publications
publications by categories in reversed chronological order. generated by jekyll-scholar.
2026
-
IEEE S&PFizzle: A Framework for Deterministic and Reproducible Network FuzzingIn Proceedings of the IEEE Symposium on Security and Privacy (S&P), May 2026
-
IEEE S&PAI Wrote My Paper and All I Got Was This False Negative: Measuring the Efficacy of Commercial AI Text DetectorsIn Proceedings of the IEEE Symposium on Security and Privacy (S&P), May 2026
2025
-
S&P MagExtending the Heilmeier Catechism to Evaluate Security and Privacy Systems: Who is Left Out?IEEE Security and Privacy, May 2025
-
ACSACEM-Flow: Advanced Electromagnetic Control Flow Verification for Embedded SystemsIn Proceedings of the Annual Computer Security Applications Conference (ACSAC), Dec 2025
-
USENIX SECSoK: Towards a Unified Approach to Applied Replicability for Computer SecurityIn Proceedings of the USENIX Security Symposium (Security), Aug 2025
-
USENIX SECAnalyzing the AI Nudification Application EcosystemIn Proceedings of the USENIX Security Symposium (Security), Aug 2025
-
ACM REP“Raise Your Hand If You’ve Been Personally Victimized By A Lack Of Reproducibility”: On Reproducibility in Tier 2 Security ConferencesIn Proceedings of ACM Conference on Reproducibility and Replicability (REP), Jul 2025
-
IEEE S&PData to Infinity and Beyond: Examining Data Sharing and Reuse Practices in the Computer Security CommunityIn Proceedings of the IEEE Symposium on Security and Privacy (S&P), May 2025
-
ISOC NDSSCharacterizing the Impact of Audio Deepfakes in the Presence of Cochlear Implant Simulated AudioIn Symposium on Network and Distributed System Security (NDSS), Feb 2025(Acceptance Rate 16.1%)
-
ISOC NDSSDetecting IMSI-Catchers by Characterizing Identity Exposing Messages in Cellular TrafficIn Symposium on Network and Distributed System Security (NDSS), Feb 2025(Acceptance Rate 16.1%)
2024
-
ACSACI Can Show You the World (of Censorship): Extracting Insights from Censorship Measurement Data Using Statistical TechniquesIn Proceedings of the Annual Computer Security Applications Conference (ACSAC), Dec 2024(Acceptance Rate 21.8%)
-
ACM CCS“I Had Sort of a Sense that I Was Always Being Watched... Since I Was”: Examining Interpersonal Discomfort From Continuous Location-Sharing ApplicationsIn Proceedings of the ACM Conference on Computer and Communications Security (CCS), Oct 2024(Acceptance Rate 16.9%)
-
ACM CCSRANsacked: A Domain-Informed Approach for Fuzzing LTE and 5G RAN-Core InterfacesIn Proceedings of the ACM Conference on Computer and Communications Security (CCS), Oct 2024(Acceptance Rate 16.9%)
-
ACM CCSBetter Be Computer or I’m Dumb": A Large-Scale Evaluation of Humans as Audio Deepfake DetectorsIn Proceedings of the ACM Conference on Computer and Communications Security (CCS), Oct 2024(Acceptance Rate 16.9%)
-
USENIX SECSoK: The Good, The Bad, and The Unbalanced: Measuring Structural Limitations of Current Deepfake DatasetsIn Proceedings of the USENIX Security Symposium (Security), Aug 2024(Acceptance Rate 18.3%)
-
USENIX SECFinding Traceability Attacks in the Bluetooth Low Energy Specification and Its ImplementationsIn Proceedings of the USENIX Security Symposium (Security), Aug 2024(Acceptance Rate 18.3%)
-
ACM CODASPYExamining Cryptography and Randomness Failures in Open-Source Cellular CoresIn Proceedings of the ACM Conference on Data and Application Security and Privacy (CODASPY), Jun 2024(Acceptance rate: 21.3%)
-
USEC“I used to live in Florida”: Exploring the Impact of Spam Call Warning Accuracy on Callee Decision-MakingIn Symposium on Usable Security and Privacy (USEC), Feb 2024
