BibTeX records: David A. Wagner 0001

download as .bib file

@article{DBLP:journals/corr/abs-2402-06363,
  author       = {Sizhe Chen and
                  Julien Piet and
                  Chawin Sitawarin and
                  David A. Wagner},
  title        = {StruQ: Defending Against Prompt Injection with Structured Queries},
  journal      = {CoRR},
  volume       = {abs/2402.06363},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.06363},
  doi          = {10.48550/ARXIV.2402.06363},
  eprinttype    = {arXiv},
  eprint       = {2402.06363},
  timestamp    = {Mon, 19 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-06363.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2402-09674,
  author       = {Chawin Sitawarin and
                  Norman Mu and
                  David A. Wagner and
                  Alexandre Araujo},
  title        = {{PAL:} Proxy-Guided Black-Box Attack on Large Language Models},
  journal      = {CoRR},
  volume       = {abs/2402.09674},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.09674},
  doi          = {10.48550/ARXIV.2402.09674},
  eprinttype    = {arXiv},
  eprint       = {2402.09674},
  timestamp    = {Wed, 21 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-09674.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2402-12617,
  author       = {Banghua Zhu and
                  Norman Mu and
                  Jiantao Jiao and
                  David A. Wagner},
  title        = {Generative {AI} Security: Challenges and Countermeasures},
  journal      = {CoRR},
  volume       = {abs/2402.12617},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.12617},
  doi          = {10.48550/ARXIV.2402.12617},
  eprinttype    = {arXiv},
  eprint       = {2402.12617},
  timestamp    = {Thu, 21 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-12617.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2403-18624,
  author       = {Yangruibo Ding and
                  Yanjun Fu and
                  Omniyyah Ibrahim and
                  Chawin Sitawarin and
                  Xinyun Chen and
                  Basel Alomair and
                  David A. Wagner and
                  Baishakhi Ray and
                  Yizheng Chen},
  title        = {Vulnerability Detection with Code Language Models: How Far Are We?},
  journal      = {CoRR},
  volume       = {abs/2403.18624},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.18624},
  doi          = {10.48550/ARXIV.2403.18624},
  eprinttype    = {arXiv},
  eprint       = {2403.18624},
  timestamp    = {Wed, 10 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-18624.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/AVYBWTASK23,
  author       = {Dhanya K. A. and
                  P. Vinod and
                  Suleiman Y. Yerima and
                  Abul Bashar and
                  David A. Wagner and
                  Abhiram T. and
                  Alan Antony and
                  Ashil K. Shavanas and
                  T. Gireesh Kumar},
  title        = {Obfuscated Malware Detection in IoT Android Applications Using Markov
                  Images and {CNN}},
  journal      = {{IEEE} Syst. J.},
  volume       = {17},
  number       = {2},
  pages        = {2756--2766},
  year         = {2023},
  url          = {https://doi.org/10.1109/JSYST.2023.3238678},
  doi          = {10.1109/JSYST.2023.3238678},
  timestamp    = {Thu, 13 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sj/AVYBWTASK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccv/HingunSL023,
  author       = {Nabeel Hingun and
                  Chawin Sitawarin and
                  Jerry Li and
                  David A. Wagner},
  title        = {{REAP:} {A} Large-Scale Realistic Adversarial Patch Benchmark},
  booktitle    = {{IEEE/CVF} International Conference on Computer Vision, {ICCV} 2023,
                  Paris, France, October 1-6, 2023},
  pages        = {4617--4628},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICCV51070.2023.00428},
  doi          = {10.1109/ICCV51070.2023.00428},
  timestamp    = {Mon, 22 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccv/HingunSL023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iclr/SitawarinP0C023,
  author       = {Chawin Sitawarin and
                  Kornrapat Pongmala and
                  Yizheng Chen and
                  Nicholas Carlini and
                  David A. Wagner},
  title        = {Part-Based Models Improve Adversarial Robustness},
  booktitle    = {The Eleventh International Conference on Learning Representations,
                  {ICLR} 2023, Kigali, Rwanda, May 1-5, 2023},
  publisher    = {OpenReview.net},
  year         = {2023},
  url          = {https://openreview.net/pdf?id=bAMTaeqluh4},
  timestamp    = {Fri, 30 Jun 2023 14:38:38 +0200},
  biburl       = {https://dblp.org/rec/conf/iclr/SitawarinP0C023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/0001DACW23,
  author       = {Yizheng Chen and
                  Zhoujie Ding and
                  Lamya Alowain and
                  Xinyun Chen and
                  David A. Wagner},
  title        = {DiverseVul: {A} New Vulnerable Source Code Dataset for Deep Learning
                  Based Vulnerability Detection},
  booktitle    = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  pages        = {654--668},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199.3607242},
  doi          = {10.1145/3607199.3607242},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/0001DACW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/0001D023,
  author       = {Yizheng Chen and
                  Zhoujie Ding and
                  David A. Wagner},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {Continuous Learning for Android Malware Detection},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {1127--1144},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/chen-yizheng},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/0001D023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/PietSP023,
  author       = {Julien Piet and
                  Aashish Sharma and
                  Vern Paxson and
                  David A. Wagner},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {Network Detection of Interactive {SSH} Impostors Using Deep Learning},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {4283--4300},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/piet},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/PietSP023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2302-04332,
  author       = {Yizheng Chen and
                  Zhoujie Ding and
                  David A. Wagner},
  title        = {Continuous Learning for Android Malware Detection},
  journal      = {CoRR},
  volume       = {abs/2302.04332},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2302.04332},
  doi          = {10.48550/ARXIV.2302.04332},
  eprinttype    = {arXiv},
  eprint       = {2302.04332},
  timestamp    = {Thu, 16 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2302-04332.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2304-00409,
  author       = {Yizheng Chen and
                  Zhoujie Ding and
                  Xinyun Chen and
                  David A. Wagner},
  title        = {DiverseVul: {A} New Vulnerable Source Code Dataset for Deep Learning
                  Based Vulnerability Detection},
  journal      = {CoRR},
  volume       = {abs/2304.00409},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2304.00409},
  doi          = {10.48550/ARXIV.2304.00409},
  eprinttype    = {arXiv},
  eprint       = {2304.00409},
  timestamp    = {Tue, 18 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2304-00409.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-17645,
  author       = {Chawin Sitawarin and
                  Jaewon Chang and
                  David Huang and
                  Wesson Altoyan and
                  David A. Wagner},
  title        = {Defending Against Transfer Attacks From Public Models},
  journal      = {CoRR},
  volume       = {abs/2310.17645},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.17645},
  doi          = {10.48550/ARXIV.2310.17645},
  eprinttype    = {arXiv},
  eprint       = {2310.17645},
  timestamp    = {Thu, 02 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-17645.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2311-04235,
  author       = {Norman Mu and
                  Sarah Chen and
                  Zifan Wang and
                  Sizhe Chen and
                  David Karamardian and
                  Lulwa Aljeraisy and
                  Dan Hendrycks and
                  David A. Wagner},
  title        = {Can LLMs Follow Simple Rules?},
  journal      = {CoRR},
  volume       = {abs/2311.04235},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2311.04235},
  doi          = {10.48550/ARXIV.2311.04235},
  eprinttype    = {arXiv},
  eprint       = {2311.04235},
  timestamp    = {Wed, 15 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2311-04235.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-00273,
  author       = {Julien Piet and
                  Chawin Sitawarin and
                  Vivian Fang and
                  Norman Mu and
                  David A. Wagner},
  title        = {Mark My Words: Analyzing and Evaluating Language Model Watermarks},
  journal      = {CoRR},
  volume       = {abs/2312.00273},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2312.00273},
  doi          = {10.48550/ARXIV.2312.00273},
  eprinttype    = {arXiv},
  eprint       = {2312.00273},
  timestamp    = {Mon, 11 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2312-00273.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-17673,
  author       = {Julien Piet and
                  Maha Alrashed and
                  Chawin Sitawarin and
                  Sizhe Chen and
                  Zeming Wei and
                  Elizabeth Sun and
                  Basel Alomair and
                  David A. Wagner},
  title        = {Jatmo: Prompt Injection Defense by Task-Specific Finetuning},
  journal      = {CoRR},
  volume       = {abs/2312.17673},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2312.17673},
  doi          = {10.48550/ARXIV.2312.17673},
  eprinttype    = {arXiv},
  eprint       = {2312.17673},
  timestamp    = {Sun, 21 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2312-17673.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pacmhci/MalkinWE22,
  author       = {Nathan Malkin and
                  David A. Wagner and
                  Serge Egelman},
  title        = {Can Humans Detect Malicious Always-Listening Assistants? {A} Framework
                  for Crowdsourcing Test Drives},
  journal      = {Proc. {ACM} Hum. Comput. Interact.},
  volume       = {6},
  number       = {{CSCW2}},
  pages        = {1--28},
  year         = {2022},
  url          = {https://doi.org/10.1145/3555613},
  doi          = {10.1145/3555613},
  timestamp    = {Fri, 03 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pacmhci/MalkinWE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eccv/MuK0X22,
  author       = {Norman Mu and
                  Alexander Kirillov and
                  David A. Wagner and
                  Saining Xie},
  editor       = {Shai Avidan and
                  Gabriel J. Brostow and
                  Moustapha Ciss{\'{e}} and
                  Giovanni Maria Farinella and
                  Tal Hassner},
  title        = {{SLIP:} Self-supervision Meets Language-Image Pre-training},
  booktitle    = {Computer Vision - {ECCV} 2022 - 17th European Conference, Tel Aviv,
                  Israel, October 23-27, 2022, Proceedings, Part {XXVI}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13686},
  pages        = {529--544},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-19809-0\_30},
  doi          = {10.1007/978-3-031-19809-0\_30},
  timestamp    = {Thu, 03 Nov 2022 14:02:39 +0100},
  biburl       = {https://dblp.org/rec/conf/eccv/MuK0X22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icml/SitawarinG022,
  author       = {Chawin Sitawarin and
                  Zachary J. Golan{-}Strieb and
                  David A. Wagner},
  editor       = {Kamalika Chaudhuri and
                  Stefanie Jegelka and
                  Le Song and
                  Csaba Szepesv{\'{a}}ri and
                  Gang Niu and
                  Sivan Sabato},
  title        = {Demystifying the Adversarial Robustness of Random Transformation Defenses},
  booktitle    = {International Conference on Machine Learning, {ICML} 2022, 17-23 July
                  2022, Baltimore, Maryland, {USA}},
  series       = {Proceedings of Machine Learning Research},
  volume       = {162},
  pages        = {20232--20252},
  publisher    = {{PMLR}},
  year         = {2022},
  url          = {https://proceedings.mlr.press/v162/sitawarin22a.html},
  timestamp    = {Tue, 12 Jul 2022 17:36:52 +0200},
  biburl       = {https://dblp.org/rec/conf/icml/SitawarinG022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/Malkin0E22,
  author       = {Nathan Malkin and
                  David A. Wagner and
                  Serge Egelman},
  editor       = {Sonia Chiasson and
                  Apu Kapadia},
  title        = {Runtime Permissions for Privacy in Proactive Intelligent Assistants},
  booktitle    = {Eighteenth Symposium on Usable Privacy and Security, {SOUPS} 2022,
                  Boston, MA, USA, August 7-9, 2022},
  pages        = {633--651},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/soups2022/presentation/malkin},
  timestamp    = {Wed, 26 Oct 2022 12:44:43 +0200},
  biburl       = {https://dblp.org/rec/conf/soups/Malkin0E22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2207-03574,
  author       = {Chawin Sitawarin and
                  Zachary J. Golan{-}Strieb and
                  David A. Wagner},
  title        = {Demystifying the Adversarial Robustness of Random Transformation Defenses},
  journal      = {CoRR},
  volume       = {abs/2207.03574},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2207.03574},
  doi          = {10.48550/ARXIV.2207.03574},
  eprinttype    = {arXiv},
  eprint       = {2207.03574},
  timestamp    = {Wed, 13 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2207-03574.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2209-09117,
  author       = {Chawin Sitawarin and
                  Kornrapat Pongmala and
                  Yizheng Chen and
                  Nicholas Carlini and
                  David A. Wagner},
  title        = {Part-Based Models Improve Adversarial Robustness},
  journal      = {CoRR},
  volume       = {abs/2209.09117},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2209.09117},
  doi          = {10.48550/ARXIV.2209.09117},
  eprinttype    = {arXiv},
  eprint       = {2209.09117},
  timestamp    = {Thu, 27 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2209-09117.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2212-05680,
  author       = {Nabeel Hingun and
                  Chawin Sitawarin and
                  Jerry Li and
                  David A. Wagner},
  title        = {{REAP:} {A} Large-Scale Realistic Adversarial Patch Benchmark},
  journal      = {CoRR},
  volume       = {abs/2212.05680},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2212.05680},
  doi          = {10.48550/ARXIV.2212.05680},
  eprinttype    = {arXiv},
  eprint       = {2212.05680},
  timestamp    = {Mon, 02 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2212-05680.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SitawarinCW21,
  author       = {Chawin Sitawarin and
                  Supriyo Chakraborty and
                  David A. Wagner},
  editor       = {Nicholas Carlini and
                  Ambra Demontis and
                  Yizheng Chen},
  title        = {{SAT:} Improving Adversarial Training via Curriculum-Based Loss Smoothing},
  booktitle    = {AISec@CCS 2021: Proceedings of the 14th {ACM} Workshop on Artificial
                  Intelligence and Security, Virtual Event, Republic of Korea, 15 November
                  2021},
  pages        = {25--36},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3474369.3486878},
  doi          = {10.1145/3474369.3486878},
  timestamp    = {Thu, 27 Oct 2022 08:08:03 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/SitawarinCW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangCW21,
  author       = {Zhanyuan Zhang and
                  Yizheng Chen and
                  David A. Wagner},
  editor       = {Nicholas Carlini and
                  Ambra Demontis and
                  Yizheng Chen},
  title        = {{SEAT:} Similarity Encoder by Adversarial Training for Detecting Model
                  Extraction Attack Queries},
  booktitle    = {AISec@CCS 2021: Proceedings of the 14th {ACM} Workshop on Artificial
                  Intelligence and Security, Virtual Event, Republic of Korea, 15 November
                  2021},
  pages        = {37--48},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3474369.3486863},
  doi          = {10.1145/3474369.3486863},
  timestamp    = {Thu, 27 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhangCW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Chen0QLJW21,
  author       = {Yizheng Chen and
                  Shiqi Wang and
                  Yue Qin and
                  Xiaojing Liao and
                  Suman Jana and
                  David A. Wagner},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Giovanni Vigna and
                  Elaine Shi},
  title        = {Learning Security Classifiers with Verified Global Robustness Properties},
  booktitle    = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, Republic of Korea, November 15 - 19, 2021},
  pages        = {477--494},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460120.3484776},
  doi          = {10.1145/3460120.3484776},
  timestamp    = {Thu, 27 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/Chen0QLJW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/SitawarinKSW21,
  author       = {Chawin Sitawarin and
                  Evgenios M. Kornaropoulos and
                  Dawn Song and
                  David A. Wagner},
  editor       = {Marc'Aurelio Ranzato and
                  Alina Beygelzimer and
                  Yann N. Dauphin and
                  Percy Liang and
                  Jennifer Wortman Vaughan},
  title        = {Adversarial Examples for k-Nearest Neighbor Classifiers Based on Higher-Order
                  Voronoi Diagrams},
  booktitle    = {Advances in Neural Information Processing Systems 34: Annual Conference
                  on Neural Information Processing Systems 2021, NeurIPS 2021, December
                  6-14, 2021, virtual},
  pages        = {15486--15497},
  year         = {2021},
  url          = {https://proceedings.neurips.cc/paper/2021/hash/82ca5dd156cc926b2992f73c2896f761-Abstract.html},
  timestamp    = {Tue, 03 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nips/SitawarinKSW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/HoDAPSV021,
  author       = {Grant Ho and
                  Mayank Dhiman and
                  Devdatta Akhawe and
                  Vern Paxson and
                  Stefan Savage and
                  Geoffrey M. Voelker and
                  David A. Wagner},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Hopper: Modeling and Detecting Lateral Movement},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {3093--3110},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/ho},
  timestamp    = {Mon, 20 Nov 2023 08:57:49 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/HoDAPSV021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2103-00663,
  author       = {Henry Xu and
                  An Ju and
                  David A. Wagner},
  title        = {Model-Agnostic Defense for Lane Detection against Adversarial Attack},
  journal      = {CoRR},
  volume       = {abs/2103.00663},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.00663},
  eprinttype    = {arXiv},
  eprint       = {2103.00663},
  timestamp    = {Mon, 08 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-00663.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-08714,
  author       = {Dequan Wang and
                  An Ju and
                  Evan Shelhamer and
                  David A. Wagner and
                  Trevor Darrell},
  title        = {Fighting Gradients with Gradients: Dynamic Defenses against Adversarial
                  Attacks},
  journal      = {CoRR},
  volume       = {abs/2105.08714},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.08714},
  eprinttype    = {arXiv},
  eprint       = {2105.08714},
  timestamp    = {Mon, 31 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-08714.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-11363,
  author       = {Yizheng Chen and
                  Shiqi Wang and
                  Yue Qin and
                  Xiaojing Liao and
                  Suman Jana and
