Available papers

Information Security

Responsible: Sasa Radomirovic

  • Constraint Solving for Bounded-Process Cryptographic Protocol Analysis
    Jonathan Millen and Vitaly Shmatikov
    ACM CCS 2001
  • An Efficient Cryptographic Protocol Verifier Based on Prolog Rules
    Bruno Blanchet
    CSFW 2001
  • Modeling and Analyzing Security in the Presence of Compromising Adversaries
    David Basin and Cas Cremers
    ESORICS 2010
  • A Hierarchy of Authentication Specifications
    Gavin Lowe
    CSFW 1997
  • Secret-Ballot Receipts: True Voter-Verifiable Elections
    David Chaum
    IEEE Security & Privacy, 2004
  • A Practical Voter-Verifiable Election Scheme
    David Chaum, Peter Y. A. Ryan, and Steve A. Schneider
    ESORICS 2005
  • De-anonymizing Social Networks
    Arvind Narayanan, Vitaly Shmatikov
    IEEE S&P 2009
  • The Mastermind Attack on Genomic Data
    Michael T. Goodrich
    IEEE S&P 2009

System Security

Responsible: Claudio Soriente

  • SoK: Secure Data Deletion,
    Joel Reardon, David Basin, and Srdjan Capkun,
    IEEE S&P 2013
  • An Ideal-Security Protocol for Order-Preserving Encoding,
    Raluca Ada Popa, Frank Li, Nickolai Zeldovich
    IEEE S&P 2013
  • SoK: SSL and HTTPS: Revisiting Past Challenges and Evaluating Certificate Trust Model Enhancements,
    Jeremy Clark, Paul C. van Oorschot,
    IEEE S&P 2013
  • Strengthening User Authentication through Opportunistic Cryptographic Identity Assertions,
    Alexei Czeskis, Michael Dietz, Tadayoshi Kohno, Dan Wallach, Dirk Balfanz,
    ACM CCS 2012
  • kGuard: Lightweight Kernel Protection against Return-to-user Attacks,
    Vasileios P. Kemerlis, Georgios Portokalidis, and Angelos D. Keromytis,
    USENIX Security Symposium 2012.
  • Eliminating the hypervisor attack surface for a more secure cloud,
    Jakub Szefer, Eric Keller, Ruby B. Lee, Jennifer Rexford,
    ACM CCS 2011.
  • Software abstractions for trusted sensors,
    He Liu, Stefan Saroiu, Alec Wolman, Himanshu Raj,
    ACM MobiSys 2012.

Communication Systems

Responsible: Elias Raftopoulos

  • Felt: Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness. ,
    Devdatta Akhawe, Adrienne Porter
    Usenix Security 2013
    Responsible: Stephan Neuhaus ()
  • Analysis of a "/0" Stealth Scan from a Botnet.,
    Alberto Dainotti, Alistair King, and Kimberly C. Claffyand Ferdinando Papale and Antonio Pescapè
    2013 ACM SIGCOMM Internet Measurement Conference
    Responsible: Elias Raftopoulos ()
  • Side -Channel Leaks in Web Applications: a Reality Today, a Challenge Tomorrow.,
    Chen, Shuo and Wang, Rui and Wang, XiaoFeng and Zhang, Kehuan
    2010 IEEE Symposium on Security and Privacy
    Responsible: David Gugelmann ()
  • Drifting Keys: Impersonation Detection for Constrained Devices.,
    Kevin Bowers, Ari Juels, Ronald Rivest, Emily Shen
    Infocom 2013
    Responsible: Ben-Porat, Udi ()
  • The Collateral Damage of Internet Censorship by DNS Injection. ,
    Anonymous Authors
    2012 ACM SIGCOMM CCR
    Responsible: Brian Trammell ()
  • Finding Your Friends and Following Them to Where You Are Adam. ,
    Adam Sadilek, Henry Kautz, Jeffrey P. Bigham
    ACM Web search and data mining - WSDM 2012
    Responsible: Bernhard Distl ()
JavaScript has been disabled in your browser