2023
-
ACM CCS“Get in Researchers; We’re Measuring Reproducibility”: A Reproducibility Study of Machine Learning Papers in Tier 1 Security ConferencesIn Proceedings of the ACM Conference on Computer and Communications Security (CCS), Nov 2023(Acceptance rate: 19.8%)
-
ACM MobiSysLeopardSeal: Detecting Call Interception via Audio Rogue Base StationsIn Proceedings of the ACM International Conference on Mobile Systems, Applications and Services (MobiSys), Jun 2023(Acceptance rate: 21%)
-
IEEE S&PBlue’s Clues: Practical Discovery of Non-Discoverable Bluetooth DevicesIn Proceedings of the IEEE Symposium on Security and Privacy (S&P), May 2023(Acceptance rate: 14%)
-
ISOC NDSSAttacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on Automatic Speech Recognition SystemsIn Symposium on Network and Distributed System Security (NDSS), Feb 2023(Acceptance rate: 16%)
2022
-
PETSAnalyzing the Monetization Ecosystem of StalkerwareProceedings on Privacy Enhancing Technologies (PoPETs), Jun 2022(Acceptance rate: 24%)
-
IEEE CNSHallMonitor: A Framework for Identifying Network Policy Violations in SoftwareIn IEEE Conference on Communications and Network Security (CNS), Oct 2022
-
USENIX SECWho Are You (I Really Wanna Know)? Detecting Audio DeepFakes Through Vocal Tract ReconstructionIn Proceedings of the USENIX Security Symposium (SECURITY), Aug 2022(Acceptance rate: 17.2%)
-
ACM AsiaCCSSMS OTP Security (SOS): Hardening SMS-Based Two Factor AuthenticationIn ACM Asia Conference on Computer and Communications Security (ASIACCS), Jun 2022(Acceptance rate: 18.2%)
-
ICLRDemystifying Limited Adversarial Transferability in Automatic Speech Recognition SystemsIn Proceedings of the International Conference on Learning Representations (ICLR), Apr 2022(Acceptance rate: 32%)
-
ISOC NDSSFirmWire: Transparent Dynamic Analysis for Cellular Baseband FirmwareIn Symposium on Network and Distributed System Security (NDSS) , Feb 2022(Acceptance rate: 16.2%)
2021
-
ACMLBeyond L_p Clipping: Equalization based Psychoacoustic Attacks against ASRsIn The Asian Conference on Machine Learning (ACML), Nov 2021
-
TPRCCharacterizing User Comprehension in the STIR/SHAKEN Anti-Robocall StandardIn Proceedings of the Annual Research Conference on Comunications Information and Internet Policy (TPRC 49), Sep 2021
-
IEEE S&PThe Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification SystemsIn Proceedings of the IEEE Symposium on Security and Privacy (S&P), May 2021(Acceptance rate: 12.1%)
-
IEEE S&PHear “No Evil”, See “Kenansville”: Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification SystemsIn Proceedings of the IEEE Symposium on Security and Privacy (S&P), May 2021(Acceptance rate: 12.1%)
2020
-
IEEE ISTASTruly Visual Caller ID? An Analysis of Anti-Robocall Applications and their Accessibility to Visually Impaired UsersIn IEEE International Symposium on Technology and Society (IEEE ISTAS), Nov 2020
-
ACM CCSWOn the Detection of Disinformation Campaign Activity with Network AnalysisIn Proceedings of the 2020 ACM SIGSAC Cloud Computing Security Workshop, Nov 2020
-
ISOC NDSSAre You Going to Answer That? Measuring User Responses to Anti-Robocall Application IndicatorsIn Proceedings of the ISOC Network & Distributed Systems Security Symposium (NDSS), Feb 2020(Acceptance rate: 17.4%)
2019
-
ACM AsiaCCSA Hybrid Approach to Secure Function Evaluation Using SGXIn Procedings of the ACM ASIA Conference on Computer and Communications Security (ASIACCS’19), Jul 2019(Acceptance Rate: 17.0% for full papers)