                  David A. Wagner},
  title        = {Learning Security Classifiers with Verified Global Robustness Properties},
  journal      = {CoRR},
  volume       = {abs/2105.11363},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.11363},
  eprinttype    = {arXiv},
  eprint       = {2105.11363},
  timestamp    = {Thu, 27 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-11363.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-13442,
  author       = {Grant Ho and
                  Mayank Dhiman and
                  Devdatta Akhawe and
                  Vern Paxson and
                  Stefan Savage and
                  Geoffrey M. Voelker and
                  David A. Wagner},
  title        = {Hopper: Modeling and Detecting Lateral Movement (Extended Report)},
  journal      = {CoRR},
  volume       = {abs/2105.13442},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.13442},
  eprinttype    = {arXiv},
  eprint       = {2105.13442},
  timestamp    = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-13442.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2112-12750,
  author       = {Norman Mu and
                  Alexander Kirillov and
                  David A. Wagner and
                  Saining Xie},
  title        = {{SLIP:} Self-supervision meets Language-Image Pre-training},
  journal      = {CoRR},
  volume       = {abs/2112.12750},
  year         = {2021},
  url          = {https://arxiv.org/abs/2112.12750},
  eprinttype    = {arXiv},
  eprint       = {2112.12750},
  timestamp    = {Fri, 07 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2112-12750.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/McCoydPCSRHLW20,
  author       = {Michael McCoyd and
                  Won Park and
                  Steven Chen and
                  Neil Shah and
                  Ryan Roggenkemper and
                  Minjune Hwang and
                  Jason Xinyu Liu and
                  David A. Wagner},
  editor       = {Jianying Zhou and
                  Mauro Conti and
                  Chuadhry Mujeeb Ahmed and
                  Man Ho Au and
                  Lejla Batina and
                  Zhou Li and
                  Jingqiang Lin and
                  Eleonora Losiouk and
                  Bo Luo and
                  Suryadipta Majumdar and
                  Weizhi Meng and
                  Mart{\'{\i}}n Ochoa and
                  Stjepan Picek and
                  Georgios Portokalidis and
                  Cong Wang and
                  Kehuan Zhang},
  title        = {Minority Reports Defense: Defending Against Adversarial Patches},
  booktitle    = {Applied Cryptography and Network Security Workshops - {ACNS} 2020
                  Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S{\&}P, SCI,
                  SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12418},
  pages        = {564--582},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61638-0\_31},
  doi          = {10.1007/978-3-030-61638-0\_31},
  timestamp    = {Thu, 18 Feb 2021 13:46:45 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/McCoydPCSRHLW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JuW20,
  author       = {An Ju and
                  David A. Wagner},
  editor       = {Jay Ligatti and
                  Xinming Ou},
  title        = {{E-ABS:} Extending the Analysis-By-Synthesis Robust Classification
                  Model to More Complex Image Domains},
  booktitle    = {AISec@CCS 2020: Proceedings of the 13th {ACM} Workshop on Artificial
                  Intelligence and Security, Virtual Event, USA, 13 November 2020},
  pages        = {25--36},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3411508.3421382},
  doi          = {10.1145/3411508.3421382},
  timestamp    = {Mon, 08 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/JuW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/SitawarinW20,
  author       = {Chawin Sitawarin and
                  David A. Wagner},
  title        = {Minimum-Norm Adversarial Examples on {KNN} and {KNN} based Models},
  booktitle    = {2020 {IEEE} Security and Privacy Workshops, {SP} Workshops, San Francisco,
                  CA, USA, May 21, 2020},
  pages        = {34--40},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SPW50608.2020.00023},
  doi          = {10.1109/SPW50608.2020.00023},
  timestamp    = {Thu, 21 Sep 2023 16:11:10 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/SitawarinW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ZhangYMW20,
  author       = {Zhanyuan Zhang and
                  Benson Yuan and
                  Michael McCoyd and
                  David A. Wagner},
  title        = {Clipped BagNet: Defending Against Sticker Attacks with Clipped Bag-of-features},
  booktitle    = {2020 {IEEE} Security and Privacy Workshops, {SP} Workshops, San Francisco,
                  CA, USA, May 21, 2020},
  pages        = {55--61},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SPW50608.2020.00026},
  doi          = {10.1109/SPW50608.2020.00026},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/ZhangYMW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2003-06559,
  author       = {Chawin Sitawarin and
                  David A. Wagner},
  title        = {Minimum-Norm Adversarial Examples on {KNN} and KNN-Based Models},
  journal      = {CoRR},
  volume       = {abs/2003.06559},
  year         = {2020},
  url          = {https://arxiv.org/abs/2003.06559},
  eprinttype    = {arXiv},
  eprint       = {2003.06559},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2003-06559.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2003-09347,
  author       = {Chawin Sitawarin and
                  Supriyo Chakraborty and
                  David A. Wagner},
  title        = {Improving Adversarial Robustness Through Progressive Hardening},
  journal      = {CoRR},
  volume       = {abs/2003.09347},
  year         = {2020},
  url          = {https://arxiv.org/abs/2003.09347},
  eprinttype    = {arXiv},
  eprint       = {2003.09347},
  timestamp    = {Tue, 24 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2003-09347.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2004-13799,
  author       = {Michael McCoyd and
                  Won Park and
                  Steven Chen and
                  Neil Shah and
                  Ryan Roggenkemper and
                  Minjune Hwang and
                  Jason Xinyu Liu and
                  David A. Wagner},
  title        = {Minority Reports Defense: Defending Against Adversarial Patches},
  journal      = {CoRR},
  volume       = {abs/2004.13799},
  year         = {2020},
  url          = {https://arxiv.org/abs/2004.13799},
  eprinttype    = {arXiv},
  eprint       = {2004.13799},
  timestamp    = {Sat, 02 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2004-13799.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-14030,
  author       = {Neil Shah and
                  Grant Ho and
                  Marco Schweighauser and
                  M. H. Afifi and
                  Asaf Cidon and
                  David A. Wagner},
  title        = {A Large-Scale Analysis of Attacker Activity in Compromised Enterprise
                  Accounts},
  journal      = {CoRR},
  volume       = {abs/2007.14030},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.14030},
  eprinttype    = {arXiv},
  eprint       = {2007.14030},
  timestamp    = {Mon, 03 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-14030.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2011-09719,
  author       = {Chawin Sitawarin and
                  Evgenios M. Kornaropoulos and
                  Dawn Song and
                  David A. Wagner},
  title        = {Adversarial Examples for k-Nearest Neighbor Classifiers Based on Higher-Order
                  Voronoi Diagrams},
  journal      = {CoRR},
  volume       = {abs/2011.09719},
  year         = {2020},
  url          = {https://arxiv.org/abs/2011.09719},
  eprinttype    = {arXiv},
  eprint       = {2011.09719},
  timestamp    = {Wed, 25 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2011-09719.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/MalkinDTWEW19,
  author       = {Nathan Malkin and
                  Joe Deatrick and
                  Allen Tong and
                  Primal Wijesekera and
                  Serge Egelman and
                  David A. Wagner},
  title        = {Privacy Attitudes of Smart Speaker Users},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2019},
  number       = {4},
  pages        = {250--271},
  year         = {2019},
  url          = {https://doi.org/10.2478/popets-2019-0068},
  doi          = {10.2478/POPETS-2019-0068},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/popets/MalkinDTWEW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/MalkinEW19,
  author       = {Nathan Malkin and
                  Serge Egelman and
                  David A. Wagner},
  editor       = {Marco Carvalho and
                  Wolter Pieters and
                  Elizabeth Stobert},
  title        = {Privacy controls for always-listening devices},
  booktitle    = {{NSPW} '19: New Security Paradigms Workshop, San Carlos, Costa Rica,
                  September 23-26, 2019},
  pages        = {78--91},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3368860.3368867},
  doi          = {10.1145/3368860.3368867},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/MalkinEW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Sitawarin019,
  author       = {Chawin Sitawarin and
                  David A. Wagner},
  title        = {On the Robustness of Deep K-Nearest Neighbors},
  booktitle    = {2019 {IEEE} Security and Privacy Workshops, {SP} Workshops 2019, San
                  Francisco, CA, USA, May 19-23, 2019},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SPW.2019.00014},
  doi          = {10.1109/SPW.2019.00014},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/Sitawarin019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/HoCGSPSV019,
  author       = {Grant Ho and
                  Asaf Cidon and
                  Lior Gavish and
                  Marco Schweighauser and
                  Vern Paxson and
                  Stefan Savage and
                  Geoffrey M. Voelker and
                  David A. Wagner},
  editor       = {Nadia Heninger and
                  Patrick Traynor},
  title        = {Detecting and Characterizing Lateral Phishing at Scale},
  booktitle    = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara,
                  CA, USA, August 14-16, 2019},
  pages        = {1273--1290},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/usenixsecurity19/presentation/ho},
  timestamp    = {Mon, 01 Feb 2021 08:43:12 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/HoCGSPSV019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1903-08333,
  author       = {Chawin Sitawarin and
                  David A. Wagner},
  title        = {On the Robustness of Deep K-Nearest Neighbors},
  journal      = {CoRR},
  volume       = {abs/1903.08333},
  year         = {2019},
  url          = {http://arxiv.org/abs/1903.08333},
  eprinttype    = {arXiv},
  eprint       = {1903.08333},
  timestamp    = {Wed, 03 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1903-08333.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1907-05587,
  author       = {Steven Chen and
                  Nicholas Carlini and
                  David A. Wagner},
  title        = {Stateful Detection of Black-Box Adversarial Attacks},
  journal      = {CoRR},
  volume       = {abs/1907.05587},
  year         = {2019},
  url          = {http://arxiv.org/abs/1907.05587},
  eprinttype    = {arXiv},
  eprint       = {1907.05587},
  timestamp    = {Wed, 17 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1907-05587.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1910-00790,
  author       = {Grant Ho and
                  Asaf Cidon and
                  Lior Gavish and
                  Marco Schweighauser and
                  Vern Paxson and
                  Stefan Savage and
                  Geoffrey M. Voelker and
                  David A. Wagner},
  title        = {Detecting and Characterizing Lateral Phishing at Scale},
  journal      = {CoRR},
  volume       = {abs/1910.00790},
  year         = {2019},
  url          = {http://arxiv.org/abs/1910.00790},
  eprinttype    = {arXiv},
  eprint       = {1910.00790},
  timestamp    = {Fri, 04 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1910-00790.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/WijesekeraBTREW18,
  author       = {Primal Wijesekera and
                  Arjun Baokar and
                  Lynn Tsai and
                  Joel Reardon and
                  Serge Egelman and
                  David A. Wagner and
                  Konstantin Beznosov},
  title        = {Dynamically Regulating Mobile Application Permissions},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {1},
  pages        = {64--71},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.1331031},
  doi          = {10.1109/MSP.2018.1331031},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/WijesekeraBTREW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/WijesekeraRRTCG18,
  author       = {Primal Wijesekera and
                  Joel Reardon and
                  Irwin Reyes and
                  Lynn Tsai and
                  Jung{-}Wei Chen and
                  Nathan Good and
                  David A. Wagner and
                  Konstantin Beznosov and
                  Serge Egelman},
  editor       = {Regan L. Mandryk and
                  Mark Hancock and
                  Mark Perry and
                  Anna L. Cox},
  title        = {Contextualizing Privacy Decisions for Better Prediction (and Protection)},
  booktitle    = {Proceedings of the 2018 {CHI} Conference on Human Factors in Computing
                  Systems, {CHI} 2018, Montreal, QC, Canada, April 21-26, 2018},
  pages        = {268},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3173574.3173842},
  doi          = {10.1145/3173574.3173842},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/chi/WijesekeraRRTCG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/IncerTA018,
  author       = {Inigo Incer and
                  Michael Theodorides and
                  Sadia Afroz and
                  David A. Wagner},
  editor       = {Rakesh M. Verma and
                  Murat Kantarcioglu},
  title        = {Adversarially Robust Malware Detection Using Monotonic Classification},
  booktitle    = {Proceedings of the Fourth {ACM} International Workshop on Security
                  and Privacy Analytics, IWSPA@CODASPY 2018, Tempe, AZ, USA, March 19-21,
                  2018},
  pages        = {54--63},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3180445.3180449},
  doi          = {10.1145/3180445.3180449},
  timestamp    = {Wed, 28 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/IncerTA018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icml/AthalyeC018,
  author       = {Anish Athalye and
                  Nicholas Carlini and
                  David A. Wagner},
  editor       = {Jennifer G. Dy and
                  Andreas Krause},
  title        = {Obfuscated Gradients Give a False Sense of Security: Circumventing
                  Defenses to Adversarial Examples},
  booktitle    = {Proceedings of the 35th International Conference on Machine Learning,
                  {ICML} 2018, Stockholmsm{\"{a}}ssan, Stockholm, Sweden, July
                  10-15, 2018},
  series       = {Proceedings of Machine Learning Research},
  volume       = {80},
  pages        = {274--283},
  publisher    = {{PMLR}},
  year         = {2018},
  url          = {http://proceedings.mlr.press/v80/athalye18a.html},
  timestamp    = {Wed, 03 Apr 2019 18:17:30 +0200},
  biburl       = {https://dblp.org/rec/conf/icml/AthalyeC018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Carlini018,
  author       = {Nicholas Carlini and
                  David A. Wagner},
  title        = {Audio Adversarial Examples: Targeted Attacks on Speech-to-Text},
  booktitle    = {2018 {IEEE} Security and Privacy Workshops, {SP} Workshops 2018, San
                  Francisco, CA, USA, May 24, 2018},
  pages        = {1--7},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SPW.2018.00009},
  doi          = {10.1109/SPW.2018.00009},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/Carlini018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/McCoyd018,
  author       = {Michael McCoyd and
                  David A. Wagner},
  title        = {Background Class Defense Against Adversarial Examples},
  booktitle    = {2018 {IEEE} Security and Privacy Workshops, {SP} Workshops 2018, San
                  Francisco, CA, USA, May 24, 2018},
  pages        = {96--102},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SPW.2018.00023},
  doi          = {10.1109/SPW.2018.00023},
  timestamp    = {Wed, 08 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/McCoyd018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wimob/ChenPYW18,
  author       = {Steven Chen and
                  Won Park and
                  Joanna Yang and
                  David A. Wagner},
  title        = {Inferring Phone Location State},
  booktitle    = {14th International Conference on Wireless and Mobile Computing, Networking
                  and Communications, WiMob 2018, Limassol, Cyprus, October 15-17, 2018},
  pages        = {42--47},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/WiMOB.2018.8589190},
  doi          = {10.1109/WIMOB.2018.8589190},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/wimob/ChenPYW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1801-01944,
  author       = {Nicholas Carlini and
                  David A. Wagner},
  title        = {Audio Adversarial Examples: Targeted Attacks on Speech-to-Text},
  journal      = {CoRR},
  volume       = {abs/1801.01944},
  year         = {2018},
  url          = {http://arxiv.org/abs/1801.01944},
  eprinttype    = {arXiv},
  eprint       = {1801.01944},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1801-01944.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1802-00420,
  author       = {Anish Athalye and
                  Nicholas Carlini and
                  David A. Wagner},
  title        = {Obfuscated Gradients Give a False Sense of Security: Circumventing
                  Defenses to Adversarial Examples},
  journal      = {CoRR},
  volume       = {abs/1802.00420},
  year         = {2018},
  url          = {http://arxiv.org/abs/1802.00420},
  eprinttype    = {arXiv},
  eprint       = {1802.00420},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1802-00420.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/LeeFMIEW17,
  author       = {Linda Naeun Lee and
                  David Fifield and
                  Nathan Malkin and
                  Ganesh Iyer and
                  Serge Egelman and
                  David A. Wagner},
  title        = {A Usability Evaluation of Tor Launcher},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2017},
  number       = {3},
  pages        = {90},
  year         = {2017},
  url          = {https://doi.org/10.1515/popets-2017-0030},
  doi          = {10.1515/POPETS-2017-0030},
  timestamp    = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/popets/LeeFMIEW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/000117,
  author       = {David A. Wagner},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {Security and Machine Learning},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {1},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3134108},
  doi          = {10.1145/3133956.3134108},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/000117.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Carlini017,
  author       = {Nicholas Carlini and
                  David A. Wagner},
  editor       = {Bhavani Thuraisingham and
                  Battista Biggio and
                  David Mandell Freeman and
                  Brad Miller and
                  Arunesh Sinha},
  title        = {Adversarial Examples Are Not Easily Detected: Bypassing Ten Detection
                  Methods},
  booktitle    = {Proceedings of the 10th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec@CCS 2017, Dallas, TX, USA, November 3, 2017},
  pages        = {3--14},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3128572.3140444},
  doi          = {10.1145/3128572.3140444},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/Carlini017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/Theodorides017,
  author       = {Michael Theodorides and
                  David A. Wagner},
  title        = {Breaking active-set backward-edge {CFI}},
  booktitle    = {2017 {IEEE} International Symposium on Hardware Oriented Security
                  and Trust, {HOST} 2017, McLean, VA, USA, May 1-5, 2017},
  pages        = {85--89},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/HST.2017.7951803},
