Available papers
Information Security
Responsible: Sasa Radomirovic
- Constraint Solving for Bounded-Process Cryptographic Protocol Analysis
Jonathan Millen and Vitaly Shmatikov
ACM CCS 2001 - An Efficient Cryptographic Protocol Verifier Based on Prolog Rules
Bruno Blanchet
CSFW 2001 - Modeling and Analyzing Security in the Presence of Compromising Adversaries
David Basin and Cas Cremers
ESORICS 2010 - A Hierarchy of Authentication Specifications
Gavin Lowe
CSFW 1997 - Secret-Ballot Receipts: True Voter-Verifiable Elections
David Chaum
IEEE Security & Privacy, 2004 - A Practical Voter-Verifiable Election Scheme
David Chaum, Peter Y. A. Ryan, and Steve A. Schneider
ESORICS 2005 - De-anonymizing Social Networks
Arvind Narayanan, Vitaly Shmatikov
IEEE S&P 2009 - The Mastermind Attack on Genomic Data
Michael T. Goodrich
IEEE S&P 2009
System Security
Responsible: Claudio Soriente
- SoK: Secure Data Deletion,
Joel Reardon, David Basin, and Srdjan Capkun,
IEEE S&P 2013 - An Ideal-Security Protocol for Order-Preserving Encoding,
Raluca Ada Popa, Frank Li, Nickolai Zeldovich
IEEE S&P 2013 - SoK: SSL and HTTPS: Revisiting Past Challenges and Evaluating Certificate Trust Model Enhancements,
Jeremy Clark, Paul C. van Oorschot,
IEEE S&P 2013 - Strengthening User Authentication through Opportunistic Cryptographic Identity Assertions,
Alexei Czeskis, Michael Dietz, Tadayoshi Kohno, Dan Wallach, Dirk Balfanz,
ACM CCS 2012 - kGuard: Lightweight Kernel Protection against Return-to-user Attacks,
Vasileios P. Kemerlis, Georgios Portokalidis, and Angelos D. Keromytis,
USENIX Security Symposium 2012. - Eliminating the hypervisor attack surface for a more secure cloud,
Jakub Szefer, Eric Keller, Ruby B. Lee, Jennifer Rexford,
ACM CCS 2011. - Software abstractions for trusted sensors,
He Liu, Stefan Saroiu, Alec Wolman, Himanshu Raj,
ACM MobiSys 2012.
Communication Systems
Responsible: Elias Raftopoulos
- Felt: Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness. ,
Devdatta Akhawe, Adrienne Porter
Usenix Security 2013
Responsible: Stephan Neuhaus () - Analysis of a "/0" Stealth Scan from a Botnet.,
Alberto Dainotti, Alistair King, and Kimberly C. Claffyand Ferdinando Papale and Antonio Pescapè
2013 ACM SIGCOMM Internet Measurement Conference
Responsible: Elias Raftopoulos () - Side -Channel Leaks in Web Applications: a Reality Today, a Challenge Tomorrow.,
Chen, Shuo and Wang, Rui and Wang, XiaoFeng and Zhang, Kehuan
2010 IEEE Symposium on Security and Privacy
Responsible: David Gugelmann () - Drifting Keys: Impersonation Detection for Constrained Devices.,
Kevin Bowers, Ari Juels, Ronald Rivest, Emily Shen
Infocom 2013
Responsible: Ben-Porat, Udi () - The Collateral Damage of Internet Censorship by DNS Injection. ,
Anonymous Authors
2012 ACM SIGCOMM CCR
Responsible: Brian Trammell () - Finding Your Friends and Following Them to Where You Are Adam. ,
Adam Sadilek, Henry Kautz, Jeffrey P. Bigham
ACM Web search and data mining - WSDM 2012
Responsible: Bernhard Distl ()