-
ACM AsiaCCSExamining DES-based Cipher Suite Support within the TLS EcosystemIn Proceedings of the ACM ASIA Conference on Computer and Communications Security (ASIACCS’19), Jul 2019(Acceptance Rate: 22.0% for all papers)
-
IEEE S&PKiss from a Rogue: Evaluating Detectability of Pay-at-the-Pump Card SkimmersIn Proceedings of the IEEE Symposium on Security and Privacy (S&P), May 2019(Acceptance rate: 12.0%)
-
ACM CODASPYA Practical Intel SGX Setting for Linux Containers in the CloudIn Proceedings of the ACM Conference on Data and Application Security and Privacy (CODASPY’19), Mar 2019(Acceptance rate: 23.5%)
-
ACM WiSecCharacterizing Security and Privacy Practices in Emerging Digital Credit ApplicationsIn Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), May 2019(Acceptance rate: 25.6%)
-
ISOC NDSSPractical Hidden Voice Attacks against Speech and Speaker Recognition SystemsIn Proceedings of the ISOC Network & Distributed Systems Security Symposium (NDSS), Feb 2019(Acceptance Rate: 17.1%)
-
ISOC NDSSDigital Healthcare-Associated Infection Analysis of a Major Multi-Campus Hospital SystemIn Proceedings of the ISOC Network & Distributed Systems Security Symposium (NDSS), Feb 2019(Acceptance Rate: 17.1%)
2018
-
ACM TOPSCharacterizing the Security of the SMS Ecosystem with Public GatewaysACM Transactions on Privacy and Security (TOPS), Feb 2018
-
ACSACA Large Scale Investigation of Obfuscation Use in Google PlayIn Proceedings of the Annual Computer Security Applications Conference (ACSAC), Dec 2018Acceptance Rate: 20.1%
-
ACM CCSMitigating Risk while Complying with Data Retention LawsIn Proceedings of the ACM Conference on Computer and Communications Security (CCS), Oct 2018
-
USENIX SECFear the Reaper: Characterization and Fast Detection of Card SkimmersIn Proceedings of the USENIX Security Symposium (SECURITY), Aug 2018Acceptance Rate: 19.0%
-
USENIX SECATtention Spanned: Comprehensive Vulnerability Analysis of AT Commands Within the Android EcosystemIn Proceedings of the USENIX Security Symposium (SECURITY), Aug 2018Acceptance Rate: 19.0%
-
ACM WiSecHello, Is It Me You’re Looking For? Differentiating Between Human and Electronic Speakers for Voice Interface SecurityIn Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), Jun 2018
-
ACM AsiaCCS2MA: Verifying Voice Commands via Two Microphone AuthenticationIn ACM Asia Conference on Computer and Communications Security (ASIACCS), Jun 2018(Acceptance Rate: 20.0%)
-
IEEE S&PThe Cards Aren’t Alright: Detecting Counterfeit Gift Cards Using Encoding JitterIn Proceedings of the IEEE Symposium on Security and Privacy (S&P), May 2018(Acceptance Rate: 10.4%)
-
IEEE S&PSonar: Detecting SS7 Redirection Attacks Via Call Audio-Based Distance BoundingIn Proceedings of the IEEE Symposium on Security and Privacy (S&P), May 2018(Acceptance Rate: 10.4%)
2017
-
S&P MagFinTechSec: Addressing the Scurity Challenges of Digital Financial ServicesIEEE S&P Magazine, May 2017
-
IEEE MILCOMPrivacy Preserving Localization Using a Distributed Particle Filtering ProtocolIn IEEE MILCOM, Oct 2017(Acceptance Rate: 56%)
-
IJISOnionDNS: A Seizure-Resistant Top-level DomainInternational Journal of Information Security (IJIS), Oct 2017
-
USENIX SOUPSRegulators, Mount Up! Analysis of Privacy Policies for Mobile Money ApplicationsIn Proceedings of the USENIX Symposium on Usable Privacy and Security (SOUPS), Aug 2017(Acceptance Rate: 26.5%)
-
USENIX SECAuthentiCall: Efficient Identity and Content Authentication for Phone CallsIn Proceedings of the USENIX Security Symposium (SECURITY), Aug 2017(Acceptance Rate: 16.3%)