  doi          = {10.1109/HST.2017.7951803},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/Theodorides017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/promise/Thompson017,
  author       = {Christopher Thompson and
                  David A. Wagner},
  editor       = {Burak Turhan and
                  David Bowes and
                  Emad Shihab},
  title        = {A Large-Scale Study of Modern Code Review and Security in Open Source
                  Projects},
  booktitle    = {Proceedings of the 13th International Conference on Predictive Models
                  and Data Analytics in Software Engineering, {PROMISE} 2017, Toronto,
                  Canada, November 8, 2017},
  pages        = {83--92},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3127005.3127014},
  doi          = {10.1145/3127005.3127014},
  timestamp    = {Wed, 30 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/promise/Thompson017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/TsaiWRRE0GC17,
  author       = {Lynn Tsai and
                  Primal Wijesekera and
                  Joel Reardon and
                  Irwin Reyes and
                  Serge Egelman and
                  David A. Wagner and
                  Nathan Good and
                  Jung{-}Wei Chen},
  title        = {Turtle Guard: Helping Android Users Apply Contextual Privacy Preferences},
  booktitle    = {Thirteenth Symposium on Usable Privacy and Security, {SOUPS} 2017,
                  Santa Clara, CA, USA, July 12-14, 2017},
  pages        = {145--162},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/soups2017/technical-sessions/presentation/tsai},
  timestamp    = {Wed, 19 Jul 2017 17:13:43 +0200},
  biburl       = {https://dblp.org/rec/conf/soups/TsaiWRRE0GC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Carlini017,
  author       = {Nicholas Carlini and
                  David A. Wagner},
  title        = {Towards Evaluating the Robustness of Neural Networks},
  booktitle    = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose,
                  CA, USA, May 22-26, 2017},
  pages        = {39--57},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SP.2017.49},
  doi          = {10.1109/SP.2017.49},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/Carlini017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/WijesekeraBTREW17,
  author       = {Primal Wijesekera and
                  Arjun Baokar and
                  Lynn Tsai and
                  Joel Reardon and
                  Serge Egelman and
                  David A. Wagner and
                  Konstantin Beznosov},
  title        = {The Feasibility of Dynamically Granted Permissions: Aligning Mobile
                  Privacy with User Preferences},
  booktitle    = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose,
                  CA, USA, May 22-26, 2017},
  pages        = {1077--1093},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SP.2017.51},
  doi          = {10.1109/SP.2017.51},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/WijesekeraBTREW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/HoSJP017,
  author       = {Grant Ho and
                  Aashish Sharma and
                  Mobin Javed and
                  Vern Paxson and
                  David A. Wagner},
  editor       = {Engin Kirda and
                  Thomas Ristenpart},
  title        = {Detecting Credential Spearphishing in Enterprise Settings},
  booktitle    = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver,
                  BC, Canada, August 16-18, 2017},
  pages        = {469--485},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/ho},
  timestamp    = {Mon, 01 Feb 2021 08:42:59 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/HoSJP017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/DangM017,
  author       = {Thurston H. Y. Dang and
                  Petros Maniatis and
                  David A. Wagner},
  editor       = {Engin Kirda and
                  Thomas Ristenpart},
  title        = {Oscar: {A} Practical Page-Permissions-Based Scheme for Thwarting Dangling
                  Pointers},
  booktitle    = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver,
                  BC, Canada, August 16-18, 2017},
  pages        = {815--832},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/dang},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/DangM017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/WijesekeraBTREW17,
  author       = {Primal Wijesekera and
                  Arjun Baokar and
                  Lynn Tsai and
                  Joel Reardon and
                  Serge Egelman and
                  David A. Wagner and
                  Konstantin Beznosov},
  title        = {The Feasibility of Dynamically Granted Permissions: Aligning Mobile
                  Privacy with User Preferences},
  journal      = {CoRR},
  volume       = {abs/1703.02090},
  year         = {2017},
  url          = {http://arxiv.org/abs/1703.02090},
  eprinttype    = {arXiv},
  eprint       = {1703.02090},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/WijesekeraBTREW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/CarliniW17,
  author       = {Nicholas Carlini and
                  David A. Wagner},
  title        = {Adversarial Examples Are Not Easily Detected: Bypassing Ten Detection
                  Methods},
  journal      = {CoRR},
  volume       = {abs/1705.07263},
  year         = {2017},
  url          = {http://arxiv.org/abs/1705.07263},
  eprinttype    = {arXiv},
  eprint       = {1705.07263},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/CarliniW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1711-08478,
  author       = {Nicholas Carlini and
                  David A. Wagner},
  title        = {MagNet and "Efficient Defenses Against Adversarial Attacks"
                  are Not Robust to Adversarial Examples},
  journal      = {CoRR},
  volume       = {abs/1711.08478},
  year         = {2017},
  url          = {http://arxiv.org/abs/1711.08478},
  eprinttype    = {arXiv},
  eprint       = {1711.08478},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1711-08478.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/Wagner16,
  author       = {David A. Wagner},
  title        = {Fairness and the coin flip: technical perspective},
  journal      = {Commun. {ACM}},
  volume       = {59},
  number       = {4},
  pages        = {75},
  year         = {2016},
  url          = {https://doi.org/10.1145/2898429},
  doi          = {10.1145/2898429},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/Wagner16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ThompsonW16,
  author       = {Christopher Thompson and
                  David A. Wagner},
  editor       = {Long Lu and
                  Mohammad Mannan},
  title        = {Securing Recognizers for Rich Video Applications},
  booktitle    = {Proceedings of the 6th Workshop on Security and Privacy in Smartphones
                  and Mobile Devices, SPSM@CCS 2016, Vienna, Austria, October 24, 2016},
  pages        = {53--62},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2994461},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ThompsonW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HoLMHSW16,
  author       = {Grant Ho and
                  Derek Leung and
                  Pratyush Mishra and
                  Ashkan Hosseini and
                  Dawn Song and
                  David A. Wagner},
  editor       = {Xiaofeng Chen and
                  XiaoFeng Wang and
                  Xinyi Huang},
  title        = {Smart Locks: Lessons for Securing Commodity Internet of Things Devices},
  booktitle    = {Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016},
  pages        = {461--472},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2897845.2897886},
  doi          = {10.1145/2897845.2897886},
  timestamp    = {Mon, 25 Apr 2022 08:42:03 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/HoLMHSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BeekmanMW16,
  author       = {Jethro G. Beekman and
                  John L. Manferdelli and
                  David A. Wagner},
  editor       = {Xiaofeng Chen and
                  XiaoFeng Wang and
                  Xinyi Huang},
  title        = {Attestation Transparency: Building secure Internet services for legacy
                  clients},
  booktitle    = {Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016},
  pages        = {687--698},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2897845.2897895},
  doi          = {10.1145/2897845.2897895},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BeekmanMW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/MalkinEW16,
  author       = {Nathan Malkin and
                  Serge Egelman and
                  David A. Wagner},
  title        = {Recovering High-Value Secrets with {SGX} and Social Authentication},
  booktitle    = {Who Are You?! Adventures in Authentication, WAY@SOUPS 2016, Denver,
                  CO, USA, June 22, 2016},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/soups2016/workshop-program/way2016/presentation/recovering-high-value-secrets-sgx-and},
  timestamp    = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/soups/MalkinEW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/CarliniMVZSSWZ16,
  author       = {Nicholas Carlini and
                  Pratyush Mishra and
                  Tavish Vaidya and
                  Yuankai Zhang and
                  Micah Sherr and
                  Clay Shields and
                  David A. Wagner and
                  Wenchao Zhou},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {Hidden Voice Commands},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {513--530},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/carlini},
  timestamp    = {Mon, 15 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/CarliniMVZSSWZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/CarliniW16,
  author       = {Nicholas Carlini and
                  David A. Wagner},
  title        = {Defensive Distillation is Not Robust to Adversarial Examples},
  journal      = {CoRR},
  volume       = {abs/1607.04311},
  year         = {2016},
  url          = {http://arxiv.org/abs/1607.04311},
  eprinttype    = {arXiv},
  eprint       = {1607.04311},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/CarliniW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/McCoydW16,
  author       = {Michael McCoyd and
                  David A. Wagner},
  title        = {Spoofing 2D Face Detection: Machines See People Who Aren't There},
  journal      = {CoRR},
  volume       = {abs/1608.02128},
  year         = {2016},
  url          = {http://arxiv.org/abs/1608.02128},
  eprinttype    = {arXiv},
  eprint       = {1608.02128},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/McCoydW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/CarliniW16a,
  author       = {Nicholas Carlini and
                  David A. Wagner},
  title        = {Towards Evaluating the Robustness of Neural Networks},
  journal      = {CoRR},
  volume       = {abs/1608.04644},
  year         = {2016},
  url          = {http://arxiv.org/abs/1608.04644},
  eprinttype    = {arXiv},
  eprint       = {1608.04644},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/CarliniW16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DangMW15,
  author       = {Thurston H. Y. Dang and
                  Petros Maniatis and
                  David A. Wagner},
  editor       = {Feng Bao and
                  Steven Miller and
                  Jianying Zhou and
                  Gail{-}Joon Ahn},
  title        = {The Performance Cost of Shadow Stacks and Stack Canaries},
  booktitle    = {Proceedings of the 10th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17,
                  2015},
  pages        = {555--566},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2714576.2714635},
  doi          = {10.1145/2714576.2714635},
  timestamp    = {Thu, 20 Oct 2022 10:45:07 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/DangMW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/PortnoffLEMLW15,
  author       = {Rebecca S. Portnoff and
                  Linda Naeun Lee and
                  Serge Egelman and
                  Pratyush Mishra and
                  Derek Leung and
                  David A. Wagner},
  editor       = {Bo Begole and
                  Jinwoo Kim and
                  Kori Inkpen and
                  Woontack Woo},
  title        = {Somebody's Watching Me?: Assessing the Effectiveness of Webcam Indicator
                  Lights},
  booktitle    = {Proceedings of the 33rd Annual {ACM} Conference on Human Factors in
                  Computing Systems, {CHI} 2015, Seoul, Republic of Korea, April 18-23,
                  2015},
  pages        = {1649--1658},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2702123.2702164},
  doi          = {10.1145/2702123.2702164},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/chi/PortnoffLEMLW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/CarliniBPWG15,
  author       = {Nicholas Carlini and
                  Antonio Barresi and
                  Mathias Payer and
                  David A. Wagner and
                  Thomas R. Gross},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {Control-Flow Bending: On the Effectiveness of Control-Flow Integrity},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {161--176},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/carlini},
  timestamp    = {Mon, 01 Feb 2021 08:42:57 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/CarliniBPWG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/WijesekeraBHEWB15,
  author       = {Primal Wijesekera and
                  Arjun Baokar and
                  Ashkan Hosseini and
                  Serge Egelman and
                  David A. Wagner and
                  Konstantin Beznosov},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {Android Permissions Remystified: {A} Field Study on Contextual Integrity},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {499--514},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/wijesekera},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/WijesekeraBHEWB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/WijesekeraBHEWB15,
  author       = {Primal Wijesekera and
                  Arjun Baokar and
                  Ashkan Hosseini and
                  Serge Egelman and
                  David A. Wagner and
                  Konstantin Beznosov},
  title        = {Android Permissions Remystified: {A} Field Study on Contextual Integrity},
  journal      = {CoRR},
  volume       = {abs/1504.03747},
  year         = {2015},
  url          = {http://arxiv.org/abs/1504.03747},
  eprinttype    = {arXiv},
  eprint       = {1504.03747},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/WijesekeraBHEWB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/LeeELW15,
  author       = {Linda Naeun Lee and
                  Serge Egelman and
                  Joong Hwa Lee and
                  David A. Wagner},
  title        = {Risk Perceptions for Wearable Devices},
  journal      = {CoRR},
  volume       = {abs/1504.05694},
  year         = {2015},
  url          = {http://arxiv.org/abs/1504.05694},
  eprinttype    = {arXiv},
  eprint       = {1504.05694},
  timestamp    = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/LeeELW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/Wagner14,
  author       = {David A. Wagner},
  title        = {Developing Social Capital in Online Communities: The Challenge of
                  Fluidity},
  booktitle    = {20th Americas Conference on Information Systems, {AMCIS} 2014, Savannah,
                  Georgia, USA, August 7-9, 2014},
  publisher    = {Association for Information Systems},
  year         = {2014},
  url          = {http://aisel.aisnet.org/amcis2014/SocioTechnicalIssues/GeneralPresentations/8},
  timestamp    = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/amcis/Wagner14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/EgelmanJPLCW14,
  author       = {Serge Egelman and
                  Sakshi Jain and
                  Rebecca S. Portnoff and
                  Kerwell Liao and
                  Sunny Consolvo and
                  David A. Wagner},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {Are You Ready to Lock?},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {750--761},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2660273},
  doi          = {10.1145/2660267.2660273},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/EgelmanJPLCW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/TanNTNTEW14,
  author       = {Joshua Tan and
                  Khanh Nguyen and
                  Michael Theodorides and
                  Heidi Negr{\'{o}}n{-}Arroyo and
                  Christopher Thompson and
                  Serge Egelman and
                  David A. Wagner},
  editor       = {Matt Jones and
                  Philippe A. Palanque and
                  Albrecht Schmidt and
                  Tovi Grossman},
  title        = {The effect of developer-specified explanations for permission requests
                  on smartphone user behavior},
  booktitle    = {{CHI} Conference on Human Factors in Computing Systems, CHI'14, Toronto,
                  ON, Canada - April 26 - May 01, 2014},
  pages        = {91--100},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2556288.2557400},
  doi          = {10.1145/2556288.2557400},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/chi/TanNTNTEW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/CarliniW14,
  author       = {Nicholas Carlini and
                  David A. Wagner},
  editor       = {Kevin Fu and
                  Jaeyeon Jung},
  title        = {{ROP} is Still Dangerous: Breaking Modern Defenses},
  booktitle    = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA,
                  USA, August 20-22, 2014},
  pages        = {385--399},
  publisher    = {{USENIX} Association},
  year         = {2014},
  url          = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/carlini},
  timestamp    = {Mon, 01 Feb 2021 08:43:04 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/CarliniW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccnc/HaW13,
  author       = {Elizabeth Ha and
                  David A. Wagner},
  title        = {Do Android users write about electric sheep? Examining consumer reviews
                  in Google Play},
  booktitle    = {10th {IEEE} Consumer Communications and Networking Conference, {CCNC}
                  2013, Las Vegas, NV, USA, January 11-14, 2013},
  pages        = {149--157},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CCNC.2013.6488439},
  doi          = {10.1109/CCNC.2013.6488439},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ccnc/HaW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/essos/EdmundsonHRFMW13,
  author       = {Anne Edmundson and
                  Brian Holtkamp and
                  Emanuel Rivera and
                  Matthew Finifter and
                  Adrian Mettler and
                  David A. Wagner},
  editor       = {Jan J{\"{u}}rjens and
                  Benjamin Livshits and
                  Riccardo Scandariato},
  title        = {An Empirical Study on the Effectiveness of Security Code Review},
  booktitle    = {Engineering Secure Software and Systems - 5th International Symposium,
                  ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7781},
  pages        = {197--212},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36563-8\_14},
  doi          = {10.1007/978-3-642-36563-8\_14},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/essos/EdmundsonHRFMW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/memocode/SturtonSDJMTMSW13,
  author       = {Cynthia Sturton and
                  Rohit Sinha and
                  Thurston H. Y. Dang and
                  Sakshi Jain and
                  Michael McCoyd and
                  Wei Yang Tan and
                  Petros Maniatis and
                  Sanjit A. Seshia and
                  David A. Wagner},
  title        = {Symbolic software model validation},
  booktitle    = {11th {ACM/IEEE} International Conference on Formal Methods and Models
                  for Codesign, {MEMCODE} 2013, Portland, OR, USA, October 18-20, 2013},
  pages        = {97--108},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/6670946/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/memocode/SturtonSDJMTMSW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/ThompsonJEWK13,
  author       = {Christopher Thompson and
                  Maritza L. Johnson and
                  Serge Egelman and
                  David A. Wagner and
                  Jennifer King},
  editor       = {Lujo Bauer and
                  Konstantin Beznosov and
