
"Adversarial Correctness and Privacy for Probabilistic Data Structures"
Mia Filic, Kenneth G. Paterson, Anupama Unnikrishnan, ... -- CCS 2022
"NeVerMore: Exploiting RDMA Mistakes in NVMe-oF Storage Applications"
Konstantin Taranov, Benjamin Rothenberger, Daniele De Sensi, Adrian Perrig, Torsten Hoefler, ... -- CCS 2022
"Platypus: A Central Bank Digital Currency with Unlinkable Transactions and Privacy-Preserving Regulation"
Kari Kostiainen, Noah Delius, Srdjan Capkun, ... -- CCS 2022
"Private and Reliable Neural Network Inference"
Nikola Jovanovic, Marc Fischer, Samuel Steffen, Martin Vechev, ... -- CCS 2022
"Protecting Critical Inter-Domain Communication through Flyover Reservations"
Marc Wyss, Giacomo Giuliari, Jonas Mohler, Adrian Perrig, ... -- CCS 2022
"Truth Serum: Poisoning Machine Learning Models to Reveal Their Secrets"
Florian Tramer, ... -- CCS 2022
"Victory by KO: Attacking OpenPGP Using Key Overwriting"
Lara Bruseghini, Kenneth G. Paterson, ... -- CCS 2022
"Zapper: Smart Contracts with Data and Identity Privacy"
Samuel Steffen, Benjamin Bichsel, Martin Vechev, ... -- CCS 2022
"Elasticlave: An Efficient Memory Model for Enclaves"
Shweta Shinde, ... -- Usenix 2022
"Automating Cookie Consent and GDPR Violation Detection"
Dino Bollinger, Karel Kubicek, Carlos Cotrini, David Basin, ... -- Usenix 2022
"LTrack: Stealthy Tracking of Mobile Phones in LTE"
Martin Kotuliak, Simon Erni, Patrick Leu, Marc Roschlin, Srdjan Capkun, ... -- Usenix 2022
"Breaking Bridgefy, again: Adopting libsignal is not enough"
Raphael Eikenberg, Kenneth G. Paterson, ... -- Usenix 2022
"TLB;DR: Enhancing TLB-based Attacks with TLB Desynchronized Reverse Engineering"
Daniel Trujillo, ... -- Usenix 2022
"Ghost Peak: Practical Distance Reduction Attacks Against HRP UWB Ranging"
Patrick Leu, Giovanni Camurati, Marc Roeschlin, Claudio Anliker, Srdjan Capkun, ... -- Usenix 2022
"Creating a Secure Underlay for the Internet"
Joel Wanner, Jonghoon Kwon, Francois Wirz, Adrian Perrig, ... -- Usenix 2022
"CellIFT: Leveraging Cells for Scalable and Precise Dynamic Information Flow Tracking in RTL"
Flavien Solt, Kaveh Razavi, ... -- Usenix 2022
"RETBLEED: Arbitrary Speculative Code Execution with Return Instructions"
Johannes Wikner, Kaveh Razavi, ... -- Usenix 2022
"QCSD: A QUIC Client-Side Website-Fingerprinting Defence Framework"
Jean-Pierre Smith, Luca Dolfi, Adrian Perrig, ... -- Usenix 2022