-
IJICSOPFE: Outsourcing Computation for Private Function EvaluationInternational Journal of Information and Computer Security (IJICS), Aug 2017
-
ACM TOPSMo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications in the Developing WorldACM Transactions on Privacy and Seurity (TOPS), Aug 2017
-
PETSPhonion: Practical Protection of Metadata in Telephony NetworksProceedings on Privacy Enhancing Technologies (PoPETs), Jun 2017
2016
-
ACM CSUR*droid: Assessment and Evaluation of Android Application Analysis ToolsACM Computing Surveys (CSUR), Jun 2016
-
SPCEfficient and Secure Template Blinding for Biometric AuthenticationIn IEEE Workshop on Security and Privacy in the Cloud (SPC), Aug 2016
-
IEEE TMCDetecting Mobile Malicious Webpages in Real TimeIEEE Transactions on Mobile Computing (TMC), Aug 2016
-
USENIX SECAuthLoop: End-to-End Cryptographic Authentication for Telephony over Voice ChannelsIn Proceedings of the USENIX Security Symposium (SECURITY), Aug 2016(Acceptance Rate: 15.5%)
-
USENIX SECMaking USB Great Again with USBFILTERIn Proceedings of the USENIX Security Symposium (SECURITY), Aug 2016(Acceptance Rate: 15.5%)
-
SCNOutsourcing Secure Two-Party Computation as a Black BoxJournal of Security and Communication Networks (SCN), Aug 2016
-
ACM WiSecDetecting SMS Spam in the Age of Legitimate Bulk MessagingIn Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), Jul 2016(Acceptance Rate: 35.0%)
-
IEEE ICDCSCryptoLock (and Drop It): Stopping Ransomware Attacks on User DataIn IEEE International Conference on Distributed Computing Systems (ICDCS), Jul 2016(Acceptance Rate: 17.6%)
-
IEEE S&PSending out an SMS: Characterizing the Security of the SMS Ecosystem with Public GatewaysIn Proceedings of the IEEE Symposium on Security and Privacy (S&P), May 2016(Acceptance Rate: 13.0%)
-
JCSSecure Outsourced Garbled Circuit Evaluation for Mobile DevicesJournal of Computer Security (JCS), May 2016
-
WAHCUsing Intel Software Guard Extensions for Efficient Two-Party Secure Function EvaluationIn Workshop on Encrypted Computing and Applied Homomorphic Cryptography (WAHC), Feb 2016
-
IEEE Euro S&PFrigate: A Validated, Extensible, and Efficient Compiler and Interpreter for Secure ComputationIn Proceedings of the IEEE European Symposium on Security and Privacy, Feb 2016(Acceptance Rate: 17.3%)
2015
-
CANSOutsourcing Secure Two-Party Computation as a Black BoxIn Proceedings of the International Conference on Cryptology and Network Security, Nov 2015(Acceptance Rate: 52.9%)
-
IEEE CNSOnionDNS: A Seizure-Resistant Top-level DomainIn Proceedings of the IEEE Conference on Communications and Network Security (CNS), Sep 2015(Acceptance Rate: 28.1%)
-
ARESUncovering Use-After-Free Conditions In Compiled CodeIn Proceedings of the International Conference on Availability, Reliability and Security (ARES), Aug 2015(Acceptance Rate: 22%)
-
USENIX SECMo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications in the Developing WorldIn Proceedings of the USENIX Security Symposium (SECURITY), Aug 2015(Acceptance Rate: 15.7%)
-
USENIX SECBoxed Out: Blocking Cellular Interconnect Bypass Fraud at the Network EdgeIn Proceedings of the USENIX Security Symposium (SECURITY), Aug 2015(Acceptance Rate: 15.7%)
-
DIMVAMore Guidelines Than Rules: CSRF Vulnerabilities from Noncompliant OAuth 2.0 ImplementationsIn Proceedings of the International Conference on Detection of Intrusions & Malware, and Vulnerability Assessment (DIMVA), Jul 2015(Acceptance Rate: 22.7%)
-
JCSAccountable Wiretapping -or- I Know They Can Hear You NowJournal of Computer Security (JCS), Jul 2015