                  Lorrie Faith Cranor},
  title        = {When it's better to ask forgiveness than get permission: attribution
                  mechanisms for smartphone resources},
  booktitle    = {Symposium On Usable Privacy and Security, {SOUPS} '13, Newcastle,
                  United Kingdom, July 24-26, 2013},
  pages        = {1:1--1:14},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2501604.2501605},
  doi          = {10.1145/2501604.2501605},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/soups/ThompsonJEWK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/FinifterAW13,
  author       = {Matthew Finifter and
                  Devdatta Akhawe and
                  David A. Wagner},
  editor       = {Samuel T. King},
  title        = {An Empirical Study of Vulnerability Rewards Programs},
  booktitle    = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC,
                  USA, August 14-16, 2013},
  pages        = {273--288},
  publisher    = {{USENIX} Association},
  year         = {2013},
  url          = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/presentation/finifter},
  timestamp    = {Mon, 01 Feb 2021 08:42:56 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/FinifterAW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KimCCYWW13,
  author       = {Eric Kim and
                  Nicholas Carlini and
                  Andrew Chang and
                  George Yiu and
                  Kai Wang and
                  David A. Wagner},
  title        = {Improved Support for Machine-assisted Ballot-level Audits},
  booktitle    = {2013 Electronic Voting Technology Workshop / Workshop on Trustworthy
                  Elections, {EVT/WOTE} '13, Washington, D.C., USA, August 12-13, 2013},
  publisher    = {{USENIX} Association},
  year         = {2013},
  url          = {https://www.usenix.org/conference/evtwote13/workshop-program/presentation/kim},
  timestamp    = {Mon, 22 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/KimCCYWW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ChinW13,
  author       = {Erika Chin and
                  David A. Wagner},
  editor       = {Yongdae Kim and
                  Heejo Lee and
                  Adrian Perrig},
  title        = {Bifocals: Analyzing WebView Vulnerabilities in Android Applications},
  booktitle    = {Information Security Applications - 14th International Workshop, {WISA}
                  2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8267},
  pages        = {138--159},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-05149-9\_9},
  doi          = {10.1007/978-3-319-05149-9\_9},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ChinW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/daglib/p/EgelmanFW13,
  author       = {Serge Egelman and
                  Adrienne Porter Felt and
                  David A. Wagner},
  editor       = {Rainer B{\"{o}}hme},
  title        = {Choice Architecture and Smartphone Privacy: There's a Price for That},
  booktitle    = {The Economics of Information Security and Privacy},
  pages        = {211--236},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39498-0\_10},
  doi          = {10.1007/978-3-642-39498-0\_10},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/p/EgelmanFW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/StarkW12,
  author       = {Philip B. Stark and
                  David A. Wagner},
  title        = {Evidence-Based Elections},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {10},
  number       = {5},
  pages        = {33--41},
  year         = {2012},
  url          = {https://doi.org/10.1109/MSP.2012.62},
  doi          = {10.1109/MSP.2012.62},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/StarkW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FeltEW12,
  author       = {Adrienne Porter Felt and
                  Serge Egelman and
                  David A. Wagner},
  editor       = {Ting Yu and
                  William Enck and
                  Xuxian Jiang},
  title        = {I've got 99 problems, but vibration ain't one: a survey of smartphone
                  users' concerns},
  booktitle    = {SPSM'12, Proceedings of the Workshop on Security and Privacy in Smartphones
                  and Mobile Devices, Co-located with {CCS} 2012, October 19, 2012,
                  Raleigh, NC, {USA}},
  pages        = {33--44},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2381934.2381943},
  doi          = {10.1145/2381934.2381943},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/FeltEW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FisherDW12,
  author       = {Drew Fisher and
                  Leah Dorner and
                  David A. Wagner},
  editor       = {Ting Yu and
                  William Enck and
                  Xuxian Jiang},
  title        = {Short paper: location privacy: user behavior in the field},
  booktitle    = {SPSM'12, Proceedings of the Workshop on Security and Privacy in Smartphones
                  and Mobile Devices, Co-located with {CCS} 2012, October 19, 2012,
                  Raleigh, NC, {USA}},
  pages        = {51--56},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2381934.2381945},
  doi          = {10.1145/2381934.2381945},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/FisherDW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KantolaCHW12,
  author       = {David Kantola and
                  Erika Chin and
                  Warren He and
                  David A. Wagner},
  editor       = {Ting Yu and
                  William Enck and
                  Xuxian Jiang},
  title        = {Reducing attack surfaces for intra-application communication in android},
  booktitle    = {SPSM'12, Proceedings of the Workshop on Security and Privacy in Smartphones
                  and Mobile Devices, Co-located with {CCS} 2012, October 19, 2012,
                  Raleigh, NC, {USA}},
  pages        = {69--80},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2381934.2381948},
  doi          = {10.1145/2381934.2381948},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KantolaCHW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PearceFNW12,
  author       = {Paul Pearce and
                  Adrienne Porter Felt and
                  Gabriel Nunez and
                  David A. Wagner},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {AdDroid: privilege separation for applications and advertisers in
                  Android},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {71--72},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414498},
  doi          = {10.1145/2414456.2414498},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/PearceFNW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fmcad/SinhaSMSW12,
  author       = {Rohit Sinha and
                  Cynthia Sturton and
                  Petros Maniatis and
                  Sanjit A. Seshia and
                  David A. Wagner},
  editor       = {Gianpiero Cabodi and
                  Satnam Singh},
  title        = {Verification with small and short worlds},
  booktitle    = {Formal Methods in Computer-Aided Design, {FMCAD} 2012, Cambridge,
                  UK, October 22-25, 2012},
  pages        = {68--77},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6462557/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fmcad/SinhaSMSW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/ChinFSW12,
  author       = {Erika Chin and
                  Adrienne Porter Felt and
                  Vyas Sekar and
                  David A. Wagner},
  editor       = {Lorrie Faith Cranor},
  title        = {Measuring user confidence in smartphone security and privacy},
  booktitle    = {Symposium On Usable Privacy and Security, {SOUPS} '12, Washington,
                  DC, {USA} - July 11 - 13, 2012},
  pages        = {1},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2335356.2335358},
  doi          = {10.1145/2335356.2335358},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/soups/ChinFSW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/FeltHEHCW12,
  author       = {Adrienne Porter Felt and
                  Elizabeth Ha and
                  Serge Egelman and
                  Ariel Haney and
                  Erika Chin and
                  David A. Wagner},
  editor       = {Lorrie Faith Cranor},
  title        = {Android permissions: user attention, comprehension, and behavior},
  booktitle    = {Symposium On Usable Privacy and Security, {SOUPS} '12, Washington,
                  DC, {USA} - July 11 - 13, 2012},
  pages        = {3},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2335356.2335360},
  doi          = {10.1145/2335356.2335360},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/soups/FeltHEHCW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BaxterEOQRSW12,
  author       = {Patrick Baxter and
                  Anne Edmundson and
                  Keishla Ortiz and
                  Ana Maria Quevedo and
                  Samuel Rodr{\'{\i}}guez and
                  Cynthia Sturton and
                  David A. Wagner},
  editor       = {J. Alex Halderman and
                  Olivier Pereira},
  title        = {Automated Analysis of Election Audit Logs},
  booktitle    = {2012 Electronic Voting Technology Workshop / Workshop on Trustworthy
                  Elections, {EVT/WOTE} '12, Bellevue, WA, USA, August 6-7, 2012},
  publisher    = {{USENIX} Association},
  year         = {2012},
  url          = {https://www.usenix.org/conference/evtwote12/workshop-program/presentation/baxter},
  timestamp    = {Mon, 01 Feb 2021 08:43:08 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/BaxterEOQRSW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/CarliniFW12,
  author       = {Nicholas Carlini and
                  Adrienne Porter Felt and
                  David A. Wagner},
  editor       = {Tadayoshi Kohno},
  title        = {An Evaluation of the Google Chrome Extension Security Architecture},
  booktitle    = {Proceedings of the 21th {USENIX} Security Symposium, Bellevue, WA,
                  USA, August 8-10, 2012},
  pages        = {97--111},
  publisher    = {{USENIX} Association},
  year         = {2012},
  url          = {https://www.usenix.org/conference/usenixsecurity12/technical-sessions/presentation/carlini},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/CarliniFW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/FeltEFAW12,
  author       = {Adrienne Porter Felt and
                  Serge Egelman and
                  Matthew Finifter and
                  Devdatta Akhawe and
                  David A. Wagner},
  editor       = {Patrick Traynor},
  title        = {How to Ask for Permission},
  booktitle    = {7th {USENIX} Workshop on Hot Topics in Security, HotSec'12, Bellevue,
                  WA, USA, August 7, 2012},
  publisher    = {{USENIX} Association},
  year         = {2012},
  url          = {https://www.usenix.org/conference/hotsec12/workshop-program/presentation/felt},
  timestamp    = {Mon, 01 Feb 2021 08:43:14 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/FeltEFAW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/WangCKMNW12,
  author       = {Kai Wang and
                  Nicholas Carlini and
                  Eric Kim and
                  Ivan Motyashov and
                  Daniel Nguyen and
                  David A. Wagner},
  editor       = {J. Alex Halderman and
                  Olivier Pereira},
  title        = {Operator-Assisted Tabulation of Optical Scan Ballots},
  booktitle    = {2012 Electronic Voting Technology Workshop / Workshop on Trustworthy
                  Elections, {EVT/WOTE} '12, Bellevue, WA, USA, August 6-7, 2012},
  publisher    = {{USENIX} Association},
  year         = {2012},
  url          = {https://www.usenix.org/conference/evtwote12/workshop-program/presentation/wang\_kai},
  timestamp    = {Mon, 22 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/WangCKMNW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/weis/EgelmanFW12,
  author       = {Serge Egelman and
                  Adrienne Porter Felt and
                  David A. Wagner},
  title        = {Choice Architecture and Smartphone Privacy: There's a Price for That},
  booktitle    = {11th Annual Workshop on the Economics of Information Security, {WEIS}
                  2012, Berlin, Germany, 25-26 June, 2012},
  year         = {2012},
  url          = {http://weis2012.econinfosec.org/papers/Egelman\_WEIS2012.pdf},
  timestamp    = {Thu, 22 Jul 2021 16:15:45 +0200},
  biburl       = {https://dblp.org/rec/conf/weis/EgelmanFW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/LiskovRW11,
  author       = {Moses D. Liskov and
                  Ronald L. Rivest and
                  David A. Wagner},
  title        = {Tweakable Block Ciphers},
  journal      = {J. Cryptol.},
  volume       = {24},
  number       = {3},
  pages        = {588--613},
  year         = {2011},
  url          = {https://doi.org/10.1007/s00145-010-9073-y},
  doi          = {10.1007/S00145-010-9073-Y},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/LiskovRW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FeltFCHW11,
  author       = {Adrienne Porter Felt and
                  Matthew Finifter and
                  Erika Chin and
                  Steve Hanna and
                  David A. Wagner},
  editor       = {Xuxian Jiang and
                  Amiya Bhattacharya and
                  Partha Dasgupta and
                  William Enck},
  title        = {A survey of mobile malware in the wild},
  booktitle    = {SPSM'11, Proceedings of the 1st {ACM} Workshop Security and Privacy
                  in Smartphones and Mobile Devices, Co-located with {CCS} 2011, October
                  17, 2011, Chicago, IL, {USA}},
  pages        = {3--14},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046614.2046618},
  doi          = {10.1145/2046614.2046618},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/FeltFCHW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FeltFWW11,
  author       = {Adrienne Porter Felt and
                  Matthew Finifter and
                  Joel Weinberger and
                  David A. Wagner},
  editor       = {Bruce S. N. Cheung and
                  Lucas Chi Kwong Hui and
                  Ravi S. Sandhu and
                  Duncan S. Wong},
  title        = {Diesel: applying privilege separation to database access},
  booktitle    = {Proceedings of the 6th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2011, Hong Kong, China, March 22-24,
                  2011},
  pages        = {416--422},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1966913.1966971},
  doi          = {10.1145/1966913.1966971},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/FeltFWW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FeltCHSW11,
  author       = {Adrienne Porter Felt and
                  Erika Chin and
                  Steve Hanna and
                  Dawn Song and
                  David A. Wagner},
  editor       = {Yan Chen and
                  George Danezis and
                  Vitaly Shmatikov},
  title        = {Android permissions demystified},
  booktitle    = {Proceedings of the 18th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages        = {627--638},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046707.2046779},
  doi          = {10.1145/2046707.2046779},
  timestamp    = {Tue, 10 Nov 2020 19:56:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/FeltCHSW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisys/ChinFGW11,
  author       = {Erika Chin and
                  Adrienne Porter Felt and
                  Kate Greenwood and
                  David A. Wagner},
  editor       = {Ashok K. Agrawala and
                  Mark D. Corner and
                  David Wetherall},
  title        = {Analyzing inter-application communication in Android},
  booktitle    = {Proceedings of the 9th International Conference on Mobile Systems,
                  Applications, and Services (MobiSys 2011), Bethesda, MD, USA, June
                  28 - July 01, 2011},
  pages        = {239--252},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1999995.2000018},
  doi          = {10.1145/1999995.2000018},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobisys/ChinFGW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/SturtonHWK11,
  author       = {Cynthia Sturton and
                  Matthew Hicks and
                  David A. Wagner and
                  Samuel T. King},
  title        = {Defeating {UCI:} Building Stealthy and Malicious Hardware},
  booktitle    = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May
                  2011, Berkeley, California, {USA}},
  pages        = {64--77},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SP.2011.32},
  doi          = {10.1109/SP.2011.32},
  timestamp    = {Thu, 21 Sep 2023 16:14:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/SturtonHWK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/JiKSTCW11,
  author       = {Theron Ji and
                  Eric Kim and
                  Raji Srikantan and
                  Alan Tsai and
                  Arel Cordero and
                  David A. Wagner},
  editor       = {Hovav Shacham and
                  Vanessa Teague},
  title        = {An Analysis of Write-in Marks on Optical Scan Ballots},
  booktitle    = {2011 Electronic Voting Technology Workshop / Workshop on Trustworthy
                  Elections, {EVT/WOTE} '11, San Francisco, CA, USA, August 8-9, 2011},
  publisher    = {{USENIX} Association},
  year         = {2011},
  url          = {https://www.usenix.org/conference/evtwote-11/analysis-write-marks-optical-scan-ballots},
  timestamp    = {Mon, 01 Feb 2021 08:42:50 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/JiKSTCW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/webapps/FeltGW11,
  author       = {Adrienne Porter Felt and
                  Kate Greenwood and
                  David A. Wagner},
  editor       = {Armando Fox},
  title        = {The Effectiveness of Application Permissions},
  booktitle    = {2nd {USENIX} Conference on Web Application Development, WebApps'11,
                  Portland, Oregon, USA, June 15-16, 2011},
  publisher    = {{USENIX} Association},
  year         = {2011},
  url          = {https://www.usenix.org/conference/webapps11/effectiveness-application-permissions},
  timestamp    = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl       = {https://dblp.org/rec/conf/webapps/FeltGW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/MettlerWC10,
  author       = {Adrian Mettler and
                  David A. Wagner and
                  Tyler Close},
  title        = {Joe-E: {A} Security-Oriented Subset of Java},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2010, San Diego, California, USA, 28th February - 3rd March
                  2010},
  publisher    = {The Internet Society},
  year         = {2010},
  url          = {https://www.ndss-symposium.org/ndss2010/joe-e-security-oriented-subset-java},
  timestamp    = {Mon, 01 Feb 2021 08:42:17 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/MettlerWC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pldi/MettlerW10,
  author       = {Adrian Mettler and
                  David A. Wagner},
  editor       = {Anindya Banerjee and
                  Deepak Garg},
  title        = {Class properties for security review in an object-capability subset
                  of Java: (short paper)},
  booktitle    = {Proceedings of the 2010 Workshop on Programming Languages and Analysis
                  for Security, {PLAS} 2010, Toronto, ON, Canada, 10 June, 2010},
  pages        = {7},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1814217.1814224},
  doi          = {10.1145/1814217.1814224},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pldi/MettlerW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/CorderoJTMW10,
  author       = {Arel Cordero and
                  Theron Ji and
                  Alan Tsai and
                  Keaton Mowery and
                  David A. Wagner},
  editor       = {Douglas W. Jones and
                  Jean{-}Jacques Quisquater and
                  Eric Rescorla},
  title        = {Efficient User-Guided Ballot Image Verification},
  booktitle    = {2010 Electronic Voting Technology Workshop / Workshop on Trustworthy
                  Elections, {EVT/WOTE} '10, Washington, D.C., USA, August 9-10, 2010},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {https://www.usenix.org/conference/evtwote-10/efficient-user-guided-ballot-image-verification},
  timestamp    = {Mon, 01 Feb 2021 08:43:18 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/CorderoJTMW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/KrishnamurthyMW10,
  author       = {Akshay Krishnamurthy and
                  Adrian Mettler and
                  David A. Wagner},
  editor       = {Michael Rappa and
