Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: David A. Wagner 0001
@article{DBLP:journals/corr/abs-2402-06363, author = {Sizhe Chen and Julien Piet and Chawin Sitawarin and David A. Wagner}, title = {StruQ: Defending Against Prompt Injection with Structured Queries}, journal = {CoRR}, volume = {abs/2402.06363}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.06363}, doi = {10.48550/ARXIV.2402.06363}, eprinttype = {arXiv}, eprint = {2402.06363}, timestamp = {Mon, 19 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-06363.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-09674, author = {Chawin Sitawarin and Norman Mu and David A. Wagner and Alexandre Araujo}, title = {{PAL:} Proxy-Guided Black-Box Attack on Large Language Models}, journal = {CoRR}, volume = {abs/2402.09674}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.09674}, doi = {10.48550/ARXIV.2402.09674}, eprinttype = {arXiv}, eprint = {2402.09674}, timestamp = {Wed, 21 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-09674.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-12617, author = {Banghua Zhu and Norman Mu and Jiantao Jiao and David A. Wagner}, title = {Generative {AI} Security: Challenges and Countermeasures}, journal = {CoRR}, volume = {abs/2402.12617}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.12617}, doi = {10.48550/ARXIV.2402.12617}, eprinttype = {arXiv}, eprint = {2402.12617}, timestamp = {Thu, 21 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-12617.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-18624, author = {Yangruibo Ding and Yanjun Fu and Omniyyah Ibrahim and Chawin Sitawarin and Xinyun Chen and Basel Alomair and David A. Wagner and Baishakhi Ray and Yizheng Chen}, title = {Vulnerability Detection with Code Language Models: How Far Are We?}, journal = {CoRR}, volume = {abs/2403.18624}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.18624}, doi = {10.48550/ARXIV.2403.18624}, eprinttype = {arXiv}, eprint = {2403.18624}, timestamp = {Wed, 10 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-18624.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/AVYBWTASK23, author = {Dhanya K. A. and P. Vinod and Suleiman Y. Yerima and Abul Bashar and David A. Wagner and Abhiram T. and Alan Antony and Ashil K. Shavanas and T. Gireesh Kumar}, title = {Obfuscated Malware Detection in IoT Android Applications Using Markov Images and {CNN}}, journal = {{IEEE} Syst. J.}, volume = {17}, number = {2}, pages = {2756--2766}, year = {2023}, url = {https://doi.org/10.1109/JSYST.2023.3238678}, doi = {10.1109/JSYST.2023.3238678}, timestamp = {Thu, 13 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sj/AVYBWTASK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccv/HingunSL023, author = {Nabeel Hingun and Chawin Sitawarin and Jerry Li and David A. Wagner}, title = {{REAP:} {A} Large-Scale Realistic Adversarial Patch Benchmark}, booktitle = {{IEEE/CVF} International Conference on Computer Vision, {ICCV} 2023, Paris, France, October 1-6, 2023}, pages = {4617--4628}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICCV51070.2023.00428}, doi = {10.1109/ICCV51070.2023.00428}, timestamp = {Mon, 22 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccv/HingunSL023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iclr/SitawarinP0C023, author = {Chawin Sitawarin and Kornrapat Pongmala and Yizheng Chen and Nicholas Carlini and David A. Wagner}, title = {Part-Based Models Improve Adversarial Robustness}, booktitle = {The Eleventh International Conference on Learning Representations, {ICLR} 2023, Kigali, Rwanda, May 1-5, 2023}, publisher = {OpenReview.net}, year = {2023}, url = {https://openreview.net/pdf?id=bAMTaeqluh4}, timestamp = {Fri, 30 Jun 2023 14:38:38 +0200}, biburl = {https://dblp.org/rec/conf/iclr/SitawarinP0C023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/0001DACW23, author = {Yizheng Chen and Zhoujie Ding and Lamya Alowain and Xinyun Chen and David A. Wagner}, title = {DiverseVul: {A} New Vulnerable Source Code Dataset for Deep Learning Based Vulnerability Detection}, booktitle = {Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18, 2023}, pages = {654--668}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607199.3607242}, doi = {10.1145/3607199.3607242}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/0001DACW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/0001D023, author = {Yizheng Chen and Zhoujie Ding and David A. Wagner}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {Continuous Learning for Android Malware Detection}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {1127--1144}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/chen-yizheng}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/0001D023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/PietSP023, author = {Julien Piet and Aashish Sharma and Vern Paxson and David A. Wagner}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {Network Detection of Interactive {SSH} Impostors Using Deep Learning}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {4283--4300}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/piet}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/PietSP023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-04332, author = {Yizheng Chen and Zhoujie Ding and David A. Wagner}, title = {Continuous Learning for Android Malware Detection}, journal = {CoRR}, volume = {abs/2302.04332}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.04332}, doi = {10.48550/ARXIV.2302.04332}, eprinttype = {arXiv}, eprint = {2302.04332}, timestamp = {Thu, 16 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-04332.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2304-00409, author = {Yizheng Chen and Zhoujie Ding and Xinyun Chen and David A. Wagner}, title = {DiverseVul: {A} New Vulnerable Source Code Dataset for Deep Learning Based Vulnerability Detection}, journal = {CoRR}, volume = {abs/2304.00409}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2304.00409}, doi = {10.48550/ARXIV.2304.00409}, eprinttype = {arXiv}, eprint = {2304.00409}, timestamp = {Tue, 18 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2304-00409.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-17645, author = {Chawin Sitawarin and Jaewon Chang and David Huang and Wesson Altoyan and David A. Wagner}, title = {Defending Against Transfer Attacks From Public Models}, journal = {CoRR}, volume = {abs/2310.17645}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.17645}, doi = {10.48550/ARXIV.2310.17645}, eprinttype = {arXiv}, eprint = {2310.17645}, timestamp = {Thu, 02 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-17645.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2311-04235, author = {Norman Mu and Sarah Chen and Zifan Wang and Sizhe Chen and David Karamardian and Lulwa Aljeraisy and Dan Hendrycks and David A. Wagner}, title = {Can LLMs Follow Simple Rules?}, journal = {CoRR}, volume = {abs/2311.04235}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2311.04235}, doi = {10.48550/ARXIV.2311.04235}, eprinttype = {arXiv}, eprint = {2311.04235}, timestamp = {Wed, 15 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2311-04235.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-00273, author = {Julien Piet and Chawin Sitawarin and Vivian Fang and Norman Mu and David A. Wagner}, title = {Mark My Words: Analyzing and Evaluating Language Model Watermarks}, journal = {CoRR}, volume = {abs/2312.00273}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.00273}, doi = {10.48550/ARXIV.2312.00273}, eprinttype = {arXiv}, eprint = {2312.00273}, timestamp = {Mon, 11 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-00273.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-17673, author = {Julien Piet and Maha Alrashed and Chawin Sitawarin and Sizhe Chen and Zeming Wei and Elizabeth Sun and Basel Alomair and David A. Wagner}, title = {Jatmo: Prompt Injection Defense by Task-Specific Finetuning}, journal = {CoRR}, volume = {abs/2312.17673}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.17673}, doi = {10.48550/ARXIV.2312.17673}, eprinttype = {arXiv}, eprint = {2312.17673}, timestamp = {Sun, 21 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-17673.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pacmhci/MalkinWE22, author = {Nathan Malkin and David A. Wagner and Serge Egelman}, title = {Can Humans Detect Malicious Always-Listening Assistants? {A} Framework for Crowdsourcing Test Drives}, journal = {Proc. {ACM} Hum. Comput. Interact.}, volume = {6}, number = {{CSCW2}}, pages = {1--28}, year = {2022}, url = {https://doi.org/10.1145/3555613}, doi = {10.1145/3555613}, timestamp = {Fri, 03 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pacmhci/MalkinWE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eccv/MuK0X22, author = {Norman Mu and Alexander Kirillov and David A. Wagner and Saining Xie}, editor = {Shai Avidan and Gabriel J. Brostow and Moustapha Ciss{\'{e}} and Giovanni Maria Farinella and Tal Hassner}, title = {{SLIP:} Self-supervision Meets Language-Image Pre-training}, booktitle = {Computer Vision - {ECCV} 2022 - 17th European Conference, Tel Aviv, Israel, October 23-27, 2022, Proceedings, Part {XXVI}}, series = {Lecture Notes in Computer Science}, volume = {13686}, pages = {529--544}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-19809-0\_30}, doi = {10.1007/978-3-031-19809-0\_30}, timestamp = {Thu, 03 Nov 2022 14:02:39 +0100}, biburl = {https://dblp.org/rec/conf/eccv/MuK0X22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icml/SitawarinG022, author = {Chawin Sitawarin and Zachary J. Golan{-}Strieb and David A. Wagner}, editor = {Kamalika Chaudhuri and Stefanie Jegelka and Le Song and Csaba Szepesv{\'{a}}ri and Gang Niu and Sivan Sabato}, title = {Demystifying the Adversarial Robustness of Random Transformation Defenses}, booktitle = {International Conference on Machine Learning, {ICML} 2022, 17-23 July 2022, Baltimore, Maryland, {USA}}, series = {Proceedings of Machine Learning Research}, volume = {162}, pages = {20232--20252}, publisher = {{PMLR}}, year = {2022}, url = {https://proceedings.mlr.press/v162/sitawarin22a.html}, timestamp = {Tue, 12 Jul 2022 17:36:52 +0200}, biburl = {https://dblp.org/rec/conf/icml/SitawarinG022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/Malkin0E22, author = {Nathan Malkin and David A. Wagner and Serge Egelman}, editor = {Sonia Chiasson and Apu Kapadia}, title = {Runtime Permissions for Privacy in Proactive Intelligent Assistants}, booktitle = {Eighteenth Symposium on Usable Privacy and Security, {SOUPS} 2022, Boston, MA, USA, August 7-9, 2022}, pages = {633--651}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/soups2022/presentation/malkin}, timestamp = {Wed, 26 Oct 2022 12:44:43 +0200}, biburl = {https://dblp.org/rec/conf/soups/Malkin0E22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2207-03574, author = {Chawin Sitawarin and Zachary J. Golan{-}Strieb and David A. Wagner}, title = {Demystifying the Adversarial Robustness of Random Transformation Defenses}, journal = {CoRR}, volume = {abs/2207.03574}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2207.03574}, doi = {10.48550/ARXIV.2207.03574}, eprinttype = {arXiv}, eprint = {2207.03574}, timestamp = {Wed, 13 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2207-03574.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2209-09117, author = {Chawin Sitawarin and Kornrapat Pongmala and Yizheng Chen and Nicholas Carlini and David A. Wagner}, title = {Part-Based Models Improve Adversarial Robustness}, journal = {CoRR}, volume = {abs/2209.09117}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2209.09117}, doi = {10.48550/ARXIV.2209.09117}, eprinttype = {arXiv}, eprint = {2209.09117}, timestamp = {Thu, 27 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2209-09117.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2212-05680, author = {Nabeel Hingun and Chawin Sitawarin and Jerry Li and David A. Wagner}, title = {{REAP:} {A} Large-Scale Realistic Adversarial Patch Benchmark}, journal = {CoRR}, volume = {abs/2212.05680}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2212.05680}, doi = {10.48550/ARXIV.2212.05680}, eprinttype = {arXiv}, eprint = {2212.05680}, timestamp = {Mon, 02 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2212-05680.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SitawarinCW21, author = {Chawin Sitawarin and Supriyo Chakraborty and David A. Wagner}, editor = {Nicholas Carlini and Ambra Demontis and Yizheng Chen}, title = {{SAT:} Improving Adversarial Training via Curriculum-Based Loss Smoothing}, booktitle = {AISec@CCS 2021: Proceedings of the 14th {ACM} Workshop on Artificial Intelligence and Security, Virtual Event, Republic of Korea, 15 November 2021}, pages = {25--36}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3474369.3486878}, doi = {10.1145/3474369.3486878}, timestamp = {Thu, 27 Oct 2022 08:08:03 +0200}, biburl = {https://dblp.org/rec/conf/ccs/SitawarinCW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangCW21, author = {Zhanyuan Zhang and Yizheng Chen and David A. Wagner}, editor = {Nicholas Carlini and Ambra Demontis and Yizheng Chen}, title = {{SEAT:} Similarity Encoder by Adversarial Training for Detecting Model Extraction Attack Queries}, booktitle = {AISec@CCS 2021: Proceedings of the 14th {ACM} Workshop on Artificial Intelligence and Security, Virtual Event, Republic of Korea, 15 November 2021}, pages = {37--48}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3474369.3486863}, doi = {10.1145/3474369.3486863}, timestamp = {Thu, 27 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ZhangCW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Chen0QLJW21, author = {Yizheng Chen and Shiqi Wang and Yue Qin and Xiaojing Liao and Suman Jana and David A. Wagner}, editor = {Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi}, title = {Learning Security Classifiers with Verified Global Robustness Properties}, booktitle = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021}, pages = {477--494}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460120.3484776}, doi = {10.1145/3460120.3484776}, timestamp = {Thu, 27 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Chen0QLJW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/SitawarinKSW21, author = {Chawin Sitawarin and Evgenios M. Kornaropoulos and Dawn Song and David A. Wagner}, editor = {Marc'Aurelio Ranzato and Alina Beygelzimer and Yann N. Dauphin and Percy Liang and Jennifer Wortman Vaughan}, title = {Adversarial Examples for k-Nearest Neighbor Classifiers Based on Higher-Order Voronoi Diagrams}, booktitle = {Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, NeurIPS 2021, December 6-14, 2021, virtual}, pages = {15486--15497}, year = {2021}, url = {https://proceedings.neurips.cc/paper/2021/hash/82ca5dd156cc926b2992f73c2896f761-Abstract.html}, timestamp = {Tue, 03 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nips/SitawarinKSW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/HoDAPSV021, author = {Grant Ho and Mayank Dhiman and Devdatta Akhawe and Vern Paxson and Stefan Savage and Geoffrey M. Voelker and David A. Wagner}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Hopper: Modeling and Detecting Lateral Movement}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {3093--3110}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/ho}, timestamp = {Mon, 20 Nov 2023 08:57:49 +0100}, biburl = {https://dblp.org/rec/conf/uss/HoDAPSV021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-00663, author = {Henry Xu and An Ju and David A. Wagner}, title = {Model-Agnostic Defense for Lane Detection against Adversarial Attack}, journal = {CoRR}, volume = {abs/2103.00663}, year = {2021}, url = {https://arxiv.org/abs/2103.00663}, eprinttype = {arXiv}, eprint = {2103.00663}, timestamp = {Mon, 08 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-00663.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-08714, author = {Dequan Wang and An Ju and Evan Shelhamer and David A. Wagner and Trevor Darrell}, title = {Fighting Gradients with Gradients: Dynamic Defenses against Adversarial Attacks}, journal = {CoRR}, volume = {abs/2105.08714}, year = {2021}, url = {https://arxiv.org/abs/2105.08714}, eprinttype = {arXiv}, eprint = {2105.08714}, timestamp = {Mon, 31 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-08714.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-11363, author = {Yizheng Chen and Shiqi Wang and Yue Qin and Xiaojing Liao and Suman Jana and David A. Wagner}, title = {Learning Security Classifiers with Verified Global Robustness Properties}, journal = {CoRR}, volume = {abs/2105.11363}, year = {2021}, url = {https://arxiv.org/abs/2105.11363}, eprinttype = {arXiv}, eprint = {2105.11363}, timestamp = {Thu, 27 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-11363.