-
IEEE TMCAn Empirical Evaluation of Security Indicators in Mobile Web BrowsersIEEE Transactions on Mobile Computing (TMC), Jul 2015
2014
-
ACSACWhitewash: Outsourcing Garbled Circuit Generation for Mobile DevicesIn Proceedings of the Annual Computer Security Applications Conference (ACSAC), Dec 2014(Acceptance Rate: 19.9%)
-
SCNFor Your Phone Only: Custom Protocols for Efficient Secure Function Evaluation on Mobile DevicesJournal of Security and Communication Networks (SCN), Dec 2014
2013
-
USENIX SECSecure Outsourced Garbled Circuit Evaluation for Mobile DevicesIn Proceedings of the USENIX Security Symposium (SECURITY), Aug 2013(Acceptance Rate: 16.2%)
-
IEEE DSNWhy is My Smartphone Slow? On The Fly Diagnosis of Poor Performance on the Mobile InternetIn Proceedings of The 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Jun 2013(Acceptance Rate: 19.6%)
-
ACM WiSecMAST: Triage for Market-scale Mobile Malware AnalysisIn Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), Apr 2013(Acceptance Rate: 15.0%)(Best Paper)
-
ISOC NDSSThe Core of the Matter: Analyzing Malicious Traffic in Cellular CarriersIn Proceedings of the ISOC Network & Distributed System Security Symposium (NDSS), Feb 2013(Acceptance rate: 18.8%)
-
WJLTAPrivacy and Security Concerns Associated with Mobile Money Applications in AfricaWashington Journal of Law, Technology & Arts, Feb 2013
2012
-
ICISSVulnerableMe: Measuring Systemic Weaknesses in Mobile Browser SecurityIn Proceedings of the International Conference on Information Systems Security (ICISS), Dec 2012(Acceptance rate: 25%) (Best Paper - SAIC Student Paper Competition (GT)) (Finalist - CSAW AT&T Applied Security Research Best Paper Competition 2012)
-
ACM SPSMRethinking Permissions for Mobile Web Apps: Barriers and the Road AheadIn Proceedings of the ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), Nov 2012
-
ISCA Measurement Study of SSL Indicators on Mobile Browsers: Extended Life, or End of the Road?In Proceedings of the Information Security Conference (ISC), Sep 2012(Acceptance rate: 32%)
-
ESORICSTrust No One Else: Detecting MITM Attacks Against SSL/TLS Without Third-PartiesIn Proceedings of the European Symposium on Research in Computer Security (ESORICS), Sep 2012(Acceptance Rate: 20.2%)
-
WOOTUnder New Management: Practical Attacks on SNMPv3In Proceedings of the USENIX Workshop on Offensive Technologies (WOOT), Aug 2012
-
ACM TOITOne-Time Cookies: Preventing Session Hijacking Attacks with Stateless Authentication TokensACM Transactions on Internet Technology (TOIT), Aug 2012
-
JANARDEN: Anonymous netwoRking in Delay tolErant NetworksJournal of Ad Hoc Networks, Aug 2012
-
ISOC NDSSAccountable Wiretapping -or- I Know They Can Hear You NowIn Proceedings of the ISOC Network & Distributed System Security Symposium (NDSS), Feb 2012(Acceptance Rate: 17.8%)
-
IEEE TMCCharacterizing the Security Implications of Third-Party EAS Over Cellular Text Messaging ServicesIEEE Transactions on Mobile Computing (TMC), Feb 2012
2011
-
Book ChapterEmerging Privacy and Security Concerns for Digital Wallet DeploymentJul 2011
-
ACSACAutomated Remote Repair for Mobile MalwareIn Proceedings of the Annual Computer Security Applications Conference (ACSAC), Dec 2011(Acceptance Rate: 18.5%)
-
ACSAC“Mix-In-Place" Anonymous Networking Using Secure Function EvaluationIn Proceedings of the Annual Computer Security Applications Conference (ACSAC), Dec 2011(Acceptance Rate: 18.5%)
-