                  Paul Jones and
                  Juliana Freire and
                  Soumen Chakrabarti},
  title        = {Fine-grained privilege separation for web applications},
  booktitle    = {Proceedings of the 19th International Conference on World Wide Web,
                  {WWW} 2010, Raleigh, North Carolina, USA, April 26-30, 2010},
  pages        = {551--560},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1772690.1772747},
  doi          = {10.1145/1772690.1772747},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/www/KrishnamurthyMW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TsaiHW09,
  author       = {Hsin{-}Yi Tsai and
                  Yu{-}Lun Huang and
                  David A. Wagner},
  title        = {A graph approach to quantitative analysis of control-flow obfuscating
                  transformations},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {2},
  pages        = {257--267},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2008.2011077},
  doi          = {10.1109/TIFS.2008.2011077},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/TsaiHW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SturtonJSW09,
  author       = {Cynthia Sturton and
                  Susmit Jha and
                  Sanjit A. Seshia and
                  David A. Wagner},
  editor       = {Ehab Al{-}Shaer and
                  Somesh Jha and
                  Angelos D. Keromytis},
  title        = {On voting machine design for verification and testability},
  booktitle    = {Proceedings of the 2009 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009},
  pages        = {463--476},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1653662.1653719},
  doi          = {10.1145/1653662.1653719},
  timestamp    = {Tue, 10 Nov 2020 19:58:07 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SturtonJSW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/KarlofTW09,
  author       = {Chris Karlof and
                  J. Doug Tygar and
                  David A. Wagner},
  title        = {Conditioned-safe Ceremonies and a User Study of an Application to
                  Web Authentication},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2009, San Diego, California, USA, 8th February - 11th February
                  2009},
  publisher    = {The Internet Society},
  year         = {2009},
  url          = {https://www.ndss-symposium.org/ndss2009/conditioned-safe-ceremonies-and-user-study-application-web-authentication/},
  timestamp    = {Mon, 01 Feb 2021 08:42:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/KarlofTW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/KarlofTW09,
  author       = {Chris Karlof and
                  J. D. Tygar and
                  David A. Wagner},
  editor       = {Lorrie Faith Cranor},
  title        = {Conditioned-safe ceremonies and a user study of an application to
                  web authentication},
  booktitle    = {Proceedings of the 5th Symposium on Usable Privacy and Security, {SOUPS}
                  2009, Mountain View, California, USA, July 15-17, 2009},
  series       = {{ACM} International Conference Proceeding Series},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1572532.1572578},
  doi          = {10.1145/1572532.1572578},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/soups/KarlofTW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sws/ChinW09,
  author       = {Erika Chin and
                  David A. Wagner},
  editor       = {Ernesto Damiani and
                  Seth Proctor and
                  Anoop Singhal},
  title        = {Efficient character-level taint tracking for Java},
  booktitle    = {Proceedings of the 6th {ACM} Workshop On Secure Web Services, {SWS}
                  2009, Chicago, Illinois, USA, November 13, 2009},
  pages        = {3--12},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1655121.1655125},
  doi          = {10.1145/1655121.1655125},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sws/ChinW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/MolnarLW09,
  author       = {David Molnar and
                  Xue Cong Li and
                  David A. Wagner},
  editor       = {Fabian Monrose},
  title        = {Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs},
  booktitle    = {18th {USENIX} Security Symposium, Montreal, Canada, August 10-14,
                  2009, Proceedings},
  pages        = {67--82},
  publisher    = {{USENIX} Association},
  year         = {2009},
  url          = {http://www.usenix.org/events/sec09/tech/full\_papers/molnar.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/MolnarLW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SturtonW09,
  author       = {Cynthia Sturton and
                  David A. Wagner},
  editor       = {David Jefferson and
                  Joseph Lorenzo Hall and
                  Tal Moran},
  title        = {Weight, Weight, Don't Tell Me: Using Scales to Select Ballots for
                  Auditing},
  booktitle    = {2009 Electronic Voting Technology Workshop / Workshop on Trustworthy
                  Elections, {EVT/WOTE} '09, Montreal, Canada, August 10-11, 2009},
  publisher    = {{USENIX} Association},
  year         = {2009},
  url          = {https://www.usenix.org/conference/evtwote-09/weight-weight-dont-tell-me-using-scales-select-ballots-auditing},
  timestamp    = {Mon, 01 Feb 2021 08:43:14 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/SturtonW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tos/TsafrirHWS08,
  author       = {Dan Tsafrir and
                  Tomer Hertz and
                  David A. Wagner and
                  Dilma Da Silva},
  title        = {Portably solving file races with hardness amplification},
  journal      = {{ACM} Trans. Storage},
  volume       = {4},
  number       = {3},
  pages        = {9:1--9:30},
  year         = {2008},
  url          = {https://doi.org/10.1145/1416944.1416948},
  doi          = {10.1145/1416944.1416948},
  timestamp    = {Thu, 30 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tos/TsafrirHWS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/TsafrirS008,
  author       = {Dan Tsafrir and
                  Dilma Da Silva and
                  David A. Wagner},
  title        = {The Murky Issue of Changing Process Identity: Revising "Setuid
                  Demystified"},
  journal      = {login Usenix Mag.},
  volume       = {33},
  number       = {3},
  year         = {2008},
  url          = {https://www.usenix.org/publications/login/june-2008-volume-33-number-3/murky-issue-changing-process-identity-revising},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/TsafrirS008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FinifterMSW08,
  author       = {Matthew Finifter and
                  Adrian Mettler and
                  Naveen Sastry and
                  David A. Wagner},
  editor       = {Peng Ning and
                  Paul F. Syverson and
                  Somesh Jha},
  title        = {Verifiable functional purity in java},
  booktitle    = {Proceedings of the 2008 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2008, Alexandria, Virginia, USA, October 27-31, 2008},
  pages        = {161--174},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1455770.1455793},
  doi          = {10.1145/1455770.1455793},
  timestamp    = {Tue, 10 Nov 2020 19:59:27 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/FinifterMSW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fast/TsafrirHWS08,
  author       = {Dan Tsafrir and
                  Tomer Hertz and
                  David A. Wagner and
                  Dilma Da Silva},
  editor       = {Mary Baker and
                  Erik Riedel},
  title        = {Portably Solving File {TOCTTOU} Races with Hardness Amplification},
  booktitle    = {6th {USENIX} Conference on File and Storage Technologies, {FAST} 2008,
                  February 26-29, 2008, San Jose, CA, {USA}},
  pages        = {189--206},
  publisher    = {{USENIX}},
  year         = {2008},
  url          = {http://www.usenix.org/events/fast08/tech/tsafrir.html},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fast/TsafrirHWS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/CourtoisBW08,
  author       = {Nicolas T. Courtois and
                  Gregory V. Bard and
                  David A. Wagner},
  editor       = {Kaisa Nyberg},
  title        = {Algebraic and Slide Attacks on KeeLoq},
  booktitle    = {Fast Software Encryption, 15th International Workshop, {FSE} 2008,
                  Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5086},
  pages        = {97--115},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-71039-4\_6},
  doi          = {10.1007/978-3-540-71039-4\_6},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/CourtoisBW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsdi/KarlofTW08,
  author       = {Chris Karlof and
                  J. Doug Tygar and
                  David A. Wagner},
  editor       = {Elizabeth F. Churchill and
                  Rachna Dhamija},
  title        = {A User Study Design for Comparing the Security of Registration Protocols},
  booktitle    = {Usability, Psychology, and Security, UPSEC'08, San Francisco, CA,
                  USA, April 14, 2008, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2008},
  url          = {http://www.usenix.org/events/upsec08/tech/full\_papers/karlof/karlof.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nsdi/KarlofTW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/CorderoW08,
  author       = {Arel Cordero and
                  David A. Wagner},
  editor       = {David L. Dill and
                  Tadayoshi Kohno},
  title        = {Replayable Voting Machine Audit Logs},
  booktitle    = {2008 {USENIX/ACCURATE} Electronic Voting Workshop, {EVT} 2008, July
                  28-29, 2008, San Jose, CA, USA, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2008},
  url          = {http://www.usenix.org/events/evt08/tech/full\_papers/cordero/cordero.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/CorderoW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/HaldermanRSW08,
  author       = {J. Alex Halderman and
                  Eric Rescorla and
                  Hovav Shacham and
                  David A. Wagner},
  editor       = {David L. Dill and
                  Tadayoshi Kohno},
  title        = {You Go to Elections with the Voting System You Have: Stop-Gap Mitigations
                  for Deployed Voting Systems},
  booktitle    = {2008 {USENIX/ACCURATE} Electronic Voting Workshop, {EVT} 2008, July
                  28-29, 2008, San Jose, CA, USA, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2008},
  url          = {http://www.usenix.org/events/evt08/tech/full\_papers/halderman/halderman.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/HaldermanRSW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2008,
  editor       = {David A. Wagner},
  title        = {Advances in Cryptology - {CRYPTO} 2008, 28th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5157},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85174-5},
  doi          = {10.1007/978-3-540-85174-5},
  isbn         = {978-3-540-85173-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/BishopW07,
  author       = {Matt Bishop and
                  David A. Wagner},
  title        = {Risks of e-voting},
  journal      = {Commun. {ACM}},
  volume       = {50},
  number       = {11},
  pages        = {120},
  year         = {2007},
  url          = {https://doi.org/10.1145/1297797.1297827},
  doi          = {10.1145/1297797.1297827},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/BishopW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KarlofSTW07,
  author       = {Chris Karlof and
                  Umesh Shankar and
                  J. Doug Tygar and
                  David A. Wagner},
  editor       = {Peng Ning and
                  Sabrina De Capitani di Vimercati and
                  Paul F. Syverson},
  title        = {Dynamic pharming attacks and locked same-origin policies for web browsers},
  booktitle    = {Proceedings of the 2007 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007},
  pages        = {58--71},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1315245.1315254},
  doi          = {10.1145/1315245.1315254},
  timestamp    = {Tue, 10 Nov 2020 20:00:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KarlofSTW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pldi/ChenW07,
  author       = {Karl Chen and
                  David A. Wagner},
  editor       = {Michael W. Hicks},
  title        = {Large-scale analysis of format string vulnerabilities in Debian Linux},
  booktitle    = {Proceedings of the 2007 Workshop on Programming Languages and Analysis
                  for Security, {PLAS} 2007, San Diego, California, USA, June 14, 2007},
  pages        = {75--84},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1255329.1255344},
  doi          = {10.1145/1255329.1255344},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pldi/ChenW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/GolleW07,
  author       = {Philippe Golle and
                  David A. Wagner},
  title        = {Cryptanalysis of a Cognitive Authentication Scheme (Extended Abstract)},
  booktitle    = {2007 {IEEE} Symposium on Security and Privacy (S{\&}P 2007), 20-23
                  May 2007, Oakland, California, {USA}},
  pages        = {66--70},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/SP.2007.13},
  doi          = {10.1109/SP.2007.13},
  timestamp    = {Thu, 21 Sep 2023 15:57:31 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/GolleW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/HopperMW07,
  author       = {Nicholas Hopper and
                  David Molnar and
                  David A. Wagner},
  editor       = {Salil P. Vadhan},
  title        = {From Weak to Strong Watermarking},
  booktitle    = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC}
                  2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4392},
  pages        = {362--382},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-70936-7\_20},
  doi          = {10.1007/978-3-540-70936-7\_20},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/HopperMW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2007evt,
  editor       = {Ray Martinez and
                  David A. Wagner},
  title        = {2007 {USENIX/ACCURATE} Electronic Voting Technology Workshop, EVT'07,
                  Boston, MA, USA, August 6, 2007},
  publisher    = {{USENIX} Association},
  year         = {2007},
  url          = {https://www.usenix.org/conference/evt07},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/2007evt.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CourtoisBW07,
  author       = {Nicolas T. Courtois and
                  Gregory V. Bard and
                  David A. Wagner},
  title        = {Algebraic and Slide Attacks on KeeLoq},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {62},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/062},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CourtoisBW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/PhanW06,
  author       = {Raphael Chung{-}Wei Phan and
                  David A. Wagner},
  title        = {Security considerations for incremental hash functions based on pair
                  block chaining},
  journal      = {Comput. Secur.},
  volume       = {25},
  number       = {2},
  pages        = {131--136},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.cose.2005.12.006},
  doi          = {10.1016/J.COSE.2005.12.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/PhanW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Wagner06,
  author       = {David A. Wagner},
  editor       = {Cynthia Dwork},
  title        = {Cryptographic Protocols for Electronic Voting},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2006, 26th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 20-24,
                  2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4117},
  pages        = {393},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11818175\_23},
  doi          = {10.1007/11818175\_23},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Wagner06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/IshaiPSW06,
  author       = {Yuval Ishai and
                  Manoj Prabhakaran and
                  Amit Sahai and
                  David A. Wagner},
  editor       = {Serge Vaudenay},
  title        = {Private Circuits {II:} Keeping Secrets in Tamperable Circuits},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4004},
  pages        = {308--327},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11761679\_19},
  doi          = {10.1007/11761679\_19},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/IshaiPSW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/ShankarW06,
  author       = {Umesh Shankar and
                  David A. Wagner},
  title        = {Preventing Secret Leakage from fork(): Securing Privilege-Separated
                  Applications},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2006, Istanbul, Turkey, 11-15 June 2006},
  pages        = {2268--2275},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/ICC.2006.255108},
  doi          = {10.1109/ICC.2006.255108},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/ShankarW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CrutchfieldMTW06,
  author       = {Chris Crutchfield and
                  David Molnar and
                  David Turner and
                  David A. Wagner},
  editor       = {Moti Yung and
                  Yevgeniy Dodis and
                  Aggelos Kiayias and
                  Tal Malkin},
  title        = {Generic On-Line/Off-Line Threshold Signatures},
  booktitle    = {Public Key Cryptography - {PKC} 2006, 9th International Conference
                  on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
                  April 24-26, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3958},
  pages        = {58--74},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11745853\_5},
  doi          = {10.1007/11745853\_5},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/CrutchfieldMTW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pldi/Wagner06,
  author       = {David A. Wagner},
  editor       = {Vugranam C. Sreedhar and
                  Steve Zdancewic},
  title        = {Object capabilities for security},
  booktitle    = {Proceedings of the 2006 Workshop on Programming Languages and Analysis
                  for Security, {PLAS} 2006, Ottawa, Ontario, Canada, June 10, 2006},
  pages        = {1--2},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1134744.1134745},
  doi          = {10.1145/1134744.1134745},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pldi/Wagner06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/MolnarKSW06,
  author       = {David Molnar and
                  Tadayoshi Kohno and
                  Naveen Sastry and
                  David A. Wagner},
  title        = {Tamper-Evident, History-Independent, Subliminal-Free Data Structures
                  on {PROM} Storage-or-How to Store Ballots on a Voting Machine (Extended
                  Abstract)},
  booktitle    = {2006 {IEEE} Symposium on Security and Privacy (S{\&}P 2006), 21-24
                  May 2006, Berkeley, California, {USA}},
  pages        = {365--370},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/SP.2006.39},
  doi          = {10.1109/SP.2006.39},
  timestamp    = {Thu, 21 Sep 2023 15:57:31 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/MolnarKSW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/YeeWHB06,
  author       = {Ka{-}Ping Yee and
                  David A. Wagner and
                  Marti A. Hearst and
                  Steven M. Bellovin},
  editor       = {Dan S. Wallach and
                  Ronald L. Rivest},
  title        = {Prerendered User Interfaces for Higher-Assurance Electronic Voting},
  booktitle    = {2006 {USENIX/ACCURATE} Electronic Voting Technology Workshop, EVT'06,
                  Vancouver, BC, Canada, August 1, 2006},
  publisher    = {{USENIX} Association},
  year         = {2006},
  url          = {https://www.usenix.org/conference/evt-06/prerendered-user-interfaces-higher-assurance-electronic-voting},
  timestamp    = {Mon, 01 Feb 2021 08:43:11 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/YeeWHB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MolnarKSW06,
  author       = {David Molnar and
                  Tadayoshi Kohno and
                  Naveen Sastry and
                  David A. Wagner},
  title        = {Tamper-Evident, History-Independent, Subliminal-Free Data Structures
                  on {PROM} Storage -or- How to Store Ballots on a Voting Machine},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {81},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/081},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MolnarKSW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GolleW06,