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-13442, author = {Grant Ho and Mayank Dhiman and Devdatta Akhawe and Vern Paxson and Stefan Savage and Geoffrey M. Voelker and David A. Wagner}, title = {Hopper: Modeling and Detecting Lateral Movement (Extended Report)}, journal = {CoRR}, volume = {abs/2105.13442}, year = {2021}, url = {https://arxiv.org/abs/2105.13442}, eprinttype = {arXiv}, eprint = {2105.13442}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-13442.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2112-12750, author = {Norman Mu and Alexander Kirillov and David A. Wagner and Saining Xie}, title = {{SLIP:} Self-supervision meets Language-Image Pre-training}, journal = {CoRR}, volume = {abs/2112.12750}, year = {2021}, url = {https://arxiv.org/abs/2112.12750}, eprinttype = {arXiv}, eprint = {2112.12750}, timestamp = {Fri, 07 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2112-12750.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/McCoydPCSRHLW20, author = {Michael McCoyd and Won Park and Steven Chen and Neil Shah and Ryan Roggenkemper and Minjune Hwang and Jason Xinyu Liu and David A. Wagner}, editor = {Jianying Zhou and Mauro Conti and Chuadhry Mujeeb Ahmed and Man Ho Au and Lejla Batina and Zhou Li and Jingqiang Lin and Eleonora Losiouk and Bo Luo and Suryadipta Majumdar and Weizhi Meng and Mart{\'{\i}}n Ochoa and Stjepan Picek and Georgios Portokalidis and Cong Wang and Kehuan Zhang}, title = {Minority Reports Defense: Defending Against Adversarial Patches}, booktitle = {Applied Cryptography and Network Security Workshops - {ACNS} 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S{\&}P, SCI, SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12418}, pages = {564--582}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-61638-0\_31}, doi = {10.1007/978-3-030-61638-0\_31}, timestamp = {Thu, 18 Feb 2021 13:46:45 +0100}, biburl = {https://dblp.org/rec/conf/acns/McCoydPCSRHLW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JuW20, author = {An Ju and David A. Wagner}, editor = {Jay Ligatti and Xinming Ou}, title = {{E-ABS:} Extending the Analysis-By-Synthesis Robust Classification Model to More Complex Image Domains}, booktitle = {AISec@CCS 2020: Proceedings of the 13th {ACM} Workshop on Artificial Intelligence and Security, Virtual Event, USA, 13 November 2020}, pages = {25--36}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3411508.3421382}, doi = {10.1145/3411508.3421382}, timestamp = {Mon, 08 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JuW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/SitawarinW20, author = {Chawin Sitawarin and David A. Wagner}, title = {Minimum-Norm Adversarial Examples on {KNN} and {KNN} based Models}, booktitle = {2020 {IEEE} Security and Privacy Workshops, {SP} Workshops, San Francisco, CA, USA, May 21, 2020}, pages = {34--40}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SPW50608.2020.00023}, doi = {10.1109/SPW50608.2020.00023}, timestamp = {Thu, 21 Sep 2023 16:11:10 +0200}, biburl = {https://dblp.org/rec/conf/sp/SitawarinW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ZhangYMW20, author = {Zhanyuan Zhang and Benson Yuan and Michael McCoyd and David A. Wagner}, title = {Clipped BagNet: Defending Against Sticker Attacks with Clipped Bag-of-features}, booktitle = {2020 {IEEE} Security and Privacy Workshops, {SP} Workshops, San Francisco, CA, USA, May 21, 2020}, pages = {55--61}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SPW50608.2020.00026}, doi = {10.1109/SPW50608.2020.00026}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/ZhangYMW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-06559, author = {Chawin Sitawarin and David A. Wagner}, title = {Minimum-Norm Adversarial Examples on {KNN} and KNN-Based Models}, journal = {CoRR}, volume = {abs/2003.06559}, year = {2020}, url = {https://arxiv.org/abs/2003.06559}, eprinttype = {arXiv}, eprint = {2003.06559}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-06559.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-09347, author = {Chawin Sitawarin and Supriyo Chakraborty and David A. Wagner}, title = {Improving Adversarial Robustness Through Progressive Hardening}, journal = {CoRR}, volume = {abs/2003.09347}, year = {2020}, url = {https://arxiv.org/abs/2003.09347}, eprinttype = {arXiv}, eprint = {2003.09347}, timestamp = {Tue, 24 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-09347.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2004-13799, author = {Michael McCoyd and Won Park and Steven Chen and Neil Shah and Ryan Roggenkemper and Minjune Hwang and Jason Xinyu Liu and David A. Wagner}, title = {Minority Reports Defense: Defending Against Adversarial Patches}, journal = {CoRR}, volume = {abs/2004.13799}, year = {2020}, url = {https://arxiv.org/abs/2004.13799}, eprinttype = {arXiv}, eprint = {2004.13799}, timestamp = {Sat, 02 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2004-13799.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-14030, author = {Neil Shah and Grant Ho and Marco Schweighauser and M. H. Afifi and Asaf Cidon and David A. Wagner}, title = {A Large-Scale Analysis of Attacker Activity in Compromised Enterprise Accounts}, journal = {CoRR}, volume = {abs/2007.14030}, year = {2020}, url = {https://arxiv.org/abs/2007.14030}, eprinttype = {arXiv}, eprint = {2007.14030}, timestamp = {Mon, 03 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-14030.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2011-09719, author = {Chawin Sitawarin and Evgenios M. Kornaropoulos and Dawn Song and David A. Wagner}, title = {Adversarial Examples for k-Nearest Neighbor Classifiers Based on Higher-Order Voronoi Diagrams}, journal = {CoRR}, volume = {abs/2011.09719}, year = {2020}, url = {https://arxiv.org/abs/2011.09719}, eprinttype = {arXiv}, eprint = {2011.09719}, timestamp = {Wed, 25 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2011-09719.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/MalkinDTWEW19, author = {Nathan Malkin and Joe Deatrick and Allen Tong and Primal Wijesekera and Serge Egelman and David A. Wagner}, title = {Privacy Attitudes of Smart Speaker Users}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2019}, number = {4}, pages = {250--271}, year = {2019}, url = {https://doi.org/10.2478/popets-2019-0068}, doi = {10.2478/POPETS-2019-0068}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/popets/MalkinDTWEW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/MalkinEW19, author = {Nathan Malkin and Serge Egelman and David A. Wagner}, editor = {Marco Carvalho and Wolter Pieters and Elizabeth Stobert}, title = {Privacy controls for always-listening devices}, booktitle = {{NSPW} '19: New Security Paradigms Workshop, San Carlos, Costa Rica, September 23-26, 2019}, pages = {78--91}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3368860.3368867}, doi = {10.1145/3368860.3368867}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/MalkinEW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Sitawarin019, author = {Chawin Sitawarin and David A. Wagner}, title = {On the Robustness of Deep K-Nearest Neighbors}, booktitle = {2019 {IEEE} Security and Privacy Workshops, {SP} Workshops 2019, San Francisco, CA, USA, May 19-23, 2019}, pages = {1--7}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SPW.2019.00014}, doi = {10.1109/SPW.2019.00014}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/sp/Sitawarin019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/HoCGSPSV019, author = {Grant Ho and Asaf Cidon and Lior Gavish and Marco Schweighauser and Vern Paxson and Stefan Savage and Geoffrey M. Voelker and David A. Wagner}, editor = {Nadia Heninger and Patrick Traynor}, title = {Detecting and Characterizing Lateral Phishing at Scale}, booktitle = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara, CA, USA, August 14-16, 2019}, pages = {1273--1290}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/usenixsecurity19/presentation/ho}, timestamp = {Mon, 01 Feb 2021 08:43:12 +0100}, biburl = {https://dblp.org/rec/conf/uss/HoCGSPSV019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1903-08333, author = {Chawin Sitawarin and David A. Wagner}, title = {On the Robustness of Deep K-Nearest Neighbors}, journal = {CoRR}, volume = {abs/1903.08333}, year = {2019}, url = {http://arxiv.org/abs/1903.08333}, eprinttype = {arXiv}, eprint = {1903.08333}, timestamp = {Wed, 03 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1903-08333.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1907-05587, author = {Steven Chen and Nicholas Carlini and David A. Wagner}, title = {Stateful Detection of Black-Box Adversarial Attacks}, journal = {CoRR}, volume = {abs/1907.05587}, year = {2019}, url = {http://arxiv.org/abs/1907.05587}, eprinttype = {arXiv}, eprint = {1907.05587}, timestamp = {Wed, 17 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1907-05587.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1910-00790, author = {Grant Ho and Asaf Cidon and Lior Gavish and Marco Schweighauser and Vern Paxson and Stefan Savage and Geoffrey M. Voelker and David A. Wagner}, title = {Detecting and Characterizing Lateral Phishing at Scale}, journal = {CoRR}, volume = {abs/1910.00790}, year = {2019}, url = {http://arxiv.org/abs/1910.00790}, eprinttype = {arXiv}, eprint = {1910.00790}, timestamp = {Fri, 04 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1910-00790.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/WijesekeraBTREW18, author = {Primal Wijesekera and Arjun Baokar and Lynn Tsai and Joel Reardon and Serge Egelman and David A. Wagner and Konstantin Beznosov}, title = {Dynamically Regulating Mobile Application Permissions}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {1}, pages = {64--71}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.1331031}, doi = {10.1109/MSP.2018.1331031}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/WijesekeraBTREW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/WijesekeraRRTCG18, author = {Primal Wijesekera and Joel Reardon and Irwin Reyes and Lynn Tsai and Jung{-}Wei Chen and Nathan Good and David A. Wagner and Konstantin Beznosov and Serge Egelman}, editor = {Regan L. Mandryk and Mark Hancock and Mark Perry and Anna L. Cox}, title = {Contextualizing Privacy Decisions for Better Prediction (and Protection)}, booktitle = {Proceedings of the 2018 {CHI} Conference on Human Factors in Computing Systems, {CHI} 2018, Montreal, QC, Canada, April 21-26, 2018}, pages = {268}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3173574.3173842}, doi = {10.1145/3173574.3173842}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/WijesekeraRRTCG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/IncerTA018, author = {Inigo Incer and Michael Theodorides and Sadia Afroz and David A. Wagner}, editor = {Rakesh M. Verma and Murat Kantarcioglu}, title = {Adversarially Robust Malware Detection Using Monotonic Classification}, booktitle = {Proceedings of the Fourth {ACM} International Workshop on Security and Privacy Analytics, IWSPA@CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018}, pages = {54--63}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3180445.3180449}, doi = {10.1145/3180445.3180449}, timestamp = {Wed, 28 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/IncerTA018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icml/AthalyeC018, author = {Anish Athalye and Nicholas Carlini and David A. Wagner}, editor = {Jennifer G. Dy and Andreas Krause}, title = {Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples}, booktitle = {Proceedings of the 35th International Conference on Machine Learning, {ICML} 2018, Stockholmsm{\"{a}}ssan, Stockholm, Sweden, July 10-15, 2018}, series = {Proceedings of Machine Learning Research}, volume = {80}, pages = {274--283}, publisher = {{PMLR}}, year = {2018}, url = {http://proceedings.mlr.press/v80/athalye18a.html}, timestamp = {Wed, 03 Apr 2019 18:17:30 +0200}, biburl = {https://dblp.org/rec/conf/icml/AthalyeC018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Carlini018, author = {Nicholas Carlini and David A. Wagner}, title = {Audio Adversarial Examples: Targeted Attacks on Speech-to-Text}, booktitle = {2018 {IEEE} Security and Privacy Workshops, {SP} Workshops 2018, San Francisco, CA, USA, May 24, 2018}, pages = {1--7}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SPW.2018.00009}, doi = {10.1109/SPW.2018.00009}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/sp/Carlini018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/McCoyd018, author = {Michael McCoyd and David A. Wagner}, title = {Background Class Defense Against Adversarial Examples}, booktitle = {2018 {IEEE} Security and Privacy Workshops, {SP} Workshops 2018, San Francisco, CA, USA, May 24, 2018}, pages = {96--102}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SPW.2018.00023}, doi = {10.1109/SPW.2018.00023}, timestamp = {Wed, 08 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/McCoyd018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wimob/ChenPYW18, author = {Steven Chen and Won Park and Joanna Yang and David A. Wagner}, title = {Inferring Phone Location State}, booktitle = {14th International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2018, Limassol, Cyprus, October 15-17, 2018}, pages = {42--47}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/WiMOB.2018.8589190}, doi = {10.1109/WIMOB.2018.8589190}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/wimob/ChenPYW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1801-01944, author = {Nicholas Carlini and David A. Wagner}, title = {Audio Adversarial Examples: Targeted Attacks on Speech-to-Text}, journal = {CoRR}, volume = {abs/1801.01944}, year = {2018}, url = {http://arxiv.org/abs/1801.01944}, eprinttype = {arXiv}, eprint = {1801.01944}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1801-01944.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1802-00420, author = {Anish Athalye and Nicholas Carlini and David A. Wagner}, title = {Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples}, journal = {CoRR}, volume = {abs/1802.00420}, year = {2018}, url = {http://arxiv.org/abs/1802.00420}, eprinttype = {arXiv}, eprint = {1802.00420}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1802-00420.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/LeeFMIEW17, author = {Linda Naeun Lee and David Fifield and Nathan Malkin and Ganesh Iyer and Serge Egelman and David A. Wagner}, title = {A Usability Evaluation of Tor Launcher}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2017}, number = {3}, pages = {90}, year = {2017}, url = {https://doi.org/10.1515/popets-2017-0030}, doi = {10.1515/POPETS-2017-0030}, timestamp = {Tue, 01 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/popets/LeeFMIEW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/000117, author = {David A. Wagner}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Security and Machine Learning}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134108}, doi = {10.1145/3133956.3134108}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/ccs/000117.