ACM CCS(sp)iPhone: Decoding Vibrations From Nearby Keyboards Using Mobile Phone AccelerometersIn Proceedings of the ACM Conference on Computer and Communications Security (CCS), Oct 2011(Acceptance Rate: 13.9%)
-
FCImpeding Individual User Profiling in Shopper Loyalty ProgramsIn Proceedings of the International Conference on Financial Cryptography and Data Security (FC), Feb 2011(Acceptance Rate: 35.1%)
-
ISOC NDSSNo Loitering: Exploiting Lingering Vulnerabilities in Default COM ObjectsIn Proceedings of the ISOC Network & Distributed System Security Symposium (NDSS), Feb 2011(Acceptance Rate: 20.1%)
-
IEEE TPDSImproving Authentication Performance of Distributed SIP ProxiesIEEE Transactions on Parallel and Distributed Systems (TPDS), Feb 2011
-
SCNFrom Mobile Phones to Responsible DevicesJournal of Security and Communication Networks (SCN), Feb 2011
2010
-
IEEE GLOBECOMConstructing Secure Localization Systems with Adjustable GranularityIn IEEE Global Communications Conference (GLOBECOM), Dec 2010(Acceptance Rate: 35.6%)
-
ACM CCSPinDr0p: Using Single-Ended Audio Features to Determine Call ProvenanceIn Proceedings of the ACM Conference on Computer and Communications Security (CCS), Oct 2010(Acceptance Rate: 17.2%)
-
IEEE SecureCommCharacterizing the Security Implications of Third-Party EAS Over Cellular Text Messaging ServicesIn Proceedings of the Second IEEE International Conference on Security and Privacy in Communication Networks (SecureComm), Sep 2010(Acceptance Rate: 25.0%)
-
DIMVAEvaluating Bluetooth as a Medium for Botnet Command and ControlIn Proceedings of the International Conference on Detection of Intrusions & Malware, and Vulnerability Assessment (DIMVA), Jul 2010(Acceptance Rate: 30.7%)
-
USENIX ATCProxychain: Developing a Robust and Efficient Authentication Infrastructure for Carrier-Scale VoIP NetworksIn Proceedings of the USENIX Annual Technical Conference (ATC), Jun 2010(Acceptance Rate: 17.0%)
-
SCNmalnets: Large-Scale Malicious Networks via Compromised Wireless Access PointsJournal of Security and Communication Networks (SCN), Jun 2010
-
JCSSecure Attribute-Based SystemsJournal of Computer Security (JCS), Jun 2010
2009
-
Book ChapterEmerging Privacy Concerns for Digital Wallet DeploymentIn Proceedings of the Workshop on Making Privacy in America, Jun 2009
-
ACSACLeveraging Cellular Infrastructure to Improve Fraud PreventionIn Proceedings of the Annual Computer Security Applications Conference (ACSAC), Dec 2009(Acceptance Rate: 19.0%)
-
PSHTPrivacy and Security Concerns for Personal and Mobile Health DevicesIn Proceedings of the Workshop to Set A Research Agenda for Privacy and Security of Healthcare Technologies, Oct 2009
-
S&P MagSecuring Cellular Infrastructure: Challenges and OpportunitiesIEEE Security & Privacy Magazine, Oct 2009
-
ACM CCSOn Cellular Botnets: Measuring the Impact of Malicious Devices on a Cellular Network CoreIn Proceedings of the ACM Conference on Computer and Communications Security (CCS), Oct 2009(Acceptance Rate: 18.4%)
-
ACM CCSRobust Signatures for Kernel Data StructuresIn Proceedings of the ACM Conference on Computer and Communications Security (CCS), Oct 2009(Acceptance Rate: 18.4%)
-
IEEE TPDSLeveraging Identity-based Cryptography for Node ID Assignment in Structured P2P SystemsIEEE Transactions on Parallel and Distributed Systems (TPDS), Oct 2009
-
IEEE TONMitigating Attacks On Open Functionality in SMS-Capable Cellular NetworksIEEE/ACM Transactions on Networking (TON), Oct 2009
-
IPTCOMMImproving Authentication Performance of Distributed SIP ProxiesIn Proceedings of the Conference on Principles, Systems and Applications of IP Telecommunications (IPTComm), Jul 2009(Acceptance Rate: 43.3%)
2008
-
Book ChapterPrivacy Preserving Web-Based EmailNov 2008
-
EVTSystemic Issues in the Hart InterCivic and Premier Voting System: Reflections Following Project EVERESTIn Proceedings of the USENIX/ACCURATE Electronic Voting Technology (EVT) Workshop, Aug 2008
-
ACM TISSECNon-Invasive Methods for Host CertificationACM Transactions on Information and System Security (TISSEC), Aug 2008
-
ISOC NDSSRealizing Massive-Scale Conditional Access Systems Through Attribute-Based CryptosystemsIn Proceedings of the ISOC Network & Distributed System Security Symposium (NDSS), Feb 2008(Acceptance Rate: 17.7%)
-
JCSExploiting Open Functionality in SMS-Capable Cellular NetworksJournal of Computer Security (JCS), Feb 2008
-
BookSecurity for Telecommunications NetworksAug 2008
-
DissertationCharacterizing the Impact of Rigidity on the Security of Cellular Telecommunications NetworksThe Pennsylvania State University, May 2008
2007
-
EVERESTEVEREST: Evaluation and Validation of Election-Related Equipment, Standards and TestingMay 2007
-
USENIX SECOn Attack Causality in Internet-Connected Cellular NetworksIn Proceedings of the USENIX Security Symposium (SECURITY), Aug 2007(Acceptance Rate: 12.3%)
-
IEEE TMCEfficient Hybrid Security Mechanisms for Heterogeneous Sensor NetworksIEEE Transactions on Mobile Computing (TMC), Aug 2007
-
IEEE SSNDSLeveraging Identity-based Cryptography for Node ID Assignment in Structured P2P SystemsIn Proceedings of the IEEE International Symposium on Security in Networks and Distributed Systems (SSNDS), Jul 2007(Acceptance Rate: 40%)
2006
-
ICISSPassword Exhaustion: Predicting the End of Password UsefulnessIn Proceedings of the International Conference on Information Systems Security (ICISS), Dec 2006
-
ICISSPrivacy-Preserving Web-Based EmailIn Proceedings of the International Conference on Information Systems Security (ICISS), Dec 2006(Acceptance Rate: 30.4%)
-
ACM CCSSecure Attribute-Based SystemsIn Proceedings of the Thirteenth ACM Conference on Computer and Communications Security (CCS), Nov 2006(Acceptance Rate: 14.8%)
-
ACM MobiComMitigating Attacks on Open Functionality in SMS-Capable Cellular NetworksIn Proceedings of the Twelfth Annual ACM International Conference on Mobile Computing and Networking (MobiCom), Sep 2006(Acceptance Rate: 11.7%)
-
IEEE SecureCommNon-Invasive Methods for Host CertificationIn Proceedings of the Second IEEE International Conference on Security and Privacy in Communication Networks (SecureComm), Aug 2006(Acceptance Rate: 25.4%)
-
IEEE VTCEfficient Group Mobility for Heterogeneous Sensor NetworksIn Proceedings of the IEEE Vehicular Technology Conference (VTC Fall), Sep 2006(Acceptance Rate: 58%)
-
ACM MobiSysLIGER: Implementing Efficient Hybrid Security Mechanisms for Heterogeneous Sensor NetworksIn Proceedings of the 4th ACM International Conference on Mobile Systems, Applications and Services (MobiSys), Jun 2006(Acceptance Rate: 15.4%)
-
IEEE WCNCThe Effects of Probabilistic Key Management on Secure Routing in Sensor NetworksIn Proceedings of the 2006 IEEE Wireless Communications and Networking Conference (WCNC), Apr 2006(Acceptance Rate: 38.8%)
-
IEEE INFOCOMEstablishing Pair-Wise Keys In Heterogeneous Sensor NetworksIn Proceedings of the 25th Annual IEEE Conference on Computer Communications (INFOCOM), Apr 2006(Acceptance Rate: 18%)
2005
-
ACM CCSExploiting Open Functionality in SMS-Capable Cellular NetworksIn Proceedings of the Twelfth ACM Conference on Computer and Communications Security (CCS), Nov 2005(Acceptance Rate: 15%)