  author       = {Philippe Golle and
                  David A. Wagner},
  title        = {Cryptanalysis of a Cognitive Authentication Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {258},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/258},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GolleW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HopperMW06,
  author       = {Nicholas Hopper and
                  David Molnar and
                  David A. Wagner},
  title        = {From Weak to Strong Watermarking},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {430},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/430},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HopperMW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/SuW05,
  author       = {Zhendong Su and
                  David A. Wagner},
  title        = {A class of polynomially solvable range constraints for interval analysis
                  without widenings},
  journal      = {Theor. Comput. Sci.},
  volume       = {345},
  number       = {1},
  pages        = {122--138},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.tcs.2005.07.035},
  doi          = {10.1016/J.TCS.2005.07.035},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/SuW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SchwarzCWLTMW05,
  author       = {Benjamin Schwarz and
                  Hao Chen and
                  David A. Wagner and
                  Jeremy Lin and
                  Wei Tu and
                  Geoff Morrison and
                  Jacob West},
  title        = {Model Checking An Entire Linux Distribution for Security Violations},
  booktitle    = {21st Annual Computer Security Applications Conference {(ACSAC} 2005),
                  5-9 December 2005, Tucson, AZ, {USA}},
  pages        = {13--22},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CSAC.2005.39},
  doi          = {10.1109/CSAC.2005.39},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SchwarzCWLTMW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WaddleW05,
  author       = {Jason Waddle and
                  David A. Wagner},
  title        = {Fault Attacks on Dual-Rail Encoded Systems},
  booktitle    = {21st Annual Computer Security Applications Conference {(ACSAC} 2005),
                  5-9 December 2005, Tucson, AZ, {USA}},
  pages        = {483--494},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CSAC.2005.25},
  doi          = {10.1109/CSAC.2005.25},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/WaddleW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dgo/ConeyHVW05,
  author       = {Lillie Coney and
                  Joseph Lorenzo Hall and
                  Poorvi L. Vora and
                  David A. Wagner},
  editor       = {Lois M. L. Delcambre and
                  Genevieve Giuliano},
  title        = {Towards a privacy measurement criterion for voting systems},
  booktitle    = {Proceedings of the 2005 National Conference on Digital Government
                  Research, {DG.O} 2005, Atlanta, Georgia, USA, May 15-18, 2005},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {89},
  pages        = {287--288},
  publisher    = {Digital Government Research Center},
  year         = {2005},
  url          = {http://dl.acm.org/citation.cfm?id=1065324},
  timestamp    = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dgo/ConeyHVW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/MolnarPSW05,
  author       = {David Molnar and
                  Matt Piotrowski and
                  David Schultz and
                  David A. Wagner},
  editor       = {Dongho Won and
                  Seungjoo Kim},
  title        = {The Program Counter Security Model: Automatic Detection and Removal
                  of Control-Flow Side Channel Attacks},
  booktitle    = {Information Security and Cryptology - {ICISC} 2005, 8th International
                  Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3935},
  pages        = {156--168},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11734727\_14},
  doi          = {10.1007/11734727\_14},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/MolnarPSW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/DraperIMPRSW05,
  author       = {Stark C. Draper and
                  Prakash Ishwar and
                  David Molnar and
                  Vinod M. Prabhakaran and
                  Kannan Ramchandran and
                  Daniel Schonberg and
                  David A. Wagner},
  editor       = {Mauro Barni and
                  Jordi Herrera{-}Joancomart{\'{\i}} and
                  Stefan Katzenbeisser and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {An Analysis of Empirical {PMF} Based Tests for Least Significant Bit
                  Image Steganography},
  booktitle    = {Information Hiding, 7th International Workshop, {IH} 2005, Barcelona,
                  Spain, June 6-8, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3727},
  pages        = {327--341},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11558859\_24},
  doi          = {10.1007/11558859\_24},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/DraperIMPRSW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/MolnarSW05,
  author       = {David Molnar and
                  Andrea Soppera and
                  David A. Wagner},
  editor       = {Bart Preneel and
                  Stafford E. Tavares},
  title        = {A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer
                  of {RFID} Tags},
  booktitle    = {Selected Areas in Cryptography, 12th International Workshop, {SAC}
                  2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3897},
  pages        = {276--290},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11693383\_19},
  doi          = {10.1007/11693383\_19},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/MolnarSW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/JuelsMW05,
  author       = {Ari Juels and
                  David Molnar and
                  David A. Wagner},
  title        = {Security and Privacy Issues in E-passports},
  booktitle    = {First International Conference on Security and Privacy for Emerging
                  Areas in Communications Networks, SecureComm 2005, Athens, Greece,
                  5-9 September, 2005},
  pages        = {74--88},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/SECURECOMM.2005.59},
  doi          = {10.1109/SECURECOMM.2005.59},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/JuelsMW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spin/Wagner05,
  author       = {David A. Wagner},
  editor       = {Patrice Godefroid},
  title        = {Pushdown Model Checking for Security},
  booktitle    = {Model Checking Software, 12th International {SPIN} Workshop, San Francisco,
                  CA, USA, August 22-24, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3639},
  pages        = {1},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11537328\_1},
  doi          = {10.1007/11537328\_1},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/spin/Wagner05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KarlofSW05,
  author       = {Chris Karlof and
                  Naveen Sastry and
                  David A. Wagner},
  editor       = {Patrick D. McDaniel},
  title        = {Cryptographic Voting Protocols: {A} Systems Perspective},
  booktitle    = {Proceedings of the 14th {USENIX} Security Symposium, Baltimore, MD,
                  USA, July 31 - August 5, 2005},
  publisher    = {{USENIX} Association},
  year         = {2005},
  url          = {https://www.usenix.org/conference/14th-usenix-security-symposium/cryptographic-voting-protocols-systems-perspective},
  timestamp    = {Mon, 01 Feb 2021 08:42:55 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/KarlofSW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/MolnarSW05,
  author       = {David Molnar and
                  Andrea Soppera and
                  David A. Wagner},
  editor       = {Vijay Atluri and
                  Sabrina De Capitani di Vimercati and
                  Roger Dingledine},
  title        = {Privacy for {RFID} through trusted computing},
  booktitle    = {Proceedings of the 2005 {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2005, Alexandria, VA, USA, November 7, 2005},
  pages        = {31--34},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1102199.1102206},
  doi          = {10.1145/1102199.1102206},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/MolnarSW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JuelsMW05,
  author       = {Ari Juels and
                  David Molnar and
                  David A. Wagner},
  title        = {Security and Privacy Issues in E-passports},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {95},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/095},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JuelsMW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MolnarSW05,
  author       = {David Molnar and
                  Andrea Soppera and
                  David A. Wagner},
  title        = {A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer
                  of {RFID} Tags},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {315},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/315},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MolnarSW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MolnarPSW05,
  author       = {David Molnar and
                  Matt Piotrowski and
                  David Schultz and
                  David A. Wagner},
  title        = {The Program Counter Security Model: Automatic Detection and Removal
                  of Control-Flow Side Channel Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {368},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/368},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MolnarPSW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CrutchfieldMTW05,
  author       = {Chris Crutchfield and
                  David Molnar and
                  David Turner and
                  David A. Wagner},
  title        = {Generic On-Line/Off-Line Threshold Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {418},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/418},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CrutchfieldMTW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/PerrigSW04,
  author       = {Adrian Perrig and
                  John A. Stankovic and
                  David A. Wagner},
  title        = {Security in wireless sensor networks},
  journal      = {Commun. {ACM}},
  volume       = {47},
  number       = {6},
  pages        = {53--57},
  year         = {2004},
  url          = {https://doi.org/10.1145/990680.990707},
  doi          = {10.1145/990680.990707},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/PerrigSW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/JeffersonRSW04,
  author       = {David R. Jefferson and
                  Aviel D. Rubin and
                  Barbara Simons and
                  David A. Wagner},
  title        = {Analyzing internet voting security},
  journal      = {Commun. {ACM}},
  volume       = {47},
  number       = {10},
  pages        = {59--64},
  year         = {2004},
  url          = {https://doi.org/10.1145/1022594.1022624},
  doi          = {10.1145/1022594.1022624},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/JeffersonRSW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Wagner04,
  author       = {David A. Wagner},
  editor       = {Vijayalakshmi Atluri and
                  Birgit Pfitzmann and
                  Patrick D. McDaniel},
  title        = {Cryptanalysis of a provably secure {CRT-RSA} algorithm},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2004, Washington, DC, USA, October 25-29, 2004},
  pages        = {92--97},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1030083.1030097},
  doi          = {10.1145/1030083.1030097},
  timestamp    = {Fri, 13 Nov 2020 16:10:44 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Wagner04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MolnarW04,
  author       = {David Molnar and
                  David A. Wagner},
  editor       = {Vijayalakshmi Atluri and
                  Birgit Pfitzmann and
                  Patrick D. McDaniel},
  title        = {Privacy and security in library {RFID:} issues, practices, and architectures},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2004, Washington, DC, USA, October 25-29, 2004},
  pages        = {210--219},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1030083.1030112},
  doi          = {10.1145/1030083.1030112},
  timestamp    = {Fri, 13 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MolnarW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/WaddleW04,
  author       = {Jason Waddle and
                  David A. Wagner},
  editor       = {Marc Joye and
                  Jean{-}Jacques Quisquater},
  title        = {Towards Efficient Second-Order Power Analysis},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International
                  Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3156},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-28632-5\_1},
  doi          = {10.1007/978-3-540-28632-5\_1},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/WaddleW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Wagner04,
  author       = {David A. Wagner},
  editor       = {Bimal K. Roy and
                  Willi Meier},
  title        = {Towards a Unifying View of Block Cipher Cryptanalysis},
  booktitle    = {Fast Software Encryption, 11th International Workshop, {FSE} 2004,
                  Delhi, India, February 5-7, 2004, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3017},
  pages        = {16--33},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-25937-4\_2},
  doi          = {10.1007/978-3-540-25937-4\_2},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Wagner04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BellareRW04,
  author       = {Mihir Bellare and
                  Phillip Rogaway and
                  David A. Wagner},
  editor       = {Bimal K. Roy and
                  Willi Meier},
  title        = {The {EAX} Mode of Operation},
  booktitle    = {Fast Software Encryption, 11th International Workshop, {FSE} 2004,
                  Delhi, India, February 5-7, 2004, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3017},
  pages        = {389--407},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-25937-4\_25},
  doi          = {10.1007/978-3-540-25937-4\_25},
  timestamp    = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BellareRW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ChenDW04,
  author       = {Hao Chen and
                  Drew Dean and
                  David A. Wagner},
  title        = {Model Checking One Million Lines of {C} Code},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2004, San Diego, California, {USA}},
  publisher    = {The Internet Society},
  year         = {2004},
  url          = {https://www.ndss-symposium.org/ndss2004/model-checking-one-million-lines-c-code/},
  timestamp    = {Mon, 01 Feb 2021 08:42:17 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/ChenDW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sasn/Wagner04,
  author       = {David A. Wagner},
  editor       = {Sanjeev Setia and
                  Vipin Swarup},
  title        = {Resilient aggregation in sensor networks},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Security of ad hoc and Sensor
                  Networks, {SASN} 2004, Washington, DC, USA, October 25, 2004},
  pages        = {78--87},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029102.1029116},
  doi          = {10.1145/1029102.1029116},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sasn/Wagner04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sensys/KarlofSW04,
  author       = {Chris Karlof and
                  Naveen Sastry and
                  David A. Wagner},
  editor       = {John A. Stankovic and
                  Anish Arora and
                  Ramesh Govindan},
  title        = {TinySec: a link layer security architecture for wireless sensor networks},
  booktitle    = {Proceedings of the 2nd International Conference on Embedded Networked
                  Sensor Systems, SenSys 2004, Baltimore, MD, USA, November 3-5, 2004},
  pages        = {162--175},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1031495.1031515},
  doi          = {10.1145/1031495.1031515},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sensys/KarlofSW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tacas/SuW04,
  author       = {Zhendong Su and
                  David A. Wagner},
  editor       = {Kurt Jensen and
                  Andreas Podelski},
  title        = {A Class of Polynomially Solvable Range Constraints for Interval Analysis
                  without Widenings and Narrowings},
  booktitle    = {Tools and Algorithms for the Construction and Analysis of Systems,
                  10th International Conference, {TACAS} 2004, Held as Part of the Joint
                  European Conferences on Theory and Practice of Software, {ETAPS} 2004,
                  Barcelona, Spain, March 29 - April 2, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2988},
  pages        = {280--295},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24730-2\_23},
  doi          = {10.1007/978-3-540-24730-2\_23},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tacas/SuW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/JohnsonWR04,
  author       = {Mark Johnson and
                  David A. Wagner and
                  Kannan Ramchandran},
  editor       = {Moni Naor},
  title        = {On Compressing Encrypted Data without the Encryption Key},
  booktitle    = {Theory of Cryptography, First Theory of Cryptography Conference, {TCC}
                  2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2951},
  pages        = {491--504},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24638-1\_27},
  doi          = {10.1007/978-3-540-24638-1\_27},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/JohnsonWR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/JohnsonW04,
  author       = {Robert Johnson and
                  David A. Wagner},
  editor       = {Matt Blaze},
  title        = {Finding User/Kernel Pointer Bugs with Type Inference},
  booktitle    = {Proceedings of the 13th {USENIX} Security Symposium, August 9-13,
                  2004, San Diego, CA, {USA}},
  pages        = {119--134},
  publisher    = {{USENIX}},
  year         = {2004},
  url          = {http://www.usenix.org/publications/library/proceedings/sec04/tech/johnson.html},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/JohnsonW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/GoodMUMMQW04,
  author       = {Nathan Good and
                  David Molnar and
                  Jennifer M. Urban and
                  Deirdre K. Mulligan and
                  Elizabeth Miles and
                  Laura Quilter and
                  David A. Wagner},
  editor       = {Vijay Atluri and
                  Paul F. Syverson and
                  Sabrina De Capitani di Vimercati},
  title        = {Radio frequency Id and privacy with information goods},
  booktitle    = {Proceedings of the 2004 {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2004, Washington, DC, USA, October 28, 2004},
  pages        = {41--42},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029179.1029193},
  doi          = {10.1145/1029179.1029193},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/GoodMUMMQW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ws/SastryW04,
  author       = {Naveen Sastry and
                  David A. Wagner},
  editor       = {Markus Jakobsson and
                  Adrian Perrig},
  title        = {Security considerations for {IEEE} 802.15.4 networks},
  booktitle    = {Proceedings of the 2004 {ACM} Workshop on Wireless Security, Philadelphia,
                  PA, USA, October 1, 2004},
  pages        = {32--42},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1023646.1023654},
  doi          = {10.1145/1023646.1023654},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ws/SastryW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/KarlofW03,
  author       = {Chris Karlof and
                  David A. Wagner},
  title        = {Secure routing in wireless sensor networks: attacks and countermeasures},
  journal      = {Ad Hoc Networks},
  volume       = {1},
  number       = {2-3},
  pages        = {293--315},
  year         = {2003},
  url          = {https://doi.org/10.1016/S1570-8705(03)00008-8},
  doi          = {10.1016/S1570-8705(03)00008-8},
  timestamp    = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/KarlofW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/Cam-WingetHWW03,
