Understanding the Efficacy of Security Training in Practice, Grant Ho, Ariana Mirian, Elisa Luo, Khang Tong, Euyhyun Lee, Lin Liu, Christopher A. Longhurst, Christian Dameff, Stefan Savage, and Geoffrey M. Voelker,
Proceedings of the IEEE Symposium on Security and Privacy, May 2025.
On the Semidirect Discrete Logarithm Problem in Finite Groups, Christopher Battarbee, Giacomo Borin, Ryann Cartor, Nadia Heninger, David Jao, Laura Maddison, Edoardo Persichetti, Angela Robinson, Daniel Smith-Tone, and Rainer Steinwandt,
Proceedings of Asiacrypt 2024, Kolkata, India, December 2024.
The Concrete Security of Two-Party Computation: Simple Definitions, and Tight Proofs for PSI and OPRFs, Mihir Bellare, Rishabh Ranjan, Doreen Riepel, and Ali Aldakheel,
Proceedings of Asiacrypt 2024, Kolkata, India, December 2024.
Count Corruptions, Not Users: Improved Tightness for Signatures, Encryption and Authenticated Key Exchange, Mihir Bellare, Doreen Riepel, Stefano Tessaro, and Yizhao Zhang,
Proceedings of Asiacrypt 2024, Kolkata, India, December 2024.
Symmetric and Dual PRFs from Standard Assumptions: A Generic Validation of a Prevailing Assumption, Mihir Bellare and Anna Lysyanskaya,
IACR Journal of Cryptology 37(4), December 2024.
Succinctly-Committing Authenticated Encryption, Mihir Bellare and Biet Tung Hoang,
Proceedings of Crypto 2024, Santa Barbara, CA, August 2024.
Give and Take: An End-To-End Investigation of Giveaway Scam
Conversion Rates, Enze Liu, George Kappos, Eric Mugnier, Luca Invernizzi, Stefan Savage, David Tao, Kurt Thomas, Geoffrey M. Voelker, and Sarah Meiklejohn,
Proceedings of the ACM Internet Measurement Conference (IMC), Madrid, Spain, November 2024.
RADIUS/UDP Considered Harmful, Sharon Goldberg, Miro Haller, Nadia Heninger, Mike Milano, Dan Shumow, Marc Stevens, and Adam Suhl,
Proceedings of the USENIX Security Symposium, Philadelphia, PA, August 2024.
Abuse-Resistant Location Tracking: Balancing Privacy and Safety in the Offline Finding Ecosystem, Gabrielle Beck, Harry Eldridge, Matthew Green, Nadia Heninger, and Abhishek Jain,
Proceedings of the USENIX Security Symposium, Philadelphia, PA, August 2024.
Using Honeybuckets to Characterize Cloud Storage Scanning in the Wild, Katherine Izhikevich, Geoffrey M. Voelker, Stefan Savage, and Liz Izhikevich,
Proceedings of the IEEE European Symposium on Security and Privacy, Vienna, Austria, July 2024.
Experimental Security Analysis of Sensitive Data Access by Browser Extensions, Rishabh Khandelwal, Asmit Nayak, Earlence Fernandes, and Kassem Fawaz,
Proceedings of the Web Conference (WWW), Singapore, May 2024.
Unfiltered: Measuring Cloud-based Email Filtering Bypasses, Sumanth Rao, Enze Liu, Grant Ho, Geoffrey M. Voelker, and Stefan Savage,
Proceedings of the Web Conference (WWW), Singapore, May 2024.
The Double Edged Sword: Identifying Authentication Pages and their Fingerprinting Behavior, Asuman Senol, Alisha Ukani, Dylan Cutler, and Igor Bilogrevic,
Proceedings of the Web Conference (WWW), Singapore, May 2024.
PressProtect: Helping Journalists Navigate Social Media in the Face of Online Harassment, Catherine Han, Anne Li, Deepak Kumar, and Zakir Durumeric,
Proceedings of the ACM Conference on Computer Supported Cooperative Work and Social Computing, October 2024.
Watch Your Language: Investigating Content Moderation with Large Language Models, Deepak Kumar, Yousef Anees AbuHashem, and Zakir Durumeric,
Proceedings of the international AAAI conference on Web and social media, june 2024.
Specious sites: Tracking the spread and sway of spurious news stories at scale, Hans WA Hanley, Deepak Kumar, and Zakir Durumeric,
Proceedings of the IEEE Symposium on Security and Privacy, May 2024.
Practical Obfuscation of BLE Physical-Layer Fingerprints on Mobile Devices, Hadi Givehchian, Nishant Bhaskar, Alexender Redding, Han Zhao, Aaron Schulman, and Dinesh Bharadia,
Proceedings of the IEEE Symposium on Security and Privacy, May 2024.
On the Possibility of a Backdoor in the Micali-Schnorr Generator, Hannah Davis, Matthew D. Green, Nadia Heninger, Keegan Ryan, and Adam Suhl,
Proceedings of PKC 2024, May 2024.
Survey: Recovering cryptographic keys from partial information, by example., Gabrielle De Micheli and Nadia Heninger,
IACR Communications in Cryptology 1(1), April 2024.
Network Topology Facilitates Internet Traffic Control in Autocracies, Eda Keremoğlu, Nils B. Weidmann, Alexander Gamero-Garrido, Esteban Carisimo, Alberto Dainotti, and Alex C. Snoeren,
pnasnex 3(3), March 2024.
Architecting Trigger-Action Platforms for Security, Performance and Functionality, Deepak Siron Jegan, Michael Swift, and Earlence Fernandes,
Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2024.
On Precisely Detecting Censorship Circumvention in Real-World Networks, Ryan Wails, George Arnold Sullivan, Micah Sherr, and Rob Jansen,
Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2024.
Experimental Analyses of the Physical Surveillance Risks in Client-Side Content Scanning, Ashish Hooda, Andrey Labunets, Tadayoshi Kohno, and Earlence Fernandes,
Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2024.
Scalable Metadata-Hiding for Privacy Preserving IoT Systems, Yunang Chen, David Heath, Rahul Chatterjee, and Earlence Fernandes,
Proceedings on Privacy Enhanding Technologies Symposium, Bristol, UK, July 2024.
MakeShift: Security Analysis of Shimano Di2 Wireless Gear Shifting in Bicycles, Maryam Motallebighomi, Earlence Fernandes, and Aanjhan Ranganathan,
Proceedings of the USENIX WOOT Conference on Offensive Technologies (WOOT), Philadelphia, PA, August 2024.
Stateful Least Privilege Authorization for the Cloud, Leo Cao, Luoxi Meng, Deian Stefan, and Earlence Fernandes,
Proceedings of the USENIX Security Symposium, Philadelphia, PA, August 2024.
An Empirical Analysis of Enterprise-Wide Mandatory Password Updates, Ariana Mirian, Grant Ho, Stefan Savage, and Geoffrey M. Voelker,
Proceedings of Annual Computer Security Applications Conference (ACSAC), Austin, TX, December 2023.
Ransomware Attack Associated With Disruptions at Adjacent Emergency Departments in the US, Christian Dameff, Jeffrey Tully, Theodore C. Chan, Edward M. Castillo, Stefan Savage, Patricia Maysent, Thomas M. Hemmen, Brian J. Clay, and Christopher A. Longhurst,
JAMA Network Open 6(5):e2312270-e2312270, 2023.
TagAlong: Free, Wide-Area Data-Muling and Services, Alex Bellon, Alex Yen, and Pat Pannuto,
Proceedings of International Workshop on Mobile Computing Systems and Applications (HotMobile), Newport Beach, CA, 2023.