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Carlini017, author = {Nicholas Carlini and David A. Wagner}, editor = {Bhavani Thuraisingham and Battista Biggio and David Mandell Freeman and Brad Miller and Arunesh Sinha}, title = {Adversarial Examples Are Not Easily Detected: Bypassing Ten Detection Methods}, booktitle = {Proceedings of the 10th {ACM} Workshop on Artificial Intelligence and Security, AISec@CCS 2017, Dallas, TX, USA, November 3, 2017}, pages = {3--14}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3128572.3140444}, doi = {10.1145/3128572.3140444}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Carlini017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/Theodorides017, author = {Michael Theodorides and David A. Wagner}, title = {Breaking active-set backward-edge {CFI}}, booktitle = {2017 {IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2017, McLean, VA, USA, May 1-5, 2017}, pages = {85--89}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/HST.2017.7951803}, doi = {10.1109/HST.2017.7951803}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/Theodorides017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/promise/Thompson017, author = {Christopher Thompson and David A. Wagner}, editor = {Burak Turhan and David Bowes and Emad Shihab}, title = {A Large-Scale Study of Modern Code Review and Security in Open Source Projects}, booktitle = {Proceedings of the 13th International Conference on Predictive Models and Data Analytics in Software Engineering, {PROMISE} 2017, Toronto, Canada, November 8, 2017}, pages = {83--92}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3127005.3127014}, doi = {10.1145/3127005.3127014}, timestamp = {Wed, 30 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/promise/Thompson017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/TsaiWRRE0GC17, author = {Lynn Tsai and Primal Wijesekera and Joel Reardon and Irwin Reyes and Serge Egelman and David A. Wagner and Nathan Good and Jung{-}Wei Chen}, title = {Turtle Guard: Helping Android Users Apply Contextual Privacy Preferences}, booktitle = {Thirteenth Symposium on Usable Privacy and Security, {SOUPS} 2017, Santa Clara, CA, USA, July 12-14, 2017}, pages = {145--162}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/soups2017/technical-sessions/presentation/tsai}, timestamp = {Wed, 19 Jul 2017 17:13:43 +0200}, biburl = {https://dblp.org/rec/conf/soups/TsaiWRRE0GC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Carlini017, author = {Nicholas Carlini and David A. Wagner}, title = {Towards Evaluating the Robustness of Neural Networks}, booktitle = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose, CA, USA, May 22-26, 2017}, pages = {39--57}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SP.2017.49}, doi = {10.1109/SP.2017.49}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/Carlini017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/WijesekeraBTREW17, author = {Primal Wijesekera and Arjun Baokar and Lynn Tsai and Joel Reardon and Serge Egelman and David A. Wagner and Konstantin Beznosov}, title = {The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences}, booktitle = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose, CA, USA, May 22-26, 2017}, pages = {1077--1093}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SP.2017.51}, doi = {10.1109/SP.2017.51}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/WijesekeraBTREW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/HoSJP017, author = {Grant Ho and Aashish Sharma and Mobin Javed and Vern Paxson and David A. Wagner}, editor = {Engin Kirda and Thomas Ristenpart}, title = {Detecting Credential Spearphishing in Enterprise Settings}, booktitle = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver, BC, Canada, August 16-18, 2017}, pages = {469--485}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/ho}, timestamp = {Mon, 01 Feb 2021 08:42:59 +0100}, biburl = {https://dblp.org/rec/conf/uss/HoSJP017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/DangM017, author = {Thurston H. Y. Dang and Petros Maniatis and David A. Wagner}, editor = {Engin Kirda and Thomas Ristenpart}, title = {Oscar: {A} Practical Page-Permissions-Based Scheme for Thwarting Dangling Pointers}, booktitle = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver, BC, Canada, August 16-18, 2017}, pages = {815--832}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/dang}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/DangM017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/WijesekeraBTREW17, author = {Primal Wijesekera and Arjun Baokar and Lynn Tsai and Joel Reardon and Serge Egelman and David A. Wagner and Konstantin Beznosov}, title = {The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences}, journal = {CoRR}, volume = {abs/1703.02090}, year = {2017}, url = {http://arxiv.org/abs/1703.02090}, eprinttype = {arXiv}, eprint = {1703.02090}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/WijesekeraBTREW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/CarliniW17, author = {Nicholas Carlini and David A. Wagner}, title = {Adversarial Examples Are Not Easily Detected: Bypassing Ten Detection Methods}, journal = {CoRR}, volume = {abs/1705.07263}, year = {2017}, url = {http://arxiv.org/abs/1705.07263}, eprinttype = {arXiv}, eprint = {1705.07263}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/CarliniW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1711-08478, author = {Nicholas Carlini and David A. Wagner}, title = {MagNet and "Efficient Defenses Against Adversarial Attacks" are Not Robust to Adversarial Examples}, journal = {CoRR}, volume = {abs/1711.08478}, year = {2017}, url = {http://arxiv.org/abs/1711.08478}, eprinttype = {arXiv}, eprint = {1711.08478}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1711-08478.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Wagner16, author = {David A. Wagner}, title = {Fairness and the coin flip: technical perspective}, journal = {Commun. {ACM}}, volume = {59}, number = {4}, pages = {75}, year = {2016}, url = {https://doi.org/10.1145/2898429}, doi = {10.1145/2898429}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Wagner16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ThompsonW16, author = {Christopher Thompson and David A. Wagner}, editor = {Long Lu and Mohammad Mannan}, title = {Securing Recognizers for Rich Video Applications}, booktitle = {Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM@CCS 2016, Vienna, Austria, October 24, 2016}, pages = {53--62}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2994461}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ThompsonW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HoLMHSW16, author = {Grant Ho and Derek Leung and Pratyush Mishra and Ashkan Hosseini and Dawn Song and David A. Wagner}, editor = {Xiaofeng Chen and XiaoFeng Wang and Xinyi Huang}, title = {Smart Locks: Lessons for Securing Commodity Internet of Things Devices}, booktitle = {Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016}, pages = {461--472}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2897845.2897886}, doi = {10.1145/2897845.2897886}, timestamp = {Mon, 25 Apr 2022 08:42:03 +0200}, biburl = {https://dblp.org/rec/conf/ccs/HoLMHSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BeekmanMW16, author = {Jethro G. Beekman and John L. Manferdelli and David A. Wagner}, editor = {Xiaofeng Chen and XiaoFeng Wang and Xinyi Huang}, title = {Attestation Transparency: Building secure Internet services for legacy clients}, booktitle = {Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016}, pages = {687--698}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2897845.2897895}, doi = {10.1145/2897845.2897895}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BeekmanMW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/MalkinEW16, author = {Nathan Malkin and Serge Egelman and David A. Wagner}, title = {Recovering High-Value Secrets with {SGX} and Social Authentication}, booktitle = {Who Are You?! Adventures in Authentication, WAY@SOUPS 2016, Denver, CO, USA, June 22, 2016}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/soups2016/workshop-program/way2016/presentation/recovering-high-value-secrets-sgx-and}, timestamp = {Wed, 14 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/soups/MalkinEW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/CarliniMVZSSWZ16, author = {Nicholas Carlini and Pratyush Mishra and Tavish Vaidya and Yuankai Zhang and Micah Sherr and Clay Shields and David A. Wagner and Wenchao Zhou}, editor = {Thorsten Holz and Stefan Savage}, title = {Hidden Voice Commands}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {513--530}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/carlini}, timestamp = {Mon, 15 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/CarliniMVZSSWZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/CarliniW16, author = {Nicholas Carlini and David A. Wagner}, title = {Defensive Distillation is Not Robust to Adversarial Examples}, journal = {CoRR}, volume = {abs/1607.04311}, year = {2016}, url = {http://arxiv.org/abs/1607.04311}, eprinttype = {arXiv}, eprint = {1607.04311}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/CarliniW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/McCoydW16, author = {Michael McCoyd and David A. Wagner}, title = {Spoofing 2D Face Detection: Machines See People Who Aren't There}, journal = {CoRR}, volume = {abs/1608.02128}, year = {2016}, url = {http://arxiv.org/abs/1608.02128}, eprinttype = {arXiv}, eprint = {1608.02128}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/McCoydW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/CarliniW16a, author = {Nicholas Carlini and David A. Wagner}, title = {Towards Evaluating the Robustness of Neural Networks}, journal = {CoRR}, volume = {abs/1608.04644}, year = {2016}, url = {http://arxiv.org/abs/1608.04644}, eprinttype = {arXiv}, eprint = {1608.04644}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/CarliniW16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DangMW15, author = {Thurston H. Y. Dang and Petros Maniatis and David A. Wagner}, editor = {Feng Bao and Steven Miller and Jianying Zhou and Gail{-}Joon Ahn}, title = {The Performance Cost of Shadow Stacks and Stack Canaries}, booktitle = {Proceedings of the 10th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17, 2015}, pages = {555--566}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2714576.2714635}, doi = {10.1145/2714576.2714635}, timestamp = {Thu, 20 Oct 2022 10:45:07 +0200}, biburl = {https://dblp.org/rec/conf/ccs/DangMW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/PortnoffLEMLW15, author = {Rebecca S. Portnoff and Linda Naeun Lee and Serge Egelman and Pratyush Mishra and Derek Leung and David A. Wagner}, editor = {Bo Begole and Jinwoo Kim and Kori Inkpen and Woontack Woo}, title = {Somebody's Watching Me?: Assessing the Effectiveness of Webcam Indicator Lights}, booktitle = {Proceedings of the 33rd Annual {ACM} Conference on Human Factors in Computing Systems, {CHI} 2015, Seoul, Republic of Korea, April 18-23, 2015}, pages = {1649--1658}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2702123.2702164}, doi = {10.1145/2702123.2702164}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/PortnoffLEMLW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/CarliniBPWG15, author = {Nicholas Carlini and Antonio Barresi and Mathias Payer and David A. Wagner and Thomas R. Gross}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {Control-Flow Bending: On the Effectiveness of Control-Flow Integrity}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {161--176}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/carlini}, timestamp = {Mon, 01 Feb 2021 08:42:57 +0100}, biburl = {https://dblp.org/rec/conf/uss/CarliniBPWG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/WijesekeraBHEWB15, author = {Primal Wijesekera and Arjun Baokar and Ashkan Hosseini and Serge Egelman and David A. Wagner and Konstantin Beznosov}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {Android Permissions Remystified: {A} Field Study on Contextual Integrity}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {499--514}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/wijesekera}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/WijesekeraBHEWB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/WijesekeraBHEWB15, author = {Primal Wijesekera and Arjun Baokar and Ashkan Hosseini and Serge Egelman and David A. Wagner and Konstantin Beznosov}, title = {Android Permissions Remystified: {A} Field Study on Contextual Integrity}, journal = {CoRR}, volume = {abs/1504.03747}, year = {2015}, url = {http://arxiv.org/abs/1504.03747}, eprinttype = {arXiv}, eprint = {1504.03747}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/WijesekeraBHEWB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/LeeELW15, author = {Linda Naeun Lee and Serge Egelman and Joong Hwa Lee and David A. Wagner}, title = {Risk Perceptions for Wearable Devices}, journal = {CoRR}, volume = {abs/1504.05694}, year = {2015}, url = {http://arxiv.org/abs/1504.05694}, eprinttype = {arXiv}, eprint = {1504.05694}, timestamp = {Tue, 01 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/LeeELW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/Wagner14, author = {David A. Wagner}, title = {Developing Social Capital in Online Communities: The Challenge of Fluidity}, booktitle = {20th Americas Conference on Information Systems, {AMCIS} 2014, Savannah, Georgia, USA, August 7-9, 2014}, publisher = {Association for Information Systems}, year = {2014}, url = {http://aisel.aisnet.org/amcis2014/SocioTechnicalIssues/GeneralPresentations/8}, timestamp = {Wed, 14 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/amcis/Wagner14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/EgelmanJPLCW14, author = {Serge Egelman and Sakshi Jain and Rebecca S. Portnoff and Kerwell Liao and Sunny Consolvo and David A. Wagner}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Are You Ready to Lock?}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {750--761}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660273}, doi = {10.1145/2660267.2660273}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/EgelmanJPLCW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/TanNTNTEW14, author = {Joshua Tan and Khanh Nguyen and Michael Theodorides and Heidi Negr{\'{o}}n{-}Arroyo and Christopher Thompson and Serge Egelman and David A. Wagner}, editor = {Matt Jones and Philippe A. Palanque and Albrecht Schmidt and Tovi Grossman}, title = {The effect of developer-specified explanations for permission requests on smartphone user behavior}, booktitle = {{CHI} Conference on Human Factors in Computing Systems, CHI'14, Toronto, ON, Canada - April 26 - May 01, 2014}, pages = {91--100}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2556288.2557400}, doi = {10.1145/2556288.2557400}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/TanNTNTEW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/CarliniW14, author = {Nicholas Carlini and David A. Wagner}, editor = {Kevin Fu and Jaeyeon Jung}, title = {{ROP} is Still Dangerous: Breaking Modern Defenses}, booktitle = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA, USA, August 20-22, 2014}, pages = {385--399}, publisher = {{USENIX} Association}, year = {2014}, url = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/carlini}, timestamp = {Mon, 01 Feb 2021 08:43:04 +0100}, biburl = {https://dblp.org/rec/conf/uss/CarliniW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccnc/HaW13, author = {Elizabeth Ha and David A. Wagner}, title = {Do Android users write about electric sheep? Examining consumer reviews in Google Play}, booktitle = {10th {IEEE} Consumer Communications and Networking Conference, {CCNC} 2013, Las Vegas, NV, USA, January 11-14, 2013}, pages = {149--157}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CCNC.2013.6488439}, doi = {10.1109/CCNC.2013.6488439}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/ccnc/HaW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/essos/EdmundsonHRFMW13, author = {Anne Edmundson and Brian Holtkamp and Emanuel Rivera and Matthew Finifter and Adrian Mettler and David A. Wagner}, editor = {Jan J{\"{u}}rjens and Benjamin Livshits and Riccardo Scandariato}, title = {An Empirical Study on the Effectiveness of Security Code Review}, booktitle = {Engineering Secure Software and Systems - 5th International Symposium, ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7781}, pages = {197--212}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36563-8\_14}, doi = {10.1007/978-3-642-36563-8\_14}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/essos/EdmundsonHRFMW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/memocode/SturtonSDJMTMSW13, author = {Cynthia Sturton and Rohit Sinha and Thurston H. Y. Dang and Sakshi Jain and Michael McCoyd and Wei Yang Tan and Petros Maniatis and Sanjit A. Seshia and David A. Wagner}, title = {Symbolic software model validation}, booktitle = {11th {ACM/IEEE} International Conference on Formal Methods and Models for Codesign, {MEMCODE} 2013, Portland, OR, USA, October 18-20, 2013}, pages = {97--108}, publisher = {{IEEE}}, year = {2013}, url = {https://ieeexplore.ieee.org/document/6670946/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/memocode/SturtonSDJMTMSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/ThompsonJEWK13, author = {Christopher Thompson and Maritza L. Johnson and Serge Egelman and David A. Wagner and Jennifer King}, editor = {Lujo Bauer and Konstantin Beznosov and Lorrie Faith Cranor}, title = {When it's better to ask forgiveness than get permission: attribution mechanisms for smartphone resources}, booktitle = {Symposium On Usable Privacy and Security, {SOUPS} '13, Newcastle, United Kingdom, July 24-26, 2013}, pages = {1:1--1:14}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2501604.2501605}, doi = {10.1145/2501604.2501605}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/soups/ThompsonJEWK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/FinifterAW13, author = {Matthew Finifter and Devdatta Akhawe and David A. Wagner}, editor = {Samuel T. King}, title = {An Empirical Study of Vulnerability Rewards Programs}, booktitle = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC, USA, August 14-16, 2013}, pages = {273--288}, publisher = {{USENIX} Association}, year = {2013}, url = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/presentation/finifter}, timestamp = {Mon, 01 Feb 2021 08:42:56 +0100}, biburl = {https://dblp.org/rec/conf/uss/FinifterAW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KimCCYWW13, author = {Eric Kim and Nicholas Carlini and Andrew Chang and George Yiu and Kai Wang and David A. Wagner}, title = {Improved Support for Machine-assisted Ballot-level Audits}, booktitle = {2013 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, {EVT/WOTE} '13, Washington, D.C., USA, August 12-13, 2013}, publisher = {{USENIX} Association}, year = {2013}, url = {https://www.usenix.org/conference/evtwote13/workshop-program/presentation/kim}, timestamp = {Mon, 22 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/KimCCYWW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ChinW13, author = {Erika Chin and David A. Wagner}, editor = {Yongdae Kim and Heejo Lee and Adrian Perrig}, title = {Bifocals: Analyzing WebView Vulnerabilities in Android Applications}, booktitle = {Information Security Applications - 14th International Workshop, {WISA} 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8267}, pages = {138--159}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-05149-9\_9}, doi = {10.1007/978-3-319-05149-9\_9}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ChinW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/daglib/p/EgelmanFW13, author = {Serge Egelman and Adrienne Porter Felt and David A. Wagner}, editor = {Rainer B{\"{o}}hme}, title = {Choice Architecture and Smartphone Privacy: There's a Price for That}, booktitle = {The Economics of Information Security and Privacy}, pages = {211--236}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39498-0\_10}, doi = {10.1007/978-3-642-39498-0\_10}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/daglib/p/EgelmanFW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/StarkW12, author = {Philip B. Stark and David A. Wagner}, title = {Evidence-Based Elections}, journal = {{IEEE} Secur. Priv.}, volume = {10}, number = {5}, pages = {33--41}, year = {2012}, url = {https://doi.org/10.1109/MSP.2012.62}, doi = {10.1109/MSP.2012.62}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/StarkW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FeltEW12, author = {Adrienne Porter Felt and Serge Egelman and David A. Wagner}, editor = {Ting Yu and William Enck and Xuxian Jiang}, title = {I've got 99 problems, but vibration ain't one: a survey of smartphone users' concerns}, booktitle = {SPSM'12, Proceedings of the Workshop on Security and Privacy in Smartphones and Mobile Devices, Co-located with {CCS} 2012, October 19, 2012, Raleigh, NC, {USA}}, pages = {33--44}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2381934.2381943}, doi = {10.1145/2381934.2381943}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/FeltEW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FisherDW12, author = {Drew Fisher and Leah Dorner and David A. Wagner}, editor = {Ting Yu and William Enck and Xuxian Jiang}, title = {Short paper: location privacy: user behavior in the field}, booktitle = {SPSM'12, Proceedings of the Workshop on Security and Privacy in Smartphones and Mobile Devices, Co-located with {CCS} 2012, October 19, 2012, Raleigh, NC, {USA}}, pages = {51--56}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2381934.2381945}, doi = {10.1145/2381934.2381945}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/FisherDW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KantolaCHW12, author = {David Kantola and Erika Chin and Warren He and David A. Wagner}, editor = {Ting Yu and William Enck and Xuxian Jiang}, title = {Reducing attack surfaces for intra-application communication in android}, booktitle = {SPSM'12, Proceedings of the Workshop on Security and Privacy in Smartphones and Mobile Devices, Co-located with {CCS} 2012, October 19, 2012, Raleigh, NC, {USA}}, pages = {69--80}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2381934.2381948}, doi = {10.1145/2381934.2381948}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KantolaCHW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PearceFNW12, author = {Paul Pearce and Adrienne Porter Felt and Gabriel Nunez and David A. Wagner}, editor = {Heung Youl Youm and Yoojae Won}, title = {AdDroid: privilege separation for applications and advertisers in Android}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {71--72}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414498}, doi = {10.1145/2414456.2414498}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/PearceFNW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fmcad/SinhaSMSW12, author = {Rohit Sinha and Cynthia Sturton and Petros Maniatis and Sanjit A. Seshia and David A. Wagner}, editor = {Gianpiero Cabodi and Satnam Singh}, title = {Verification with small and short worlds}, booktitle = {Formal Methods in Computer-Aided Design, {FMCAD} 2012, Cambridge, UK, October 22-25, 2012}, pages = {68--77}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6462557/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fmcad/SinhaSMSW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/ChinFSW12, author = {Erika Chin and Adrienne Porter Felt and Vyas Sekar and David A. Wagner}, editor = {Lorrie Faith Cranor}, title = {Measuring user confidence in smartphone security and privacy}, booktitle = {Symposium On Usable Privacy and Security, {SOUPS} '12, Washington, DC, {USA} - July 11 - 13, 2012}, pages = {1}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2335356.2335358}, doi = {10.1145/2335356.2335358}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/soups/ChinFSW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/FeltHEHCW12, author = {Adrienne Porter Felt and Elizabeth Ha and Serge Egelman and Ariel Haney and Erika Chin and David A. Wagner}, editor = {Lorrie Faith Cranor}, title = {Android permissions: user attention, comprehension, and behavior}, booktitle = {Symposium On Usable Privacy and Security, {SOUPS} '12, Washington, DC, {USA} - July 11 - 13, 2012}, pages = {3}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2335356.2335360}, doi = {10.1145/2335356.2335360}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/soups/FeltHEHCW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BaxterEOQRSW12, author = {Patrick Baxter and Anne Edmundson and Keishla Ortiz and Ana Maria Quevedo and Samuel Rodr{\'{\i}}guez and Cynthia Sturton and David A. Wagner}, editor = {J. Alex Halderman and Olivier Pereira}, title = {Automated Analysis of Election Audit Logs}, booktitle = {2012 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, {EVT/WOTE} '12, Bellevue, WA, USA, August 6-7, 2012}, publisher = {{USENIX} Association}, year = {2012}, url = {https://www.usenix.org/conference/evtwote12/workshop-program/presentation/baxter}, timestamp = {Mon, 01 Feb 2021 08:43:08 +0100}, biburl = {https://dblp.org/rec/conf/uss/BaxterEOQRSW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/CarliniFW12, author = {Nicholas Carlini and Adrienne Porter Felt and David A. Wagner}, editor = {Tadayoshi Kohno}, title = {An Evaluation of the Google Chrome Extension Security Architecture}, booktitle = {Proceedings of the 21th {USENIX} Security Symposium, Bellevue, WA, USA, August 8-10, 2012}, pages = {97--111}, publisher = {{USENIX} Association}, year = {2012}, url = {https://www.usenix.org/conference/usenixsecurity12/technical-sessions/presentation/carlini}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/CarliniFW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/FeltEFAW12, author = {Adrienne Porter Felt and Serge Egelman and Matthew Finifter and Devdatta Akhawe and David A. Wagner}, editor = {Patrick Traynor}, title = {How to Ask for Permission}, booktitle = {7th {USENIX} Workshop on Hot Topics in Security, HotSec'12, Bellevue, WA, USA, August 7, 2012}, publisher = {{USENIX} Association}, year = {2012}, url = {https://www.usenix.org/conference/hotsec12/workshop-program/presentation/felt}, timestamp = {Mon, 01 Feb 2021 08:43:14 +0100}, biburl = {https://dblp.org/rec/conf/uss/FeltEFAW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/WangCKMNW12, author = {Kai Wang and Nicholas Carlini and Eric Kim and Ivan Motyashov and Daniel Nguyen and David A. Wagner}, editor = {J. Alex Halderman and Olivier Pereira}, title = {Operator-Assisted Tabulation of Optical Scan Ballots}, booktitle = {2012 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, {EVT/WOTE} '12, Bellevue, WA, USA, August 6-7, 2012}, publisher = {{USENIX} Association}, year = {2012}, url = {https://www.usenix.org/conference/evtwote12/workshop-program/presentation/wang\_kai}, timestamp = {Mon, 22 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/WangCKMNW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/weis/EgelmanFW12, author = {Serge Egelman and Adrienne Porter Felt and David A. Wagner}, title = {Choice Architecture and Smartphone Privacy: There's a Price for That}, booktitle = {11th Annual Workshop on the Economics of Information Security, {WEIS} 2012, Berlin, Germany, 25-26 June, 2012}, year = {2012}, url = {http://weis2012.econinfosec.org/papers/Egelman\_WEIS2012.pdf}, timestamp = {Thu, 22 Jul 2021 16:15:45 +0200}, biburl = {https://dblp.org/rec/conf/weis/EgelmanFW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/LiskovRW11, author = {Moses D. Liskov and Ronald L. Rivest and David A. Wagner}, title = {Tweakable Block Ciphers}, journal = {J. Cryptol.}, volume = {24}, number = {3}, pages = {588--613}, year = {2011}, url = {https://doi.org/10.1007/s00145-010-9073-y}, doi = {10.1007/S00145-010-9073-Y}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/LiskovRW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FeltFCHW11, author = {Adrienne Porter Felt and Matthew Finifter and Erika Chin and Steve Hanna and David A. Wagner}, editor = {Xuxian Jiang and Amiya Bhattacharya and Partha Dasgupta and William Enck}, title = {A survey of mobile malware in the wild}, booktitle = {SPSM'11, Proceedings of the 1st {ACM} Workshop Security and Privacy in Smartphones and Mobile Devices, Co-located with {CCS} 2011, October 17, 2011, Chicago, IL, {USA}}, pages = {3--14}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046614.2046618}, doi = {10.1145/2046614.2046618}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/FeltFCHW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FeltFWW11, author = {Adrienne Porter Felt and Matthew Finifter and Joel Weinberger and David A. Wagner}, editor = {Bruce S. N. Cheung and Lucas Chi Kwong Hui and Ravi S. Sandhu and Duncan S. Wong}, title = {Diesel: applying privilege separation to database access}, booktitle = {Proceedings of the 6th {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2011, Hong Kong, China, March 22-24, 2011}, pages = {416--422}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1966913.1966971}, doi = {10.1145/1966913.1966971}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/FeltFWW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FeltCHSW11, author = {Adrienne Porter Felt and Erika Chin and Steve Hanna and Dawn Song and David A. Wagner}, editor = {Yan Chen and George Danezis and Vitaly Shmatikov}, title = {Android permissions demystified}, booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011}, pages = {627--638}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046707.2046779}, doi = {10.1145/2046707.2046779}, timestamp = {Tue, 10 Nov 2020 19:56:39 +0100}, biburl = {https://dblp.org/rec/conf/ccs/FeltCHSW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisys/ChinFGW11, author = {Erika Chin and Adrienne Porter Felt and Kate Greenwood and David A. Wagner}, editor = {Ashok K. Agrawala and Mark D. Corner and David Wetherall}, title = {Analyzing inter-application communication in Android}, booktitle = {Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services (MobiSys 2011), Bethesda, MD, USA, June 28 - July 01, 2011}, pages = {239--252}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1999995.2000018}, doi = {10.1145/1999995.2000018}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobisys/ChinFGW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/SturtonHWK11, author = {Cynthia Sturton and Matthew Hicks and David A. Wagner and Samuel T. King}, title = {Defeating {UCI:} Building Stealthy and Malicious Hardware}, booktitle = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May 2011, Berkeley, California, {USA}}, pages = {64--77}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/SP.2011.32}, doi = {10.1109/SP.2011.32}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/SturtonHWK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/JiKSTCW11, author = {Theron Ji and Eric Kim and Raji Srikantan and Alan Tsai and Arel Cordero and David A. Wagner}, editor = {Hovav Shacham and Vanessa Teague}, title = {An Analysis of Write-in Marks on Optical Scan Ballots}, booktitle = {2011 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, {EVT/WOTE} '11, San Francisco, CA, USA, August 8-9, 2011}, publisher = {{USENIX} Association}, year = {2011}, url = {https://www.usenix.org/conference/evtwote-11/analysis-write-marks-optical-scan-ballots}, timestamp = {Mon, 01 Feb 2021 08:42:50 +0100}, biburl = {https://dblp.org/rec/conf/uss/JiKSTCW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/webapps/FeltGW11, author = {Adrienne Porter Felt and Kate Greenwood and David A. Wagner}, editor = {Armando Fox}, title = {The Effectiveness of Application Permissions}, booktitle = {2nd {USENIX} Conference on Web Application Development, WebApps'11, Portland, Oregon, USA, June 15-16, 2011}, publisher = {{USENIX} Association}, year = {2011}, url = {https://www.usenix.org/conference/webapps11/effectiveness-application-permissions}, timestamp = {Wed, 04 Jul 2018 13:06:34 +0200}, biburl = {https://dblp.org/rec/conf/webapps/FeltGW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/MettlerWC10, author = {Adrian Mettler and David A. Wagner and Tyler Close}, title = {Joe-E: {A} Security-Oriented Subset of Java}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2010, San Diego, California, USA, 28th February - 3rd March 2010}, publisher = {The Internet Society}, year = {2010}, url = {https://www.ndss-symposium.org/ndss2010/joe-e-security-oriented-subset-java}, timestamp = {Mon, 01 Feb 2021 08:42:17 +0100}, biburl = {https://dblp.org/rec/conf/ndss/MettlerWC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/MettlerW10, author = {Adrian Mettler and David A. Wagner}, editor = {Anindya Banerjee and Deepak Garg}, title = {Class properties for security review in an object-capability subset of Java: (short paper)}, booktitle = {Proceedings of the 2010 Workshop on Programming Languages and Analysis for Security, {PLAS} 2010, Toronto, ON, Canada, 10 June, 2010}, pages = {7}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1814217.1814224}, doi = {10.1145/1814217.1814224}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/MettlerW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/CorderoJTMW10, author = {Arel Cordero and Theron Ji and Alan Tsai and Keaton Mowery and David A. Wagner}, editor = {Douglas W. Jones and Jean{-}Jacques Quisquater and Eric Rescorla}, title = {Efficient User-Guided Ballot Image Verification}, booktitle = {2010 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, {EVT/WOTE} '10, Washington, D.C., USA, August 9-10, 2010}, publisher = {{USENIX} Association}, year = {2010}, url = {https://www.usenix.org/conference/evtwote-10/efficient-user-guided-ballot-image-verification}, timestamp = {Mon, 01 Feb 2021 08:43:18 +0100}, biburl = {https://dblp.org/rec/conf/uss/CorderoJTMW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/KrishnamurthyMW10, author = {Akshay Krishnamurthy and Adrian Mettler and David A. Wagner}, editor = {Michael Rappa and Paul Jones and Juliana Freire and Soumen Chakrabarti}, title = {Fine-grained privilege separation for web applications}, booktitle = {Proceedings of the 19th International Conference on World Wide Web, {WWW} 2010, Raleigh, North Carolina, USA, April 26-30, 2010}, pages = {551--560}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1772690.1772747}, doi = {10.1145/1772690.1772747}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/www/KrishnamurthyMW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TsaiHW09, author = {Hsin{-}Yi Tsai and Yu{-}Lun Huang and David A. Wagner}, title = {A graph approach to quantitative analysis of control-flow obfuscating transformations}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {2}, pages = {257--267}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2008.2011077}, doi = {10.1109/TIFS.2008.2011077}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/TsaiHW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SturtonJSW09, author = {Cynthia Sturton and Susmit Jha and Sanjit A. Seshia and David A. Wagner}, editor = {Ehab Al{-}Shaer and Somesh Jha and Angelos D. Keromytis}, title = {On voting machine design for verification and testability}, booktitle = {Proceedings of the 2009 {ACM} Conference on Computer and Communications Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009}, pages = {463--476}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1653662.1653719}, doi = {10.1145/1653662.1653719}, timestamp = {Tue, 10 Nov 2020 19:58:07 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SturtonJSW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/KarlofTW09, author = {Chris Karlof and J. Doug Tygar and David A. Wagner}, title = {Conditioned-safe Ceremonies and a User Study of an Application to Web Authentication}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2009, San Diego, California, USA, 8th February - 11th February 2009}, publisher = {The Internet Society}, year = {2009}, url = {https://www.ndss-symposium.org/ndss2009/conditioned-safe-ceremonies-and-user-study-application-web-authentication/}, timestamp = {Mon, 01 Feb 2021 08:42:14 +0100}, biburl = {https://dblp.org/rec/conf/ndss/KarlofTW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/KarlofTW09, author = {Chris Karlof and J. D. Tygar and David A. Wagner}, editor = {Lorrie Faith Cranor}, title = {Conditioned-safe ceremonies and a user study of an application to web authentication}, booktitle = {Proceedings of the 5th Symposium on Usable Privacy and Security, {SOUPS} 2009, Mountain View, California, USA, July 15-17, 2009}, series = {{ACM} International Conference Proceeding Series}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1572532.1572578}, doi = {10.1145/1572532.1572578}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/soups/KarlofTW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sws/ChinW09, author = {Erika Chin and David A. Wagner}, editor = {Ernesto Damiani and Seth Proctor and Anoop Singhal}, title = {Efficient character-level taint tracking for Java}, booktitle = {Proceedings of the 6th {ACM} Workshop On Secure Web Services, {SWS} 2009, Chicago, Illinois, USA, November 13, 2009}, pages = {3--12}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1655121.1655125}, doi = {10.1145/1655121.1655125}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sws/ChinW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/MolnarLW09, author = {David Molnar and Xue Cong Li and David A. Wagner}, editor = {Fabian Monrose}, title = {Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs}, booktitle = {18th {USENIX} Security Symposium, Montreal, Canada, August 10-14, 2009, Proceedings}, pages = {67--82}, publisher = {{USENIX} Association}, year = {2009}, url = {http://www.usenix.org/events/sec09/tech/full\_papers/molnar.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/MolnarLW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SturtonW09, author = {Cynthia Sturton and David A. Wagner}, editor = {David Jefferson and Joseph Lorenzo Hall and Tal Moran}, title = {Weight, Weight, Don't Tell Me: Using Scales to Select Ballots for Auditing}, booktitle = {2009 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, {EVT/WOTE} '09, Montreal, Canada, August 10-11, 2009}, publisher = {{USENIX} Association}, year = {2009}, url = {https://www.usenix.org/conference/evtwote-09/weight-weight-dont-tell-me-using-scales-select-ballots-auditing}, timestamp = {Mon, 01 Feb 2021 08:43:14 +0100}, biburl = {https://dblp.org/rec/conf/uss/SturtonW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tos/TsafrirHWS08, author = {Dan Tsafrir and Tomer Hertz and David A. Wagner and Dilma Da Silva}, title = {Portably solving file races with hardness amplification}, journal = {{ACM} Trans. Storage}, volume = {4}, number = {3}, pages = {9:1--9:30}, year = {2008}, url = {https://doi.org/10.1145/1416944.1416948}, doi = {10.1145/1416944.1416948}, timestamp = {Thu, 30 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tos/TsafrirHWS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/TsafrirS008, author = {Dan Tsafrir and Dilma Da Silva and David A. Wagner}, title = {The Murky Issue of Changing Process Identity: Revising "Setuid Demystified"}, journal = {login Usenix Mag.}, volume = {33}, number = {3}, year = {2008}, url = {https://www.usenix.org/publications/login/june-2008-volume-33-number-3/murky-issue-changing-process-identity-revising}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/TsafrirS008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FinifterMSW08, author = {Matthew Finifter and Adrian Mettler and Naveen Sastry and David A. Wagner}, editor = {Peng Ning and Paul F. Syverson and Somesh Jha}, title = {Verifiable functional purity in java}, booktitle = {Proceedings of the 2008 {ACM} Conference on Computer and Communications Security, {CCS} 2008, Alexandria, Virginia, USA, October 27-31, 2008}, pages = {161--174}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1455770.1455793}, doi = {10.1145/1455770.1455793}, timestamp = {Tue, 10 Nov 2020 19:59:27 +0100}, biburl = {https://dblp.org/rec/conf/ccs/FinifterMSW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fast/TsafrirHWS08, author = {Dan Tsafrir and Tomer Hertz and David A. Wagner and Dilma Da Silva}, editor = {Mary Baker and Erik Riedel}, title = {Portably Solving File {TOCTTOU} Races with Hardness Amplification}, booktitle = {6th {USENIX} Conference on File and Storage Technologies, {FAST} 2008, February 26-29, 2008, San Jose, CA, {USA}}, pages = {189--206}, publisher = {{USENIX}}, year = {2008}, url = {http://www.usenix.org/events/fast08/tech/tsafrir.html}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fast/TsafrirHWS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/CourtoisBW08, author = {Nicolas T. Courtois and Gregory V. Bard and David A. Wagner}, editor = {Kaisa Nyberg}, title = {Algebraic and Slide Attacks on KeeLoq}, booktitle = {Fast Software Encryption, 15th International Workshop, {FSE} 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5086}, pages = {97--115}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-71039-4\_6}, doi = {10.1007/978-3-540-71039-4\_6}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/CourtoisBW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nsdi/KarlofTW08, author = {Chris Karlof and J. Doug Tygar and David A. Wagner}, editor = {Elizabeth F. Churchill and Rachna Dhamija}, title = {A User Study Design for Comparing the Security of Registration Protocols}, booktitle = {Usability, Psychology, and Security, UPSEC'08, San Francisco, CA, USA, April 14, 2008, Proceedings}, publisher = {{USENIX} Association}, year = {2008}, url = {http://www.usenix.org/events/upsec08/tech/full\_papers/karlof/karlof.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nsdi/KarlofTW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/CorderoW08, author = {Arel Cordero and David A. Wagner}, editor = {David L. Dill and Tadayoshi Kohno}, title = {Replayable Voting Machine Audit Logs}, booktitle = {2008 {USENIX/ACCURATE} Electronic Voting Workshop, {EVT} 2008, July 28-29, 2008, San Jose, CA, USA, Proceedings}, publisher = {{USENIX} Association}, year = {2008}, url = {http://www.usenix.org/events/evt08/tech/full\_papers/cordero/cordero.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/CorderoW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/HaldermanRSW08, author = {J. Alex Halderman and Eric Rescorla and Hovav Shacham and David A. Wagner}, editor = {David L. Dill and Tadayoshi Kohno}, title = {You Go to Elections with the Voting System You Have: Stop-Gap Mitigations for Deployed Voting Systems}, booktitle = {2008 {USENIX/ACCURATE} Electronic Voting Workshop, {EVT} 2008, July 28-29, 2008, San Jose, CA, USA, Proceedings}, publisher = {{USENIX} Association}, year = {2008}, url = {http://www.usenix.org/events/evt08/tech/full\_papers/halderman/halderman.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/HaldermanRSW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/2008, editor = {David A. Wagner}, title = {Advances in Cryptology - {CRYPTO} 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5157}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85174-5}, doi = {10.1007/978-3-540-85174-5}, isbn = {978-3-540-85173-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/BishopW07, author = {Matt Bishop and David A. Wagner}, title = {Risks of e-voting}, journal = {Commun. {ACM}}, volume = {50}, number = {11}, pages = {120}, year = {2007}, url = {https://doi.org/10.1145/1297797.1297827}, doi = {10.1145/1297797.1297827}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/BishopW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KarlofSTW07, author = {Chris Karlof and Umesh Shankar and J. Doug Tygar and David A. Wagner}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Dynamic pharming attacks and locked same-origin policies for web browsers}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {58--71}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315254}, doi = {10.1145/1315245.1315254}, timestamp = {Tue, 10 Nov 2020 20:00:14 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KarlofSTW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/ChenW07, author = {Karl Chen and David A. Wagner}, editor = {Michael W. Hicks}, title = {Large-scale analysis of format string vulnerabilities in Debian Linux}, booktitle = {Proceedings of the 2007 Workshop on Programming Languages and Analysis for Security, {PLAS} 2007, San Diego, California, USA, June 14, 2007}, pages = {75--84}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1255329.1255344}, doi = {10.1145/1255329.1255344}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/ChenW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/GolleW07, author = {Philippe Golle and David A. Wagner}, title = {Cryptanalysis of a Cognitive Authentication Scheme (Extended Abstract)}, booktitle = {2007 {IEEE} Symposium on Security and Privacy (S{\&}P 2007), 20-23 May 2007, Oakland, California, {USA}}, pages = {66--70}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/SP.2007.13}, doi = {10.1109/SP.2007.13}, timestamp = {Thu, 21 Sep 2023 15:57:31 +0200}, biburl = {https://dblp.org/rec/conf/sp/GolleW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/HopperMW07, author = {Nicholas Hopper and David Molnar and David A. Wagner}, editor = {Salil P. Vadhan}, title = {From Weak to Strong Watermarking}, booktitle = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC} 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4392}, pages = {362--382}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-70936-7\_20}, doi = {10.1007/978-3-540-70936-7\_20}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/HopperMW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/uss/2007evt, editor = {Ray Martinez and David A. Wagner}, title = {2007 {USENIX/ACCURATE} Electronic Voting Technology Workshop, EVT'07, Boston, MA, USA, August 6, 2007}, publisher = {{USENIX} Association}, year = {2007}, url = {https://www.usenix.org/conference/evt07}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/2007evt.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CourtoisBW07, author = {Nicolas T. Courtois and Gregory V. Bard and David A. Wagner}, title = {Algebraic and Slide Attacks on KeeLoq}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {62}, year = {2007}, url = {http://eprint.iacr.org/2007/062}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CourtoisBW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/PhanW06, author = {Raphael Chung{-}Wei Phan and David A. Wagner}, title = {Security considerations for incremental hash functions based on pair block chaining}, journal = {Comput. Secur.}, volume = {25}, number = {2}, pages = {131--136}, year = {2006}, url = {https://doi.org/10.1016/j.cose.2005.12.006}, doi = {10.1016/J.COSE.2005.12.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/PhanW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Wagner06, author = {David A. Wagner}, editor = {Cynthia Dwork}, title = {Cryptographic Protocols for Electronic Voting}, booktitle = {Advances in Cryptology - {CRYPTO} 2006, 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4117}, pages = {393}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11818175\_23}, doi = {10.1007/11818175\_23}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Wagner06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/IshaiPSW06, author = {Yuval Ishai and Manoj Prabhakaran and Amit Sahai and David A. Wagner}, editor = {Serge Vaudenay}, title = {Private Circuits {II:} Keeping Secrets in Tamperable Circuits}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4004}, pages = {308--327}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11761679\_19}, doi = {10.1007/11761679\_19}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/IshaiPSW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/ShankarW06, author = {Umesh Shankar and David A. Wagner}, title = {Preventing Secret Leakage from fork(): Securing Privilege-Separated Applications}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2006, Istanbul, Turkey, 11-15 June 2006}, pages = {2268--2275}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/ICC.2006.255108}, doi = {10.1109/ICC.2006.255108}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/ShankarW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CrutchfieldMTW06, author = {Chris Crutchfield and David Molnar and David Turner and David A. Wagner}, editor = {Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal Malkin}, title = {Generic On-Line/Off-Line Threshold Signatures}, booktitle = {Public Key Cryptography - {PKC} 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3958}, pages = {58--74}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11745853\_5}, doi = {10.1007/11745853\_5}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CrutchfieldMTW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/Wagner06, author = {David A. Wagner}, editor = {Vugranam C. Sreedhar and Steve Zdancewic}, title = {Object capabilities for security}, booktitle = {Proceedings of the 2006 Workshop on Programming Languages and Analysis for Security, {PLAS} 2006, Ottawa, Ontario, Canada, June 10, 2006}, pages = {1--2}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1134744.1134745}, doi = {10.1145/1134744.1134745}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/Wagner06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/MolnarKSW06, author = {David Molnar and Tadayoshi Kohno and Naveen Sastry and David A. Wagner}, title = {Tamper-Evident, History-Independent, Subliminal-Free Data Structures on {PROM} Storage-or-How to Store Ballots on a Voting Machine (Extended Abstract)}, booktitle = {2006 {IEEE} Symposium on Security and Privacy (S{\&}P 2006), 21-24 May 2006, Berkeley, California, {USA}}, pages = {365--370}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/SP.2006.39}, doi = {10.1109/SP.2006.39}, timestamp = {Thu, 21 Sep 2023 15:57:31 +0200}, biburl = {https://dblp.org/rec/conf/sp/MolnarKSW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/YeeWHB06, author = {Ka{-}Ping Yee and David A. Wagner and Marti A. Hearst and Steven M. Bellovin}, editor = {Dan S. Wallach and Ronald L. Rivest}, title = {Prerendered User Interfaces for Higher-Assurance Electronic Voting}, booktitle = {2006 {USENIX/ACCURATE} Electronic Voting Technology Workshop, EVT'06, Vancouver, BC, Canada, August 1, 2006}, publisher = {{USENIX} Association}, year = {2006}, url = {https://www.usenix.org/conference/evt-06/prerendered-user-interfaces-higher-assurance-electronic-voting}, timestamp = {Mon, 01 Feb 2021 08:43:11 +0100}, biburl = {https://dblp.org/rec/conf/uss/YeeWHB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MolnarKSW06, author = {David Molnar and Tadayoshi Kohno and Naveen Sastry and David A. Wagner}, title = {Tamper-Evident, History-Independent, Subliminal-Free Data Structures on {PROM} Storage -or- How to Store Ballots on a Voting Machine}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {81}, year = {2006}, url = {http://eprint.iacr.org/2006/081}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MolnarKSW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GolleW06, author = {Philippe Golle and David A. Wagner}, title = {Cryptanalysis of a Cognitive Authentication Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {258}, year = {2006}, url = {http://eprint.iacr.org/2006/258}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GolleW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HopperMW06, author = {Nicholas Hopper and David Molnar and David A. Wagner}, title = {From Weak to Strong Watermarking}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {430}, year = {2006}, url = {http://eprint.iacr.org/2006/430}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HopperMW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/SuW05, author = {Zhendong Su and David A. Wagner}, title = {A class of polynomially solvable range constraints for interval analysis without widenings}, journal = {Theor. Comput. Sci.}, volume = {345}, number = {1}, pages = {122--138}, year = {2005}, url = {https://doi.org/10.1016/j.tcs.2005.07.035}, doi = {10.1016/J.TCS.2005.07.035}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/SuW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SchwarzCWLTMW05, author = {Benjamin Schwarz and Hao Chen and David A. Wagner and Jeremy Lin and Wei Tu and Geoff Morrison and Jacob West}, title = {Model Checking An Entire Linux Distribution for Security Violations}, booktitle = {21st Annual Computer Security Applications Conference {(ACSAC} 2005), 5-9 December 2005, Tucson, AZ, {USA}}, pages = {13--22}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CSAC.2005.39}, doi = {10.1109/CSAC.2005.39}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SchwarzCWLTMW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WaddleW05, author = {Jason Waddle and David A. Wagner}, title = {Fault Attacks on Dual-Rail Encoded Systems}, booktitle = {21st Annual Computer Security Applications Conference {(ACSAC} 2005), 5-9 December 2005, Tucson, AZ, {USA}}, pages = {483--494}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CSAC.2005.25}, doi = {10.1109/CSAC.2005.25}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/WaddleW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dgo/ConeyHVW05, author = {Lillie Coney and Joseph Lorenzo Hall and Poorvi L. Vora and David A. Wagner}, editor = {Lois M. L. Delcambre and Genevieve Giuliano}, title = {Towards a privacy measurement criterion for voting systems}, booktitle = {Proceedings of the 2005 National Conference on Digital Government Research, {DG.O} 2005, Atlanta, Georgia, USA, May 15-18, 2005}, series = {{ACM} International Conference Proceeding Series}, volume = {89}, pages = {287--288}, publisher = {Digital Government Research Center}, year = {2005}, url = {http://dl.acm.org/citation.cfm?id=1065324}, timestamp = {Wed, 14 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dgo/ConeyHVW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/MolnarPSW05, author = {David Molnar and Matt Piotrowski and David Schultz and David A. Wagner}, editor = {Dongho Won and Seungjoo Kim}, title = {The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks}, booktitle = {Information Security and Cryptology - {ICISC} 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3935}, pages = {156--168}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11734727\_14}, doi = {10.1007/11734727\_14}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/MolnarPSW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/DraperIMPRSW05, author = {Stark C. Draper and Prakash Ishwar and David Molnar and Vinod M. Prabhakaran and Kannan Ramchandran and Daniel Schonberg and David A. Wagner}, editor = {Mauro Barni and Jordi Herrera{-}Joancomart{\'{\i}} and Stefan Katzenbeisser and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez}, title = {An Analysis of Empirical {PMF} Based Tests for Least Significant Bit Image Steganography}, booktitle = {Information Hiding, 7th International Workshop, {IH} 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3727}, pages = {327--341}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11558859\_24}, doi = {10.1007/11558859\_24}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ih/DraperIMPRSW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/MolnarSW05, author = {David Molnar and Andrea Soppera and David A. Wagner}, editor = {Bart Preneel and Stafford E. Tavares}, title = {A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of {RFID} Tags}, booktitle = {Selected Areas in Cryptography, 12th International Workshop, {SAC} 2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3897}, pages = {276--290}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11693383\_19}, doi = {10.1007/11693383\_19}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/MolnarSW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/JuelsMW05, author = {Ari Juels and David Molnar and David A. Wagner}, title = {Security and Privacy Issues in E-passports}, booktitle = {First International Conference on Security and Privacy for Emerging Areas in Communications Networks, SecureComm 2005, Athens, Greece, 5-9 September, 2005}, pages = {74--88}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/SECURECOMM.2005.59}, doi = {10.1109/SECURECOMM.2005.59}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/JuelsMW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spin/Wagner05, author = {David A. Wagner}, editor = {Patrice Godefroid}, title = {Pushdown Model Checking for Security}, booktitle = {Model Checking Software, 12th International {SPIN} Workshop, San Francisco, CA, USA, August 22-24, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3639}, pages = {1}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11537328\_1}, doi = {10.1007/11537328\_1}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/spin/Wagner05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KarlofSW05, author = {Chris Karlof and Naveen Sastry and David A. Wagner}, editor = {Patrick D. McDaniel}, title = {Cryptographic Voting Protocols: {A} Systems Perspective}, booktitle = {Proceedings of the 14th {USENIX} Security Symposium, Baltimore, MD, USA, July 31 - August 5, 2005}, publisher = {{USENIX} Association}, year = {2005}, url = {https://www.usenix.org/conference/14th-usenix-security-symposium/cryptographic-voting-protocols-systems-perspective}, timestamp = {Mon, 01 Feb 2021 08:42:55 +0100}, biburl = {https://dblp.org/rec/conf/uss/KarlofSW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/MolnarSW05, author = {David Molnar and Andrea Soppera and David A. Wagner}, editor = {Vijay Atluri and Sabrina De Capitani di Vimercati and Roger Dingledine}, title = {Privacy for {RFID} through trusted computing}, booktitle = {Proceedings of the 2005 {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2005, Alexandria, VA, USA, November 7, 2005}, pages = {31--34}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102199.1102206}, doi = {10.1145/1102199.1102206}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/MolnarSW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JuelsMW05, author = {Ari Juels and David Molnar and David A. Wagner}, title = {Security and Privacy Issues in E-passports}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {95}, year = {2005}, url = {http://eprint.iacr.org/2005/095}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JuelsMW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MolnarSW05, author = {David Molnar and Andrea Soppera and David A. Wagner}, title = {A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of {RFID} Tags}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {315}, year = {2005}, url = {http://eprint.iacr.org/2005/315}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MolnarSW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MolnarPSW05, author = {David Molnar and Matt Piotrowski and David Schultz and David A. Wagner}, title = {The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {368}, year = {2005}, url = {http://eprint.iacr.org/2005/368}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MolnarPSW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CrutchfieldMTW05, author = {Chris Crutchfield and David Molnar and David Turner and David A. Wagner}, title = {Generic On-Line/Off-Line Threshold Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {418}, year = {2005}, url = {http://eprint.iacr.org/2005/418}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CrutchfieldMTW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/PerrigSW04, author = {Adrian Perrig and John A. Stankovic and David A. Wagner}, title = {Security in wireless sensor networks}, journal = {Commun. {ACM}}, volume = {47}, number = {6}, pages = {53--57}, year = {2004}, url = {https://doi.org/10.1145/990680.990707}, doi = {10.1145/990680.990707}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/PerrigSW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/JeffersonRSW04, author = {David R. Jefferson and Aviel D. Rubin and Barbara Simons and David A. Wagner}, title = {Analyzing internet voting security}, journal = {Commun. {ACM}}, volume = {47}, number = {10}, pages = {59--64}, year = {2004}, url = {https://doi.org/10.1145/1022594.1022624}, doi = {10.1145/1022594.1022624}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/JeffersonRSW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Wagner04, author = {David A. Wagner}, editor = {Vijayalakshmi Atluri and Birgit Pfitzmann and Patrick D. McDaniel}, title = {Cryptanalysis of a provably secure {CRT-RSA} algorithm}, booktitle = {Proceedings of the 11th {ACM} Conference on Computer and Communications Security, {CCS} 2004, Washington, DC, USA, October 25-29, 2004}, pages = {92--97}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1030083.1030097}, doi = {10.1145/1030083.1030097}, timestamp = {Fri, 13 Nov 2020 16:10:44 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Wagner04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MolnarW04, author = {David Molnar and David A. Wagner}, editor = {Vijayalakshmi Atluri and Birgit Pfitzmann and Patrick D. McDaniel}, title = {Privacy and security in library {RFID:} issues, practices, and architectures}, booktitle = {Proceedings of the 11th {ACM} Conference on Computer and Communications Security, {CCS} 2004, Washington, DC, USA, October 25-29, 2004}, pages = {210--219}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1030083.1030112}, doi = {10.1145/1030083.1030112}, timestamp = {Fri, 13 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MolnarW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/WaddleW04, author = {Jason Waddle and David A. Wagner}, editor = {Marc Joye and Jean{-}Jacques Quisquater}, title = {Towards Efficient Second-Order Power Analysis}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3156}, pages = {1--15}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28632-5\_1}, doi = {10.1007/978-3-540-28632-5\_1}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/WaddleW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Wagner04, author = {David A. Wagner}, editor = {Bimal K. Roy and Willi Meier}, title = {Towards a Unifying View of Block Cipher Cryptanalysis}, booktitle = {Fast Software Encryption, 11th International Workshop, {FSE} 2004, Delhi, India, February 5-7, 2004, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3017}, pages = {16--33}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25937-4\_2}, doi = {10.1007/978-3-540-25937-4\_2}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/Wagner04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BellareRW04, author = {Mihir Bellare and Phillip Rogaway and David A. Wagner}, editor = {Bimal K. Roy and Willi Meier}, title = {The {EAX} Mode of Operation}, booktitle = {Fast Software Encryption, 11th International Workshop, {FSE} 2004, Delhi, India, February 5-7, 2004, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3017}, pages = {389--407}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25937-4\_25}, doi = {10.1007/978-3-540-25937-4\_25}, timestamp = {Wed, 14 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BellareRW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/ChenDW04, author = {Hao Chen and Drew Dean and David A. Wagner}, title = {Model Checking One Million Lines of {C} Code}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2004, San Diego, California, {USA}}, publisher = {The Internet Society}, year = {2004}, url = {https://www.ndss-symposium.org/ndss2004/model-checking-one-million-lines-c-code/}, timestamp = {Mon, 01 Feb 2021 08:42:17 +0100}, biburl = {https://dblp.org/rec/conf/ndss/ChenDW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sasn/Wagner04, author = {David A. Wagner}, editor = {Sanjeev Setia and Vipin Swarup}, title = {Resilient aggregation in sensor networks}, booktitle = {Proceedings of the 2nd {ACM} Workshop on Security of ad hoc and Sensor Networks, {SASN} 2004, Washington, DC, USA, October 25, 2004}, pages = {78--87}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029102.1029116}, doi = {10.1145/1029102.1029116}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sasn/Wagner04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sensys/KarlofSW04, author = {Chris Karlof and Naveen Sastry and David A. Wagner}, editor = {John A. Stankovic and Anish Arora and Ramesh Govindan}, title = {TinySec: a link layer security architecture for wireless sensor networks}, booktitle = {Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, SenSys 2004, Baltimore, MD, USA, November 3-5, 2004}, pages = {162--175}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1031495.1031515}, doi = {10.1145/1031495.1031515}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sensys/KarlofSW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tacas/SuW04, author = {Zhendong Su and David A. Wagner}, editor = {Kurt Jensen and Andreas Podelski}, title = {A Class of Polynomially Solvable Range Constraints for Interval Analysis without Widenings and Narrowings}, booktitle = {Tools and Algorithms for the Construction and Analysis of Systems, 10th International Conference, {TACAS} 2004, Held as Part of the Joint European Conferences on Theory and Practice of Software, {ETAPS} 2004, Barcelona, Spain, March 29 - April 2, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2988}, pages = {280--295}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24730-2\_23}, doi = {10.1007/978-3-540-24730-2\_23}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tacas/SuW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/JohnsonWR04, author = {Mark Johnson and David A. Wagner and Kannan Ramchandran}, editor = {Moni Naor}, title = {On Compressing Encrypted Data without the Encryption Key}, booktitle = {Theory of Cryptography, First Theory of Cryptography Conference, {TCC} 2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2951}, pages = {491--504}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24638-1\_27}, doi = {10.1007/978-3-540-24638-1\_27}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/JohnsonWR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/JohnsonW04, author = {Robert Johnson and David A. Wagner}, editor = {Matt Blaze}, title = {Finding User/Kernel Pointer Bugs with Type Inference}, booktitle = {Proceedings of the 13th {USENIX} Security Symposium, August 9-13, 2004, San Diego, CA, {USA}}, pages = {119--134}, publisher = {{USENIX}}, year = {2004}, url = {http://www.usenix.org/publications/library/proceedings/sec04/tech/johnson.html}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/JohnsonW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/GoodMUMMQW04, author = {Nathan Good and David Molnar and Jennifer M. Urban and Deirdre K. Mulligan and Elizabeth Miles and Laura Quilter and David A. Wagner}, editor = {Vijay Atluri and Paul F. Syverson and Sabrina De Capitani di Vimercati}, title = {Radio frequency Id and privacy with information goods}, booktitle = {Proceedings of the 2004 {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2004, Washington, DC, USA, October 28, 2004}, pages = {41--42}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029179.1029193}, doi = {10.1145/1029179.1029193}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/GoodMUMMQW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ws/SastryW04, author = {Naveen Sastry and David A. Wagner}, editor = {Markus Jakobsson and Adrian Perrig}, title = {Security considerations for {IEEE} 802.15.4 networks}, booktitle = {Proceedings of the 2004 {ACM} Workshop on Wireless Security, Philadelphia, PA, USA, October 1, 2004}, pages = {32--42}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1023646.1023654}, doi = {10.1145/1023646.1023654}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ws/SastryW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/KarlofW03, author = {Chris Karlof and David A. Wagner}, title = {Secure routing in wireless sensor networks: attacks and countermeasures}, journal = {Ad Hoc Networks}, volume = {1}, number = {2-3}, pages = {293--315}, year = {2003}, url = {https://doi.org/10.1016/S1570-8705(03)00008-8}, doi = {10.1016/S1570-8705(03)00008-8}, timestamp = {Wed, 14 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/KarlofW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Cam-WingetHWW03, author = {Nancy Cam{-}Winget and Russell Housley and David A. Wagner and Jesse Walker}, title = {Security flaws in 802.11 data link protocols}, journal = {Commun. {ACM}}, volume = {46}, number = {5}, pages = {35--39}, year = {2003}, url = {https://doi.org/10.1145/769800.769823}, doi = {10.1145/769800.769823}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Cam-WingetHWW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/KarlofW03, author = {Chris Karlof and David A. Wagner}, editor = {Colin D. Walter and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Hidden Markov Model Cryptanalysis}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2779}, pages = {17--34}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45238-6\_3}, doi = {10.1007/978-3-540-45238-6\_3}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/KarlofW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/IshaiSW03, author = {Yuval Ishai and Amit Sahai and David A. Wagner}, editor = {Dan Boneh}, title = {Private Circuits: Securing Hardware against Probing Attacks}, booktitle = {Advances in Cryptology - {CRYPTO} 2003, 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2729}, pages = {463--481}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45146-4\_27}, doi = {10.1007/978-3-540-45146-4\_27}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/IshaiSW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/Wagner03, author = {David A. Wagner}, editor = {Colin Boyd and Wenbo Mao}, title = {Cryptanalysis of an Algebraic Privacy Homomorphism}, booktitle = {Information Security, 6th International Conference, {ISC} 2003, Bristol, UK, October 1-3, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2851}, pages = {234--239}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/10958513\_18}, doi = {10.1007/10958513\_18}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/Wagner03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ws/SastrySW03, author = {Naveen Sastry and Umesh Shankar and David A. Wagner}, editor = {W. Douglas Maughan and Adrian Perrig}, title = {Secure verification of location claims}, booktitle = {Proceedings of the 2003 {ACM} Workshop on Wireless Security, San Diego, CA, USA, September 19, 2003}, pages = {1--10}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/941311.941313}, doi = {10.1145/941311.941313}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ws/SastrySW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareRW03, author = {Mihir Bellare and Phillip Rogaway and David A. Wagner}, title = {{EAX:} {A} Conventional Authenticated-Encryption Mode}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {69}, year = {2003}, url = {http://eprint.iacr.org/2003/069}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareRW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RogawayW03, author = {Phillip Rogaway and David A. Wagner}, title = {A Critique of {CCM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {70}, year = {2003}, url = {http://eprint.iacr.org/2003/070}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RogawayW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Wagner03, author = {David A. Wagner}, title = {A Security Evaluation of Whitenoise}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {218}, year = {2003}, url = {http://eprint.iacr.org/2003/218}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Wagner03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChenW02, author = {Hao Chen and David A. Wagner}, editor = {Vijayalakshmi Atluri}, title = {{MOPS:} an infrastructure for examining security properties of software}, booktitle = {Proceedings of the 9th {ACM} Conference on Computer and Communications Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002}, pages = {235--244}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/586110.586142}, doi = {10.1145/586110.586142}, timestamp = {Tue, 10 Nov 2020 20:00:47 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChenW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WagnerS02, author = {David A. Wagner and Paolo Soto}, editor = {Vijayalakshmi Atluri}, title = {Mimicry attacks on host-based intrusion detection systems}, booktitle = {Proceedings of the 9th {ACM} Conference on Computer and Communications Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002}, pages = {255--264}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/586110.586145}, doi = {10.1145/586110.586145}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WagnerS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LiskovRW02, author = {Moses D. Liskov and Ronald L. Rivest and David A. Wagner}, editor = {Moti Yung}, title = {Tweakable Block Ciphers}, booktitle = {Advances in Cryptology - {CRYPTO} 2002, 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2442}, pages = {31--46}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45708-9\_3}, doi = {10.1007/3-540-45708-9\_3}, timestamp = {Fri, 25 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LiskovRW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Wagner02, author = {David A. Wagner}, editor = {Moti Yung}, title = {A Generalized Birthday Problem}, booktitle = {Advances in Cryptology - {CRYPTO} 2002, 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2442}, pages = {288--303}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45708-9\_19}, doi = {10.1007/3-540-45708-9\_19}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Wagner02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/JohnsonMSW02, author = {Robert Johnson and David Molnar and Dawn Xiaodong Song and David A. Wagner}, editor = {Bart Preneel}, title = {Homomorphic Signature Schemes}, booktitle = {Topics in Cryptology - {CT-RSA} 2002, The Cryptographer's Track at the {RSA} Conference, 2002, San Jose, CA, USA, February 18-22, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2271}, pages = {244--262}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45760-7\_17}, doi = {10.1007/3-540-45760-7\_17}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/JohnsonMSW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BorisovCJW02, author = {Nikita Borisov and Monica Chew and Robert Johnson and David A. Wagner}, editor = {Joan Daemen and Vincent Rijmen}, title = {Multiplicative Differentials}, booktitle = {Fast Software Encryption, 9th International Workshop, {FSE} 2002, Leuven, Belgium, February 4-6, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2365}, pages = {17--33}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45661-9\_2}, doi = {10.1007/3-540-45661-9\_2}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/BorisovCJW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/KnudsenW02, author = {Lars R. Knudsen and David A. Wagner}, editor = {Joan Daemen and Vincent Rijmen}, title = {Integral Cryptanalysis}, booktitle = {Fast Software Encryption, 9th International Workshop, {FSE} 2002, Leuven, Belgium, February 4-6, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2365}, pages = {112--127}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45661-9\_9}, doi = {10.1007/3-540-45661-9\_9}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/KnudsenW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/ThomasW02, author = {Stephen Thomas and David A. Wagner}, title = {Insecurity in ATM-based passive optical networks}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2002, April 28 - May 2, 2002, New York City, NY, {USA}}, pages = {2803--2805}, publisher = {{IEEE}}, year = {2002}, url = {https://doi.org/10.1109/ICC.2002.997353}, doi = {10.1109/ICC.2002.997353}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/ThomasW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/IvancicWRRS02, author = {Will Ivancic and David A. Wagner and Aviel D. Rubin and E. Paul Ratazzi and James P. G. Sterbenz}, title = {Securing Wireless and Mobile Networks - Is It Possible?}, booktitle = {Proceedings {IEEE} {INFOCOM} 2002, The 21st Annual Joint Conference of the {IEEE} Computer and Communications Societies, New York, USA, June 23-27, 2002}, publisher = {{IEEE} Computer Society}, year = {2002}, timestamp = {Thu, 05 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/IvancicWRRS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/EnglerIJW02, author = {Dawson R. Engler and Cynthia E. Irvine and Trent Jaeger and David A. Wagner}, editor = {Ravi S. Sandhu and Elisa Bertino}, title = {Cool security trends}, booktitle = {7th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2002, Naval Postgraduate School, Monterey, California, USA, June 3-4, 2002}, pages = {53}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/507711.507720}, doi = {10.1145/507711.507720}, timestamp = {Tue, 09 Feb 2021 08:50:30 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/EnglerIJW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/ReichardtW02, author = {Ben Reichardt and David A. Wagner}, editor = {Kaisa Nyberg and Howard M. Heys}, title = {Markov Truncated Differential Cryptanalysis of Skipjack}, booktitle = {Selected Areas in Cryptography, 9th Annual International Workshop, {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2595}, pages = {110--128}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36492-7\_9}, doi = {10.1007/3-540-36492-7\_9}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/ReichardtW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ChenWD02, author = {Hao Chen and David A. Wagner and Drew Dean}, editor = {Dan Boneh}, title = {Setuid Demystified}, booktitle = {Proceedings of the 11th {USENIX} Security Symposium, San Francisco, CA, USA, August 5-9, 2002}, pages = {171--190}, publisher = {{USENIX}}, year = {2002}, url = {http://www.usenix.org/publications/library/proceedings/sec02/chen.html}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/ChenWD02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dam/KnudsenW01, author = {Lars R. Knudsen and David A. Wagner}, title = {On the structure of Skipjack}, journal = {Discret. Appl. Math.}, volume = {111}, number = {1-2}, pages = {103--116}, year = {2001}, url = {https://doi.org/10.1016/S0166-218X(00)00347-4}, doi = {10.1016/S0166-218X(00)00347-4}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dam/KnudsenW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CrosbyGJSW01, author = {Scott A. Crosby and Ian Goldberg and Robert Johnson and Dawn Xiaodong Song and David A. Wagner}, editor = {Tomas Sander}, title = {A Cryptanalysis of the High-Bandwidth Digital Content Protection System}, booktitle = {Security and Privacy in Digital Rights Management, {ACM} {CCS-8} Workshop {DRM} 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2320}, pages = {192--200}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47870-1\_12}, doi = {10.1007/3-540-47870-1\_12}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CrosbyGJSW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/ScedrovCGWW01, author = {Andre Scedrov and Ran Canetti and Joshua D. Guttman and David A. Wagner and Michael Waidner}, title = {Relating Cryptography and Cryptographic Protocols}, booktitle = {14th {IEEE} Computer Security Foundations Workshop {(CSFW-14} 2001), 11-13 June 2001, Cape Breton, Nova Scotia, Canada}, pages = {111--114}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/CSFW.2001.930140}, doi = {10.1109/CSFW.2001.930140}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/ScedrovCGWW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobicom/BorisovGW01, author = {Nikita Borisov and Ian Goldberg and David A. Wagner}, editor = {Christopher Rose}, title = {Intercepting mobile communications: the insecurity of 802.11}, booktitle = {{MOBICOM} 2001, Proceedings of the seventh annual international conference on Mobile computing and networking, Rome, Italy, July 16-21, 2001}, pages = {180--189}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/381677.381695}, doi = {10.1145/381677.381695}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobicom/BorisovGW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sas/Wagner01, author = {David A. Wagner}, editor = {Patrick Cousot}, title = {Static Analysis and Software Assurance}, booktitle = {Static Analysis, 8th International Symposium, {SAS} 2001, Paris, France, July 16-18, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2126}, pages = {431}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47764-0\_25}, doi = {10.1007/3-540-47764-0\_25}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/sas/Wagner01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/WagnerD01, author = {David A. Wagner and Drew Dean}, title = {Intrusion Detection via Static Analysis}, booktitle = {2001 {IEEE} Symposium on Security and Privacy, Oakland, California, {USA} May 14-16, 2001}, pages = {156--168}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/SECPRI.2001.924296}, doi = {10.1109/SECPRI.2001.924296}, timestamp = {Thu, 21 Sep 2023 15:57:30 +0200}, biburl = {https://dblp.org/rec/conf/sp/WagnerD01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ShankarTFW01, author = {Umesh Shankar and Kunal Talwar and Jeffrey S. Foster and David A. Wagner}, editor = {Dan S. Wallach}, title = {Detecting Format String Vulnerabilities with Type Qualifiers}, booktitle = {10th {USENIX} Security Symposium, August 13-17, 2001, Washington, D.C., {USA}}, publisher = {{USENIX}}, year = {2001}, url = {http://www.usenix.org/publications/library/proceedings/sec01/shankar.html}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/ShankarTFW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SongWT01, author = {Dawn Xiaodong Song and David A. Wagner and Xuqing Tian}, editor = {Dan S. Wallach}, title = {Timing Analysis of Keystrokes and Timing Attacks on {SSH}}, booktitle = {10th {USENIX} Security Symposium, August 13-17, 2001, Washington, D.C., {USA}}, publisher = {{USENIX}}, year = {2001}, url = {http://www.usenix.org/publications/library/proceedings/sec01/song.html}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/SongWT01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/KelseySWH00, author = {John Kelsey and Bruce Schneier and David A. Wagner and Chris Hall}, title = {Side Channel Cryptanalysis of Product Ciphers}, journal = {J. Comput. Secur.}, volume = {8}, number = {2/3}, pages = {141--158}, year = {2000}, url = {https://doi.org/10.3233/jcs-2000-82-304}, doi = {10.3233/JCS-2000-82-304}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/KelseySWH00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/FergusonSW00, author = {Niels Ferguson and Bruce Schneier and David A. Wagner}, editor = {Ed Dawson and Andrew J. Clark and Colin Boyd}, title = {Security Weaknesses in a Randomized Stream Cipher}, booktitle = {Information Security and Privacy, 5th Australasian Conference, {ACISP} 2000, Brisbane, Australia, July 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1841}, pages = {234--241}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10718964\_19}, doi = {10.1007/10718964\_19}, timestamp = {Sat, 19 Oct 2019 20:34:19 +0200}, biburl = {https://dblp.org/rec/conf/acisp/FergusonSW00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aes/SchneierKWWF00, author = {Bruce Schneier and John Kelsey and Doug Whiting and David A. Wagner and Niels Ferguson}, title = {Comments on Twofish as an {AES} Candidate}, booktitle = {The Third Advanced Encryption Standard Candidate Conference, April 13-14, 2000, New York, New York, {USA}}, pages = {355--356}, publisher = {National Institute of Standards and Technology,}, year = {2000}, timestamp = {Thu, 08 Aug 2019 17:13:16 +0200}, biburl = {https://dblp.org/rec/conf/aes/SchneierKWWF00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Wagner00, author = {David A. Wagner}, editor = {Tatsuaki Okamoto}, title = {Cryptanalysis of the Yi-Lam Hash}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1976}, pages = {483--488}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44448-3\_37}, doi = {10.1007/3-540-44448-3\_37}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/Wagner00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/WagnerG00, author = {David A. Wagner and Ian Goldberg}, editor = {Tatsuaki Okamoto}, title = {Proofs of Security for the Unix Password Hashing Algorithm}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1976}, pages = {560--572}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44448-3\_43}, doi = {10.1007/3-540-44448-3\_43}, timestamp = {Wed, 14 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/WagnerG00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BiryukovW00, author = {Alex Biryukov and David A. Wagner}, editor = {Bart Preneel}, title = {Advanced Slide Attacks}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2000, International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1807}, pages = {589--606}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-45539-6\_41}, doi = {10.1007/3-540-45539-6\_41}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BiryukovW00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BiryukovSW00, author = {Alex Biryukov and Adi Shamir and David A. Wagner}, editor = {Bruce Schneier}, title = {Real Time Cryptanalysis of {A5/1} on a {PC}}, booktitle = {Fast Software Encryption, 7th International Workshop, {FSE} 2000, New York, NY, USA, April 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1978}, pages = {1--18}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44706-7\_1}, doi = {10.1007/3-540-44706-7\_1}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/BiryukovSW00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/FergusonKLSSWW00, author = {Niels Ferguson and John Kelsey and Stefan Lucks and Bruce Schneier and Michael Stay and David A. Wagner and Doug Whiting}, editor = {Bruce Schneier}, title = {Improved Cryptanalysis of Rijndael}, booktitle = {Fast Software Encryption, 7th International Workshop, {FSE} 2000, New York, NY, USA, April 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1978}, pages = {213--230}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44706-7\_15}, doi = {10.1007/3-540-44706-7\_15}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/FergusonKLSSWW00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/WagnerFBA00, author = {David A. Wagner and Jeffrey S. Foster and Eric A. Brewer and Alexander Aiken}, title = {A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2000, San Diego, California, {USA}}, publisher = {The Internet Society}, year = {2000}, url = {https://www.ndss-symposium.org/ndss2000/first-step-towards-automated-detection-buffer-overrun-vulnerabilities-paper/}, timestamp = {Mon, 01 Feb 2021 08:42:17 +0100}, biburl = {https://dblp.org/rec/conf/ndss/WagnerFBA00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/SongWP00, author = {Dawn Xiaodong Song and David A. Wagner and Adrian Perrig}, title = {Practical Techniques for Searches on Encrypted Data}, booktitle = {2000 {IEEE} Symposium on Security and Privacy, Berkeley, California, USA, May 14-17, 2000}, pages = {44--55}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/SECPRI.2000.848445}, doi = {10.1109/SECPRI.2000.848445}, timestamp = {Thu, 21 Sep 2023 15:57:29 +0200}, biburl = {https://dblp.org/rec/conf/sp/SongWP00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cqre/SchneierMW99, author = {Bruce Schneier and Mudge and David A. Wagner}, editor = {Rainer Baumgart}, title = {Cryptanalysis of Microsoft's {PPTP} Authentication Extensions (MS-CHAPv2)}, booktitle = {Secure Networking - {CQRE} (Secure) '99, International Exhibition and Congress D{\"{u}}sseldorf, Germany, November 30 - December 2, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1740}, pages = {192--203}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-46701-7\_17}, doi = {10.1007/3-540-46701-7\_17}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cqre/SchneierMW99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KnudsenRW99, author = {Lars R. Knudsen and Matthew J. B. Robshaw and David A. Wagner}, editor = {Michael J. Wiener}, title = {Truncated Differentials and Skipjack}, booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1666}, pages = {165--180}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48405-1\_11}, doi = {10.1007/3-540-48405-1\_11}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KnudsenRW99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/KelseySW99, author = {John Kelsey and Bruce Schneier and David A. Wagner}, editor = {Lars R. Knudsen}, title = {Mod n Cryptanalysis, with Applications Against {RC5P} and {M6}}, booktitle = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome, Italy, March 24-26, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1636}, pages = {139--155}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48519-8\_11}, doi = {10.1007/3-540-48519-8\_11}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/KelseySW99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Wagner99, author = {David A. Wagner}, editor = {Lars R. Knudsen}, title = {The Boomerang Attack}, booktitle = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome, Italy, March 24-26, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1636}, pages = {156--170}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48519-8\_12}, doi = {10.1007/3-540-48519-8\_12}, timestamp = {Wed, 14 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Wagner99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BiryukovW99, author = {Alex Biryukov and David A. Wagner}, editor = {Lars R. Knudsen}, title = {Slide Attacks}, booktitle = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome, Italy, March 24-26, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1636}, pages = {245--259}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48519-8\_18}, doi = {10.1007/3-540-48519-8\_18}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BiryukovW99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/usits/GoldbergGWB99, author = {Ian Goldberg and Steven D. Gribble and David A. Wagner and Eric A. Brewer}, title = {The Ninja Jukebox}, booktitle = {2nd {USENIX} Symposium on Internet Technologies and Systems, USITS'99, Boulder, Colorado, USA, October 11-14, 1999}, publisher = {{USENIX}}, year = {1999}, url = {http://www.usenix.org/publications/library/proceedings/usits99/goldberg.html}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/usits/GoldbergGWB99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/firstmonday/GoldbergW98, author = {Ian Goldberg and David A. Wagner}, title = {{TAZ} Servers and the Rewebber Network: Enabling Anonymous Publishing on the World Wide Web}, journal = {First Monday}, volume = {3}, number = {4}, year = {1998}, url = {https://doi.org/10.5210/fm.v3i4.586}, doi = {10.5210/FM.V3I4.586}, timestamp = {Mon, 04 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/firstmonday/GoldbergW98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HallWKS98, author = {Chris Hall and David A. Wagner and John Kelsey and Bruce Schneier}, editor = {Hugo Krawczyk}, title = {Building PRFs from PRPs}, booktitle = {Advances in Cryptology - {CRYPTO} '98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1462}, pages = {370--389}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0055742}, doi = {10.1007/BFB0055742}, timestamp = {Tue, 01 Jun 2021 15:21:29 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HallWKS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/KelseySWH98, author = {John Kelsey and Bruce Schneier and David A. Wagner and Chris Hall}, editor = {Jean{-}Jacques Quisquater and Yves Deswarte and Catherine Meadows and Dieter Gollmann}, title = {Side Channel Cryptanalysis of Product Ciphers}, booktitle = {Computer Security - {ESORICS} 98, 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1485}, pages = {97--110}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0055858}, doi = {10.1007/BFB0055858}, timestamp = {Tue, 19 Sep 2023 14:44:32 +0200}, biburl = {https://dblp.org/rec/conf/esorics/KelseySWH98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/HallKSW98, author = {Chris Hall and John Kelsey and Bruce Schneier and David A. Wagner}, editor = {Rafael Hirschfeld}, title = {Cryptanalysis of {SPEED}}, booktitle = {Financial Cryptography, Second International Conference, FC'98, Anguilla, British West Indies, February 23-25, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1465}, pages = {309--310}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0055491}, doi = {10.1007/BFB0055491}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/HallKSW98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/CoppersmithWSK98, author = {Don Coppersmith and David A. Wagner and Bruce Schneier and John Kelsey}, editor = {Serge Vaudenay}, title = {Cryptanalysis of {TWOPRIME}}, booktitle = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris, France, March 23-25, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1372}, pages = {32--48}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-69710-1\_3}, doi = {10.1007/3-540-69710-1\_3}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/CoppersmithWSK98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/KelseySWH98, author = {John Kelsey and Bruce Schneier and David A. Wagner and Chris Hall}, editor = {Serge Vaudenay}, title = {Cryptanalytic Attacks on Pseudorandom Number Generators}, booktitle = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris, France, March 23-25, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1372}, pages = {168--188}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-69710-1\_12}, doi = {10.1007/3-540-69710-1\_12}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/KelseySWH98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Wagner98, author = {David A. Wagner}, editor = {Serge Vaudenay}, title = {Cryptanalysis of Some Recently-Proposed Multiple Modes of Operation}, booktitle = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris, France, March 23-25, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1372}, pages = {254--269}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-69710-1\_17}, doi = {10.1007/3-540-69710-1\_17}, timestamp = {Wed, 14 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Wagner98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Wagner98a, author = {David A. Wagner}, editor = {Serge Vaudenay}, title = {Differential Cryptanalysis of {KHF}}, booktitle = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris, France, March 23-25, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1372}, pages = {293--296}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-69710-1\_20}, doi = {10.1007/3-540-69710-1\_20}, timestamp = {Wed, 14 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Wagner98a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/SchneierKWWH98, author = {Bruce Schneier and John Kelsey and Doug Whiting and David A. Wagner and Chris Hall}, editor = {Stafford E. Tavares and Henk Meijer}, title = {On the Twofish Key Schedule}, booktitle = {Selected Areas in Cryptography '98, SAC'98, Kingston, Ontario, Canada, August 17-18, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1556}, pages = {27--42}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-48892-8\_3}, doi = {10.1007/3-540-48892-8\_3}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/SchneierKWWH98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/WagnerSDKMS98, author = {David A. Wagner and Leonie Simpson and Ed Dawson and John Kelsey and William Millan and Bruce Schneier}, editor = {Stafford E. Tavares and Henk Meijer}, title = {Cryptanalysis of {ORYX}}, booktitle = {Selected Areas in Cryptography '98, SAC'98, Kingston, Ontario, Canada, August 17-18, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1556}, pages = {296--305}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-48892-8\_23}, doi = {10.1007/3-540-48892-8\_23}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/WagnerSDKMS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/HallKRSW98, author = {Chris Hall and John Kelsey and Vincent Rijmen and Bruce Schneier and David A. Wagner}, editor = {Stafford E. Tavares and Henk Meijer}, title = {Cryptanalysis of {SPEED}}, booktitle = {Selected Areas in Cryptography '98, SAC'98, Kingston, Ontario, Canada, August 17-18, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1556}, pages = {319--338}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-48892-8\_25}, doi = {10.1007/3-540-48892-8\_25}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/HallKRSW98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compcon/GoldbergWB97, author = {Ian Goldberg and David A. Wagner and Eric A. Brewer}, title = {Privacy-enhancing technologies for the Internet}, booktitle = {Proceedings {IEEE} {COMPCON} 97, San Jose, California, USA, February 23-26, 1997, Digest of Papers}, pages = {103--109}, publisher = {{IEEE} Computer Society}, year = {1997}, url = {https://doi.org/10.1109/CMPCON.1997.584680}, doi = {10.1109/CMPCON.1997.584680}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compcon/GoldbergWB97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/WagnerSK97, author = {David A. Wagner and Bruce Schneier and John Kelsey}, editor = {Burton S. Kaliski Jr.}, title = {Cryptanalysis of the Cellular Encryption Algorithm}, booktitle = {Advances in Cryptology - {CRYPTO} '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1294}, pages = {526--537}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0052260}, doi = {10.1007/BFB0052260}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/WagnerSK97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/KelseySW97, author = {John Kelsey and Bruce Schneier and David A. Wagner}, editor = {Yongfei Han and Tatsuaki Okamoto and Sihan Qing}, title = {Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and {TEA}}, booktitle = {Information and Communication Security, First International Conference, ICICS'97, Beijing, China, November 11-14, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1334}, pages = {233--246}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0028479}, doi = {10.1007/BFB0028479}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/icics/KelseySW97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/KelseySHW97, author = {John Kelsey and Bruce Schneier and Chris Hall and David A. Wagner}, editor = {Eiji Okamoto and George I. Davida and Masahiro Mambo}, title = {Secure Applications of Low-Entropy Keys}, booktitle = {Information Security, First International Workshop, {ISW} '97, Tatsunokuchi, Japan, September 17-19, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1396}, pages = {121--134}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0030415}, doi = {10.1007/BFB0030415}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/KelseySHW97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/KelseySW97, author = {John Kelsey and Bruce Schneier and David A. Wagner}, editor = {Bruce Christianson and Bruno Crispo and T. Mark A. Lomas and Michael Roe}, title = {Protocol Interactions and the Chosen Protocol Attack}, booktitle = {Security Protocols, 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1361}, pages = {91--104}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0028162}, doi = {10.1007/BFB0028162}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/KelseySW97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcst/GrossW96, author = {Eric M. Gross and David A. Wagner}, title = {{KD} trees and Delaunay-based linear interpolation for function learning: a comparison to neural networks with error backpropagation}, journal = {{IEEE} Trans. Control. Syst. Technol.}, volume = {4}, number = {6}, pages = {649--653}, year = {1996}, url = {https://doi.org/10.1109/87.541694}, doi = {10.1109/87.541694}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcst/GrossW96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KelseySW96, author = {John Kelsey and Bruce Schneier and David A. Wagner}, editor = {Neal Koblitz}, title = {Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES}, booktitle = {Advances in Cryptology - {CRYPTO} '96, 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1109}, pages = {237--251}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-68697-5\_19}, doi = {10.1007/3-540-68697-5\_19}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KelseySW96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/WagnerB96, author = {David A. Wagner and Steven M. Bellovin}, editor = {James T. Ellis and B. Clifford Neuman and David M. Balenson}, title = {A "bump in the stack" encryptor for {MS-DOS} systems}, booktitle = {1996 Symposium on Network and Distributed System Security, {(S)NDSS} '96, San Diego, CA, USA, February 22-23, 1996}, pages = {155--161}, publisher = {{IEEE} Computer Society}, year = {1996}, url = {https://doi.org/10.1109/NDSS.1996.492422}, doi = {10.1109/NDSS.1996.492422}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/WagnerB96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/GoldbergWTB96, author = {Ian Goldberg and David A. Wagner and Randi Thomas and Eric A. Brewer}, title = {A Secure Environment for Untrusted Helper Applications}, booktitle = {Proceedings of the 6th {USENIX} Security Symposium, San Jose, CA, USA, July 22-25, 1996}, publisher = {{USENIX} Association}, year = {1996}, url = {https://www.usenix.org/conference/6th-usenix-security-symposium/secure-environment-untrusted-helper-applications}, timestamp = {Mon, 01 Feb 2021 08:43:15 +0100}, biburl = {https://dblp.org/rec/conf/uss/GoldbergWTB96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mascots/GrunwaldNSWZ93, author = {Dirk Grunwald and Gary J. Nutt and Anthony M. Sloane and David A. Wagner and Benjamin G. Zorn}, editor = {Herbert D. Schwetman and Jean C. Walrand and Kallol Kumar Bagchi and Doug DeGroot}, title = {A Testbed for Studying Parallel Programs and Parallel Execution Architectures}, booktitle = {{MASCOTS} '93, Proceedings of the International Workshop on Modeling, Analysis, and Simulation On Computer and Telecommunication Systems, January 17-20, 1993, La Jolla, San Diego, CA, {USA}}, pages = {95--106}, publisher = {The Society for Computer Simulation}, year = {1993}, timestamp = {Wed, 14 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mascots/GrunwaldNSWZ93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.