  author       = {Nancy Cam{-}Winget and
                  Russell Housley and
                  David A. Wagner and
                  Jesse Walker},
  title        = {Security flaws in 802.11 data link protocols},
  journal      = {Commun. {ACM}},
  volume       = {46},
  number       = {5},
  pages        = {35--39},
  year         = {2003},
  url          = {https://doi.org/10.1145/769800.769823},
  doi          = {10.1145/769800.769823},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/Cam-WingetHWW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/KarlofW03,
  author       = {Chris Karlof and
                  David A. Wagner},
  editor       = {Colin D. Walter and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Hidden Markov Model Cryptanalysis},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International
                  Workshop, Cologne, Germany, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2779},
  pages        = {17--34},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45238-6\_3},
  doi          = {10.1007/978-3-540-45238-6\_3},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/KarlofW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/IshaiSW03,
  author       = {Yuval Ishai and
                  Amit Sahai and
                  David A. Wagner},
  editor       = {Dan Boneh},
  title        = {Private Circuits: Securing Hardware against Probing Attacks},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2003, 23rd Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 17-21,
                  2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2729},
  pages        = {463--481},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45146-4\_27},
  doi          = {10.1007/978-3-540-45146-4\_27},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/IshaiSW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/Wagner03,
  author       = {David A. Wagner},
  editor       = {Colin Boyd and
                  Wenbo Mao},
  title        = {Cryptanalysis of an Algebraic Privacy Homomorphism},
  booktitle    = {Information Security, 6th International Conference, {ISC} 2003, Bristol,
                  UK, October 1-3, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2851},
  pages        = {234--239},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/10958513\_18},
  doi          = {10.1007/10958513\_18},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/Wagner03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ws/SastrySW03,
  author       = {Naveen Sastry and
                  Umesh Shankar and
                  David A. Wagner},
  editor       = {W. Douglas Maughan and
                  Adrian Perrig},
  title        = {Secure verification of location claims},
  booktitle    = {Proceedings of the 2003 {ACM} Workshop on Wireless Security, San Diego,
                  CA, USA, September 19, 2003},
  pages        = {1--10},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/941311.941313},
  doi          = {10.1145/941311.941313},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ws/SastrySW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareRW03,
  author       = {Mihir Bellare and
                  Phillip Rogaway and
                  David A. Wagner},
  title        = {{EAX:} {A} Conventional Authenticated-Encryption Mode},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {69},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/069},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareRW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RogawayW03,
  author       = {Phillip Rogaway and
                  David A. Wagner},
  title        = {A Critique of {CCM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {70},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/070},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RogawayW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Wagner03,
  author       = {David A. Wagner},
  title        = {A Security Evaluation of Whitenoise},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {218},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/218},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Wagner03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChenW02,
  author       = {Hao Chen and
                  David A. Wagner},
  editor       = {Vijayalakshmi Atluri},
  title        = {{MOPS:} an infrastructure for examining security properties of software},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002},
  pages        = {235--244},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/586110.586142},
  doi          = {10.1145/586110.586142},
  timestamp    = {Tue, 10 Nov 2020 20:00:47 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ChenW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WagnerS02,
  author       = {David A. Wagner and
                  Paolo Soto},
  editor       = {Vijayalakshmi Atluri},
  title        = {Mimicry attacks on host-based intrusion detection systems},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002},
  pages        = {255--264},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/586110.586145},
  doi          = {10.1145/586110.586145},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WagnerS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LiskovRW02,
  author       = {Moses D. Liskov and
                  Ronald L. Rivest and
                  David A. Wagner},
  editor       = {Moti Yung},
  title        = {Tweakable Block Ciphers},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2002, 22nd Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 18-22,
                  2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2442},
  pages        = {31--46},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45708-9\_3},
  doi          = {10.1007/3-540-45708-9\_3},
  timestamp    = {Fri, 25 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LiskovRW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Wagner02,
  author       = {David A. Wagner},
  editor       = {Moti Yung},
  title        = {A Generalized Birthday Problem},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2002, 22nd Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 18-22,
                  2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2442},
  pages        = {288--303},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45708-9\_19},
  doi          = {10.1007/3-540-45708-9\_19},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Wagner02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/JohnsonMSW02,
  author       = {Robert Johnson and
                  David Molnar and
                  Dawn Xiaodong Song and
                  David A. Wagner},
  editor       = {Bart Preneel},
  title        = {Homomorphic Signature Schemes},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2002, The Cryptographer's Track at
                  the {RSA} Conference, 2002, San Jose, CA, USA, February 18-22, 2002,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2271},
  pages        = {244--262},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45760-7\_17},
  doi          = {10.1007/3-540-45760-7\_17},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/JohnsonMSW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BorisovCJW02,
  author       = {Nikita Borisov and
                  Monica Chew and
                  Robert Johnson and
                  David A. Wagner},
  editor       = {Joan Daemen and
                  Vincent Rijmen},
  title        = {Multiplicative Differentials},
  booktitle    = {Fast Software Encryption, 9th International Workshop, {FSE} 2002,
                  Leuven, Belgium, February 4-6, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2365},
  pages        = {17--33},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45661-9\_2},
  doi          = {10.1007/3-540-45661-9\_2},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BorisovCJW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/KnudsenW02,
  author       = {Lars R. Knudsen and
                  David A. Wagner},
  editor       = {Joan Daemen and
                  Vincent Rijmen},
  title        = {Integral Cryptanalysis},
  booktitle    = {Fast Software Encryption, 9th International Workshop, {FSE} 2002,
                  Leuven, Belgium, February 4-6, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2365},
  pages        = {112--127},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45661-9\_9},
  doi          = {10.1007/3-540-45661-9\_9},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/KnudsenW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/ThomasW02,
  author       = {Stephen Thomas and
                  David A. Wagner},
  title        = {Insecurity in ATM-based passive optical networks},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2002, April
                  28 - May 2, 2002, New York City, NY, {USA}},
  pages        = {2803--2805},
  publisher    = {{IEEE}},
  year         = {2002},
  url          = {https://doi.org/10.1109/ICC.2002.997353},
  doi          = {10.1109/ICC.2002.997353},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/ThomasW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/IvancicWRRS02,
  author       = {Will Ivancic and
                  David A. Wagner and
                  Aviel D. Rubin and
                  E. Paul Ratazzi and
                  James P. G. Sterbenz},
  title        = {Securing Wireless and Mobile Networks - Is It Possible?},
  booktitle    = {Proceedings {IEEE} {INFOCOM} 2002, The 21st Annual Joint Conference
                  of the {IEEE} Computer and Communications Societies, New York, USA,
                  June 23-27, 2002},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  timestamp    = {Thu, 05 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/IvancicWRRS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/EnglerIJW02,
  author       = {Dawson R. Engler and
                  Cynthia E. Irvine and
                  Trent Jaeger and
                  David A. Wagner},
  editor       = {Ravi S. Sandhu and
                  Elisa Bertino},
  title        = {Cool security trends},
  booktitle    = {7th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2002, Naval Postgraduate School, Monterey, California, USA, June 3-4,
                  2002},
  pages        = {53},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/507711.507720},
  doi          = {10.1145/507711.507720},
  timestamp    = {Tue, 09 Feb 2021 08:50:30 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/EnglerIJW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/ReichardtW02,
  author       = {Ben Reichardt and
                  David A. Wagner},
  editor       = {Kaisa Nyberg and
                  Howard M. Heys},
  title        = {Markov Truncated Differential Cryptanalysis of Skipjack},
  booktitle    = {Selected Areas in Cryptography, 9th Annual International Workshop,
                  {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002.
                  Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2595},
  pages        = {110--128},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36492-7\_9},
  doi          = {10.1007/3-540-36492-7\_9},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/ReichardtW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ChenWD02,
  author       = {Hao Chen and
                  David A. Wagner and
                  Drew Dean},
  editor       = {Dan Boneh},
  title        = {Setuid Demystified},
  booktitle    = {Proceedings of the 11th {USENIX} Security Symposium, San Francisco,
                  CA, USA, August 5-9, 2002},
  pages        = {171--190},
  publisher    = {{USENIX}},
  year         = {2002},
  url          = {http://www.usenix.org/publications/library/proceedings/sec02/chen.html},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ChenWD02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dam/KnudsenW01,
  author       = {Lars R. Knudsen and
                  David A. Wagner},
  title        = {On the structure of Skipjack},
  journal      = {Discret. Appl. Math.},
  volume       = {111},
  number       = {1-2},
  pages        = {103--116},
  year         = {2001},
  url          = {https://doi.org/10.1016/S0166-218X(00)00347-4},
  doi          = {10.1016/S0166-218X(00)00347-4},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dam/KnudsenW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CrosbyGJSW01,
  author       = {Scott A. Crosby and
                  Ian Goldberg and
                  Robert Johnson and
                  Dawn Xiaodong Song and
                  David A. Wagner},
  editor       = {Tomas Sander},
  title        = {A Cryptanalysis of the High-Bandwidth Digital Content Protection System},
  booktitle    = {Security and Privacy in Digital Rights Management, {ACM} {CCS-8} Workshop
                  {DRM} 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2320},
  pages        = {192--200},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47870-1\_12},
  doi          = {10.1007/3-540-47870-1\_12},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CrosbyGJSW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/ScedrovCGWW01,
  author       = {Andre Scedrov and
                  Ran Canetti and
                  Joshua D. Guttman and
                  David A. Wagner and
                  Michael Waidner},
  title        = {Relating Cryptography and Cryptographic Protocols},
  booktitle    = {14th {IEEE} Computer Security Foundations Workshop {(CSFW-14} 2001),
                  11-13 June 2001, Cape Breton, Nova Scotia, Canada},
  pages        = {111--114},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/CSFW.2001.930140},
  doi          = {10.1109/CSFW.2001.930140},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/ScedrovCGWW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobicom/BorisovGW01,
  author       = {Nikita Borisov and
                  Ian Goldberg and
                  David A. Wagner},
  editor       = {Christopher Rose},
  title        = {Intercepting mobile communications: the insecurity of 802.11},
  booktitle    = {{MOBICOM} 2001, Proceedings of the seventh annual international conference
                  on Mobile computing and networking, Rome, Italy, July 16-21, 2001},
  pages        = {180--189},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/381677.381695},
  doi          = {10.1145/381677.381695},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobicom/BorisovGW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sas/Wagner01,
  author       = {David A. Wagner},
  editor       = {Patrick Cousot},
  title        = {Static Analysis and Software Assurance},
  booktitle    = {Static Analysis, 8th International Symposium, {SAS} 2001, Paris, France,
                  July 16-18, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2126},
  pages        = {431},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47764-0\_25},
  doi          = {10.1007/3-540-47764-0\_25},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/sas/Wagner01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/WagnerD01,
  author       = {David A. Wagner and
                  Drew Dean},
  title        = {Intrusion Detection via Static Analysis},
  booktitle    = {2001 {IEEE} Symposium on Security and Privacy, Oakland, California,
                  {USA} May 14-16, 2001},
  pages        = {156--168},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/SECPRI.2001.924296},
  doi          = {10.1109/SECPRI.2001.924296},
  timestamp    = {Thu, 21 Sep 2023 15:57:30 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/WagnerD01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ShankarTFW01,
  author       = {Umesh Shankar and
                  Kunal Talwar and
                  Jeffrey S. Foster and
                  David A. Wagner},
  editor       = {Dan S. Wallach},
  title        = {Detecting Format String Vulnerabilities with Type Qualifiers},
  booktitle    = {10th {USENIX} Security Symposium, August 13-17, 2001, Washington,
                  D.C., {USA}},
  publisher    = {{USENIX}},
  year         = {2001},
  url          = {http://www.usenix.org/publications/library/proceedings/sec01/shankar.html},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ShankarTFW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SongWT01,
  author       = {Dawn Xiaodong Song and
                  David A. Wagner and
                  Xuqing Tian},
  editor       = {Dan S. Wallach},
  title        = {Timing Analysis of Keystrokes and Timing Attacks on {SSH}},
  booktitle    = {10th {USENIX} Security Symposium, August 13-17, 2001, Washington,
                  D.C., {USA}},
  publisher    = {{USENIX}},
  year         = {2001},
  url          = {http://www.usenix.org/publications/library/proceedings/sec01/song.html},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/SongWT01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/KelseySWH00,
  author       = {John Kelsey and
                  Bruce Schneier and
                  David A. Wagner and
                  Chris Hall},
  title        = {Side Channel Cryptanalysis of Product Ciphers},
  journal      = {J. Comput. Secur.},
  volume       = {8},
  number       = {2/3},
  pages        = {141--158},
  year         = {2000},
  url          = {https://doi.org/10.3233/jcs-2000-82-304},
  doi          = {10.3233/JCS-2000-82-304},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/KelseySWH00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/FergusonSW00,
  author       = {Niels Ferguson and
                  Bruce Schneier and
                  David A. Wagner},
  editor       = {Ed Dawson and
                  Andrew J. Clark and
                  Colin Boyd},
  title        = {Security Weaknesses in a Randomized Stream Cipher},
  booktitle    = {Information Security and Privacy, 5th Australasian Conference, {ACISP}
                  2000, Brisbane, Australia, July 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1841},
  pages        = {234--241},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10718964\_19},
  doi          = {10.1007/10718964\_19},
  timestamp    = {Sat, 19 Oct 2019 20:34:19 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/FergusonSW00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aes/SchneierKWWF00,
  author       = {Bruce Schneier and
                  John Kelsey and
                  Doug Whiting and
                  David A. Wagner and
                  Niels Ferguson},
  title        = {Comments on Twofish as an {AES} Candidate},
  booktitle    = {The Third Advanced Encryption Standard Candidate Conference, April
                  13-14, 2000, New York, New York, {USA}},
  pages        = {355--356},
  publisher    = {National Institute of Standards and Technology,},
  year         = {2000},
  timestamp    = {Thu, 08 Aug 2019 17:13:16 +0200},
  biburl       = {https://dblp.org/rec/conf/aes/SchneierKWWF00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Wagner00,
  author       = {David A. Wagner},
  editor       = {Tatsuaki Okamoto},
  title        = {Cryptanalysis of the Yi-Lam Hash},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kyoto, Japan, December 3-7, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1976},
  pages        = {483--488},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44448-3\_37},
  doi          = {10.1007/3-540-44448-3\_37},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Wagner00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/WagnerG00,
  author       = {David A. Wagner and
                  Ian Goldberg},
  editor       = {Tatsuaki Okamoto},
  title        = {Proofs of Security for the Unix Password Hashing Algorithm},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kyoto, Japan, December 3-7, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1976},
  pages        = {560--572},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44448-3\_43},
  doi          = {10.1007/3-540-44448-3\_43},
  timestamp    = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/WagnerG00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BiryukovW00,
  author       = {Alex Biryukov and
                  David A. Wagner},
  editor       = {Bart Preneel},
  title        = {Advanced Slide Attacks},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2000, International Conference
                  on the Theory and Application of Cryptographic Techniques, Bruges,
                  Belgium, May 14-18, 2000, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1807},
  pages        = {589--606},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-45539-6\_41},
  doi          = {10.1007/3-540-45539-6\_41},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BiryukovW00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BiryukovSW00,
  author       = {Alex Biryukov and
                  Adi Shamir and
                  David A. Wagner},
  editor       = {Bruce Schneier},
  title        = {Real Time Cryptanalysis of {A5/1} on a {PC}},
  booktitle    = {Fast Software Encryption, 7th International Workshop, {FSE} 2000,
                  New York, NY, USA, April 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1978},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44706-7\_1},
  doi          = {10.1007/3-540-44706-7\_1},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BiryukovSW00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/FergusonKLSSWW00,
  author       = {Niels Ferguson and
                  John Kelsey and
                  Stefan Lucks and
                  Bruce Schneier and
                  Michael Stay and
                  David A. Wagner and
                  Doug Whiting},
  editor       = {Bruce Schneier},
  title        = {Improved Cryptanalysis of Rijndael},
  booktitle    = {Fast Software Encryption, 7th International Workshop, {FSE} 2000,
                  New York, NY, USA, April 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1978},
  pages        = {213--230},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44706-7\_15},
  doi          = {10.1007/3-540-44706-7\_15},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/FergusonKLSSWW00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/WagnerFBA00,
  author       = {David A. Wagner and
                  Jeffrey S. Foster and
                  Eric A. Brewer and
                  Alexander Aiken},
  title        = {A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2000, San Diego, California, {USA}},
  publisher    = {The Internet Society},
  year         = {2000},
  url          = {https://www.ndss-symposium.org/ndss2000/first-step-towards-automated-detection-buffer-overrun-vulnerabilities-paper/},
  timestamp    = {Mon, 01 Feb 2021 08:42:17 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/WagnerFBA00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/SongWP00,
  author       = {Dawn Xiaodong Song and
                  David A. Wagner and
                  Adrian Perrig},
  title        = {Practical Techniques for Searches on Encrypted Data},
  booktitle    = {2000 {IEEE} Symposium on Security and Privacy, Berkeley, California,
                  USA, May 14-17, 2000},
  pages        = {44--55},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/SECPRI.2000.848445},
  doi          = {10.1109/SECPRI.2000.848445},
  timestamp    = {Thu, 21 Sep 2023 15:57:29 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/SongWP00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cqre/SchneierMW99,
  author       = {Bruce Schneier and
                  Mudge and
                  David A. Wagner},
  editor       = {Rainer Baumgart},
  title        = {Cryptanalysis of Microsoft's {PPTP} Authentication Extensions (MS-CHAPv2)},
  booktitle    = {Secure Networking - {CQRE} (Secure) '99, International Exhibition
                  and Congress D{\"{u}}sseldorf, Germany, November 30 - December
                  2, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1740},
  pages        = {192--203},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-46701-7\_17},
  doi          = {10.1007/3-540-46701-7\_17},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cqre/SchneierMW99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KnudsenRW99,
  author       = {Lars R. Knudsen and
                  Matthew J. B. Robshaw and
                  David A. Wagner},
  editor       = {Michael J. Wiener},
  title        = {Truncated Differentials and Skipjack},
  booktitle    = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1666},
  pages        = {165--180},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48405-1\_11},
  doi          = {10.1007/3-540-48405-1\_11},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KnudsenRW99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/KelseySW99,
  author       = {John Kelsey and
                  Bruce Schneier and
                  David A. Wagner},
  editor       = {Lars R. Knudsen},
  title        = {Mod n Cryptanalysis, with Applications Against {RC5P} and {M6}},
  booktitle    = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome,
                  Italy, March 24-26, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1636},
  pages        = {139--155},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48519-8\_11},
  doi          = {10.1007/3-540-48519-8\_11},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/KelseySW99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Wagner99,
  author       = {David A. Wagner},
  editor       = {Lars R. Knudsen},
  title        = {The Boomerang Attack},
  booktitle    = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome,
                  Italy, March 24-26, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1636},
  pages        = {156--170},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48519-8\_12},
  doi          = {10.1007/3-540-48519-8\_12},
  timestamp    = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Wagner99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BiryukovW99,
  author       = {Alex Biryukov and
                  David A. Wagner},
  editor       = {Lars R. Knudsen},
  title        = {Slide Attacks},
  booktitle    = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome,
                  Italy, March 24-26, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1636},
  pages        = {245--259},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48519-8\_18},
  doi          = {10.1007/3-540-48519-8\_18},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BiryukovW99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/usits/GoldbergGWB99,
  author       = {Ian Goldberg and
                  Steven D. Gribble and
                  David A. Wagner and
                  Eric A. Brewer},
  title        = {The Ninja Jukebox},
  booktitle    = {2nd {USENIX} Symposium on Internet Technologies and Systems, USITS'99,
                  Boulder, Colorado, USA, October 11-14, 1999},
  publisher    = {{USENIX}},
  year         = {1999},
  url          = {http://www.usenix.org/publications/library/proceedings/usits99/goldberg.html},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/usits/GoldbergGWB99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/firstmonday/GoldbergW98,
  author       = {Ian Goldberg and
                  David A. Wagner},
  title        = {{TAZ} Servers and the Rewebber Network: Enabling Anonymous Publishing
                  on the World Wide Web},
  journal      = {First Monday},
  volume       = {3},
  number       = {4},
  year         = {1998},
  url          = {https://doi.org/10.5210/fm.v3i4.586},
  doi          = {10.5210/FM.V3I4.586},
  timestamp    = {Mon, 04 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/firstmonday/GoldbergW98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HallWKS98,
  author       = {Chris Hall and
                  David A. Wagner and
                  John Kelsey and
                  Bruce Schneier},
  editor       = {Hugo Krawczyk},
  title        = {Building PRFs from PRPs},
  booktitle    = {Advances in Cryptology - {CRYPTO} '98, 18th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1462},
  pages        = {370--389},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0055742},
  doi          = {10.1007/BFB0055742},
  timestamp    = {Tue, 01 Jun 2021 15:21:29 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HallWKS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/KelseySWH98,
  author       = {John Kelsey and
                  Bruce Schneier and
                  David A. Wagner and
                  Chris Hall},
  editor       = {Jean{-}Jacques Quisquater and
                  Yves Deswarte and
                  Catherine Meadows and
                  Dieter Gollmann},
  title        = {Side Channel Cryptanalysis of Product Ciphers},
  booktitle    = {Computer Security - {ESORICS} 98, 5th European Symposium on Research
                  in Computer Security, Louvain-la-Neuve, Belgium, September 16-18,
                  1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1485},
  pages        = {97--110},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0055858},
  doi          = {10.1007/BFB0055858},
  timestamp    = {Tue, 19 Sep 2023 14:44:32 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/KelseySWH98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/HallKSW98,
  author       = {Chris Hall and
                  John Kelsey and
                  Bruce Schneier and
                  David A. Wagner},
  editor       = {Rafael Hirschfeld},
  title        = {Cryptanalysis of {SPEED}},
  booktitle    = {Financial Cryptography, Second International Conference, FC'98, Anguilla,
                  British West Indies, February 23-25, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1465},
  pages        = {309--310},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0055491},
  doi          = {10.1007/BFB0055491},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/HallKSW98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/CoppersmithWSK98,
  author       = {Don Coppersmith and
                  David A. Wagner and
                  Bruce Schneier and
                  John Kelsey},
  editor       = {Serge Vaudenay},
  title        = {Cryptanalysis of {TWOPRIME}},
  booktitle    = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris,
                  France, March 23-25, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1372},
  pages        = {32--48},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-69710-1\_3},
  doi          = {10.1007/3-540-69710-1\_3},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/CoppersmithWSK98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/KelseySWH98,
  author       = {John Kelsey and
                  Bruce Schneier and
                  David A. Wagner and
                  Chris Hall},
  editor       = {Serge Vaudenay},
  title        = {Cryptanalytic Attacks on Pseudorandom Number Generators},
  booktitle    = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris,
                  France, March 23-25, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1372},
  pages        = {168--188},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-69710-1\_12},
  doi          = {10.1007/3-540-69710-1\_12},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/KelseySWH98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Wagner98,
  author       = {David A. Wagner},
  editor       = {Serge Vaudenay},
  title        = {Cryptanalysis of Some Recently-Proposed Multiple Modes of Operation},
  booktitle    = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris,
                  France, March 23-25, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1372},
  pages        = {254--269},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-69710-1\_17},
  doi          = {10.1007/3-540-69710-1\_17},
  timestamp    = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Wagner98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Wagner98a,
  author       = {David A. Wagner},
  editor       = {Serge Vaudenay},
  title        = {Differential Cryptanalysis of {KHF}},
  booktitle    = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris,
                  France, March 23-25, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1372},
  pages        = {293--296},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-69710-1\_20},
  doi          = {10.1007/3-540-69710-1\_20},
  timestamp    = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Wagner98a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/SchneierKWWH98,
  author       = {Bruce Schneier and
                  John Kelsey and
                  Doug Whiting and
                  David A. Wagner and
                  Chris Hall},
  editor       = {Stafford E. Tavares and
                  Henk Meijer},
  title        = {On the Twofish Key Schedule},
  booktitle    = {Selected Areas in Cryptography '98, SAC'98, Kingston, Ontario, Canada,
                  August 17-18, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1556},
  pages        = {27--42},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-48892-8\_3},
  doi          = {10.1007/3-540-48892-8\_3},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/SchneierKWWH98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/WagnerSDKMS98,
  author       = {David A. Wagner and
                  Leonie Simpson and
                  Ed Dawson and
                  John Kelsey and
                  William Millan and
                  Bruce Schneier},
  editor       = {Stafford E. Tavares and
                  Henk Meijer},
  title        = {Cryptanalysis of {ORYX}},
  booktitle    = {Selected Areas in Cryptography '98, SAC'98, Kingston, Ontario, Canada,
                  August 17-18, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1556},
  pages        = {296--305},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-48892-8\_23},
  doi          = {10.1007/3-540-48892-8\_23},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/WagnerSDKMS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/HallKRSW98,
  author       = {Chris Hall and
                  John Kelsey and
                  Vincent Rijmen and
                  Bruce Schneier and
                  David A. Wagner},
  editor       = {Stafford E. Tavares and
                  Henk Meijer},
  title        = {Cryptanalysis of {SPEED}},
  booktitle    = {Selected Areas in Cryptography '98, SAC'98, Kingston, Ontario, Canada,
                  August 17-18, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1556},
  pages        = {319--338},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-48892-8\_25},
  doi          = {10.1007/3-540-48892-8\_25},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/HallKRSW98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compcon/GoldbergWB97,
  author       = {Ian Goldberg and
                  David A. Wagner and
                  Eric A. Brewer},
  title        = {Privacy-enhancing technologies for the Internet},
  booktitle    = {Proceedings {IEEE} {COMPCON} 97, San Jose, California, USA, February
                  23-26, 1997, Digest of Papers},
  pages        = {103--109},
  publisher    = {{IEEE} Computer Society},
  year         = {1997},
  url          = {https://doi.org/10.1109/CMPCON.1997.584680},
  doi          = {10.1109/CMPCON.1997.584680},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compcon/GoldbergWB97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/WagnerSK97,
  author       = {David A. Wagner and
                  Bruce Schneier and
                  John Kelsey},
  editor       = {Burton S. Kaliski Jr.},
  title        = {Cryptanalysis of the Cellular Encryption Algorithm},
  booktitle    = {Advances in Cryptology - {CRYPTO} '97, 17th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1294},
  pages        = {526--537},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0052260},
  doi          = {10.1007/BFB0052260},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/WagnerSK97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/KelseySW97,
  author       = {John Kelsey and
                  Bruce Schneier and
                  David A. Wagner},
  editor       = {Yongfei Han and
                  Tatsuaki Okamoto and
                  Sihan Qing},
  title        = {Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES,
                  RC2, and {TEA}},
  booktitle    = {Information and Communication Security, First International Conference,
                  ICICS'97, Beijing, China, November 11-14, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1334},
  pages        = {233--246},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0028479},
  doi          = {10.1007/BFB0028479},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/KelseySW97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/KelseySHW97,
  author       = {John Kelsey and
                  Bruce Schneier and
                  Chris Hall and
                  David A. Wagner},
  editor       = {Eiji Okamoto and
                  George I. Davida and
                  Masahiro Mambo},
  title        = {Secure Applications of Low-Entropy Keys},
  booktitle    = {Information Security, First International Workshop, {ISW} '97, Tatsunokuchi,
                  Japan, September 17-19, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1396},
  pages        = {121--134},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0030415},
  doi          = {10.1007/BFB0030415},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/KelseySHW97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/KelseySW97,
  author       = {John Kelsey and
                  Bruce Schneier and
                  David A. Wagner},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  T. Mark A. Lomas and
                  Michael Roe},
  title        = {Protocol Interactions and the Chosen Protocol Attack},
  booktitle    = {Security Protocols, 5th International Workshop, Paris, France, April
                  7-9, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1361},
  pages        = {91--104},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0028162},
  doi          = {10.1007/BFB0028162},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/KelseySW97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcst/GrossW96,
  author       = {Eric M. Gross and
                  David A. Wagner},
  title        = {{KD} trees and Delaunay-based linear interpolation for function learning:
                  a comparison to neural networks with error backpropagation},
  journal      = {{IEEE} Trans. Control. Syst. Technol.},
  volume       = {4},
  number       = {6},
  pages        = {649--653},
  year         = {1996},
  url          = {https://doi.org/10.1109/87.541694},
  doi          = {10.1109/87.541694},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcst/GrossW96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KelseySW96,
  author       = {John Kelsey and
                  Bruce Schneier and
                  David A. Wagner},
  editor       = {Neal Koblitz},
  title        = {Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES},
  booktitle    = {Advances in Cryptology - {CRYPTO} '96, 16th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1109},
  pages        = {237--251},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-68697-5\_19},
  doi          = {10.1007/3-540-68697-5\_19},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KelseySW96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/WagnerB96,
  author       = {David A. Wagner and
                  Steven M. Bellovin},
  editor       = {James T. Ellis and
                  B. Clifford Neuman and
                  David M. Balenson},
  title        = {A "bump in the stack" encryptor for {MS-DOS} systems},
  booktitle    = {1996 Symposium on Network and Distributed System Security, {(S)NDSS}
                  '96, San Diego, CA, USA, February 22-23, 1996},
  pages        = {155--161},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  url          = {https://doi.org/10.1109/NDSS.1996.492422},
  doi          = {10.1109/NDSS.1996.492422},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/WagnerB96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/GoldbergWTB96,
  author       = {Ian Goldberg and
                  David A. Wagner and
                  Randi Thomas and
                  Eric A. Brewer},
  title        = {A Secure Environment for Untrusted Helper Applications},
  booktitle    = {Proceedings of the 6th {USENIX} Security Symposium, San Jose, CA,
                  USA, July 22-25, 1996},
  publisher    = {{USENIX} Association},
  year         = {1996},
  url          = {https://www.usenix.org/conference/6th-usenix-security-symposium/secure-environment-untrusted-helper-applications},
  timestamp    = {Mon, 01 Feb 2021 08:43:15 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/GoldbergWTB96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mascots/GrunwaldNSWZ93,
  author       = {Dirk Grunwald and
                  Gary J. Nutt and
                  Anthony M. Sloane and
                  David A. Wagner and
                  Benjamin G. Zorn},
  editor       = {Herbert D. Schwetman and
                  Jean C. Walrand and
                  Kallol Kumar Bagchi and
                  Doug DeGroot},
  title        = {A Testbed for Studying Parallel Programs and Parallel Execution Architectures},
  booktitle    = {{MASCOTS} '93, Proceedings of the International Workshop on Modeling,
                  Analysis, and Simulation On Computer and Telecommunication Systems,
                  January 17-20, 1993, La Jolla, San Diego, CA, {USA}},
  pages        = {95--106},
  publisher    = {The Society for Computer Simulation},
  year         = {1993},
  timestamp    = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mascots/GrunwaldNSWZ93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics