default search action
Vitaly Shmatikov
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j14]Emily Wenger, Xiuyu Li, Ben Y. Zhao, Vitaly Shmatikov:
Data Isotopes for Data Provenance in DNNs. Proc. Priv. Enhancing Technol. 2024(1): 413-429 (2024) - [c95]John X. Morris, Wenting Zhao, Justin T. Chiu, Vitaly Shmatikov, Alexander M. Rush:
Language Model Inversion. ICLR 2024 - [c94]Tingwei Zhang, Rishi D. Jha, Eugene Bagdasaryan, Vitaly Shmatikov:
Adversarial Illusions in Multi-Modal Embeddings. USENIX Security Symposium 2024 - [i39]Collin Zhang, John X. Morris, Vitaly Shmatikov:
Extracting Prompts by Inverting LLM Outputs. CoRR abs/2405.15012 (2024) - [i38]Avital Shafran, Roei Schuster, Vitaly Shmatikov:
Machine Against the RAG: Jamming Retrieval-Augmented Generation with Blocker Documents. CoRR abs/2406.05870 (2024) - [i37]Tingwei Zhang, Collin Zhang, John X. Morris, Eugene Bagdasaryan, Vitaly Shmatikov:
Soft Prompts Go Hard: Steering Visual Language Models with Hidden Meta-Instructions. CoRR abs/2407.08970 (2024) - 2023
- [c93]John X. Morris, Volodymyr Kuleshov, Vitaly Shmatikov, Alexander M. Rush:
Text Embeddings Reveal (Almost) As Much As Text. EMNLP 2023: 12448-12460 - [c92]Zhen Sun, Vitaly Shmatikov:
Telepath: A Minecraft-based Covert Communication System. SP 2023: 2223-2237 - [i36]Eugene Bagdasaryan, Vitaly Shmatikov:
Hyperparameter Search Is All You Need For Training-Agnostic Backdoor Robustness. CoRR abs/2302.04977 (2023) - [i35]Eugene Bagdasaryan, Tsung-Yin Hsieh, Ben Nassi, Vitaly Shmatikov:
(Ab)using Images and Sounds for Indirect Instruction Injection in Multi-Modal LLMs. CoRR abs/2307.10490 (2023) - [i34]Eugene Bagdasaryan, Vitaly Shmatikov:
Ceci n'est pas une pomme: Adversarial Illusions in Multi-Modal Embeddings. CoRR abs/2308.11804 (2023) - [i33]John X. Morris, Volodymyr Kuleshov, Vitaly Shmatikov, Alexander M. Rush:
Text Embeddings Reveal (Almost) As Much As Text. CoRR abs/2310.06816 (2023) - [i32]John X. Morris, Wenting Zhao, Justin T. Chiu, Vitaly Shmatikov, Alexander M. Rush:
Language Model Inversion. CoRR abs/2311.13647 (2023) - 2022
- [c91]Eugene Bagdasaryan, Vitaly Shmatikov:
Spinning Language Models: Risks of Propaganda-As-A-Service and Countermeasures. SP 2022: 769-786 - [i31]Emily Wenger, Xiuyu Li, Ben Y. Zhao, Vitaly Shmatikov:
Data Isotopes for Data Provenance in DNNs. CoRR abs/2208.13893 (2022) - 2021
- [c90]Eugene Bagdasaryan, Vitaly Shmatikov:
Blind Backdoors in Deep Learning Models. USENIX Security Symposium 2021: 1505-1521 - [c89]Roei Schuster, Congzheng Song, Eran Tromer, Vitaly Shmatikov:
You Autocomplete Me: Poisoning Vulnerabilities in Neural Code Completion. USENIX Security Symposium 2021: 1559-1575 - [i30]Jialing Pei, Vitaly Shmatikov:
BigFoot: Exploiting and Mitigating Leakage in Encrypted Write-Ahead Logs. CoRR abs/2111.09374 (2021) - [i29]Eugene Bagdasaryan, Vitaly Shmatikov:
Spinning Language Models for Propaganda-As-A-Service. CoRR abs/2112.05224 (2021) - 2020
- [c88]Eugene Bagdasaryan, Andreas Veit, Yiqing Hua, Deborah Estrin, Vitaly Shmatikov:
How To Backdoor Federated Learning. AISTATS 2020: 2938-2948 - [c87]Congzheng Song, Alexander M. Rush, Vitaly Shmatikov:
Adversarial Semantic Collisions. EMNLP (1) 2020: 4198-4210 - [c86]Congzheng Song, Vitaly Shmatikov:
Overlearning Reveals Sensitive Attributes. ICLR 2020 - [c85]Zhen Sun, Roei Schuster, Vitaly Shmatikov:
De-Anonymizing Text by Fingerprinting Language Generation. NeurIPS 2020 - [c84]Roei Schuster, Tal Schuster, Yoav Meri, Vitaly Shmatikov:
Humpty Dumpty: Controlling Word Meanings via Corpus Poisoning. SP 2020: 1295-1313 - [i28]Roei Schuster, Tal Schuster, Yoav Meri, Vitaly Shmatikov:
Humpty Dumpty: Controlling Word Meanings via Corpus Poisoning. CoRR abs/2001.04935 (2020) - [i27]Tao Yu, Eugene Bagdasaryan, Vitaly Shmatikov:
Salvaging Federated Learning by Local Adaptation. CoRR abs/2002.04758 (2020) - [i26]Eugene Bagdasaryan, Vitaly Shmatikov:
Blind Backdoors in Deep Learning Models. CoRR abs/2005.03823 (2020) - [i25]Zhen Sun, Roei Schuster, Vitaly Shmatikov:
De-Anonymizing Text by Fingerprinting Language Generation. CoRR abs/2006.09615 (2020) - [i24]Roei Schuster, Congzheng Song, Eran Tromer, Vitaly Shmatikov:
You Autocomplete Me: Poisoning Vulnerabilities in Neural Code Completion. CoRR abs/2007.02220 (2020) - [i23]Congzheng Song, Alexander M. Rush, Vitaly Shmatikov:
Adversarial Semantic Collisions. CoRR abs/2011.04743 (2020)
2010 – 2019
- 2019
- [c83]Congzheng Song, Vitaly Shmatikov:
Auditing Data Provenance in Text-Generation Models. KDD 2019: 196-206 - [c82]Eugene Bagdasaryan, Omid Poursaeed, Vitaly Shmatikov:
Differential Privacy Has Disparate Impact on Model Accuracy. NeurIPS 2019: 15453-15462 - [c81]Luca Melis, Congzheng Song, Emiliano De Cristofaro, Vitaly Shmatikov:
Exploiting Unintended Feature Leakage in Collaborative Learning. IEEE Symposium on Security and Privacy 2019: 691-706 - [i22]Congzheng Song, Vitaly Shmatikov:
Overlearning Reveals Sensitive Attributes. CoRR abs/1905.11742 (2019) - [i21]Eugene Bagdasaryan, Vitaly Shmatikov:
Differential Privacy Has Disparate Impact on Model Accuracy. CoRR abs/1905.12101 (2019) - 2018
- [j13]Vincent Bindschaedler, Paul Grubbs, David Cash, Thomas Ristenpart, Vitaly Shmatikov:
The Tao of Inference in Privacy-Protected Databases. Proc. VLDB Endow. 11(11): 1715-1728 (2018) - [c80]Roei Schuster, Vitaly Shmatikov, Eran Tromer:
Situational Access Control in the Internet of Things. CCS 2018: 1056-1073 - [i20]Congzheng Song, Vitaly Shmatikov:
Fooling OCR Systems with Adversarial Text Images. CoRR abs/1802.05385 (2018) - [i19]Tyler Hunt, Congzheng Song, Reza Shokri, Vitaly Shmatikov, Emmett Witchel:
Chiron: Privacy-preserving Machine Learning as a Service. CoRR abs/1803.05961 (2018) - [i18]Luca Melis, Congzheng Song, Emiliano De Cristofaro, Vitaly Shmatikov:
Inference Attacks Against Collaborative Learning. CoRR abs/1805.04049 (2018) - [i17]Eugene Bagdasaryan, Andreas Veit, Yiqing Hua, Deborah Estrin, Vitaly Shmatikov:
How To Backdoor Federated Learning. CoRR abs/1807.00459 (2018) - [i16]Congzheng Song, Vitaly Shmatikov:
The Natural Auditor: How To Tell If Someone Used Your Words To Train Their Model. CoRR abs/1811.00513 (2018) - 2017
- [c79]Congzheng Song, Thomas Ristenpart, Vitaly Shmatikov:
Machine Learning Models that Remember Too Much. CCS 2017: 587-601 - [c78]Ivan Pustogarov, Thomas Ristenpart, Vitaly Shmatikov:
Using Program Analysis to Synthesize Sensor Spoofing Attacks. AsiaCCS 2017: 757-770 - [c77]Paul Grubbs, Thomas Ristenpart, Vitaly Shmatikov:
Why Your Encrypted Database Is Not Secure. HotOS 2017: 162-168 - [c76]Reza Shokri, Marco Stronati, Congzheng Song, Vitaly Shmatikov:
Membership Inference Attacks Against Machine Learning Models. IEEE Symposium on Security and Privacy 2017: 3-18 - [c75]Roei Schuster, Vitaly Shmatikov, Eran Tromer:
Beauty and the Burst: Remote Identification of Encrypted Video Streams. USENIX Security Symposium 2017: 1357-1374 - [i15]Congzheng Song, Thomas Ristenpart, Vitaly Shmatikov:
Machine Learning Models that Remember Too Much. CoRR abs/1709.07886 (2017) - [i14]Paul Grubbs, Thomas Ristenpart, Vitaly Shmatikov:
Why Your Encrypted Database Is Not Secure. IACR Cryptol. ePrint Arch. 2017: 468 (2017) - [i13]Vincent Bindschaedler, Paul Grubbs, David Cash, Thomas Ristenpart, Vitaly Shmatikov:
The Tao of Inference in Privacy-Protected Databases. IACR Cryptol. ePrint Arch. 2017: 1078 (2017) - 2016
- [j12]Richard McPherson, Amir Houmansadr, Vitaly Shmatikov:
CovertCast: Using Live Streaming to Evade Internet Censorship. Proc. Priv. Enhancing Technol. 2016(3): 212-225 (2016) - [j11]Yuanzhong Xu, Tyler Hunt, Youngjin Kwon, Martin Georgiev, Vitaly Shmatikov, Emmett Witchel:
EARP: Principled Storage, Sharing, and Protection for Mobile Apps. GetMobile Mob. Comput. Commun. 20(3): 29-33 (2016) - [c74]Paul Grubbs, Richard McPherson, Muhammad Naveed, Thomas Ristenpart, Vitaly Shmatikov:
Breaking Web Applications Built On Top of Encrypted Data. CCS 2016: 1353-1364 - [c73]Sooel Son, Daehyeok Kim, Vitaly Shmatikov:
What Mobile Ads Know About Mobile Users. NDSS 2016 - [c72]Yuanzhong Xu, Tyler Hunt, Youngjin Kwon, Martin Georgiev, Vitaly Shmatikov, Emmett Witchel:
Earp: Principled Storage, Sharing, and Protection for Mobile Apps. NSDI 2016: 627-642 - [c71]Michael J. Wilber, Vitaly Shmatikov, Serge J. Belongie:
Can we still avoid automatic face detection? WACV 2016: 1-9 - [i12]Michael J. Wilber, Vitaly Shmatikov, Serge J. Belongie:
Can we still avoid automatic face detection? CoRR abs/1602.04504 (2016) - [i11]Martin Georgiev, Vitaly Shmatikov:
Gone in Six Characters: Short URLs Considered Harmful for Cloud Services. CoRR abs/1604.02734 (2016) - [i10]Lorrie Faith Cranor, Tal Rabin, Vitaly Shmatikov, Salil P. Vadhan, Daniel J. Weitzner:
Towards a Privacy Research Roadmap for the Computing Community. CoRR abs/1604.03160 (2016) - [i9]Richard McPherson, Reza Shokri, Vitaly Shmatikov:
Defeating Image Obfuscation with Deep Learning. CoRR abs/1609.00408 (2016) - [i8]Reza Shokri, Marco Stronati, Vitaly Shmatikov:
Membership Inference Attacks against Machine Learning Models. CoRR abs/1610.05820 (2016) - [i7]Paul Grubbs, Richard McPherson, Muhammad Naveed, Thomas Ristenpart, Vitaly Shmatikov:
Breaking Web Applications Built On Top of Encrypted Data. IACR Cryptol. ePrint Arch. 2016: 920 (2016) - 2015
- [c70]Reza Shokri, Vitaly Shmatikov:
Privacy-preserving deep learning. Allerton 2015: 909-910 - [c69]Reza Shokri, Vitaly Shmatikov:
Privacy-Preserving Deep Learning. CCS 2015: 1310-1321 - [c68]Martin Georgiev, Suman Jana, Vitaly Shmatikov:
Rethinking Security of Web-Based System Applications. WWW 2015: 366-376 - [c67]Richard McPherson, Suman Jana, Vitaly Shmatikov:
No Escape From Reality: Security and Privacy of Augmented Reality Browsers. WWW 2015: 743-753 - 2014
- [c66]Martin Georgiev, Suman Jana, Vitaly Shmatikov:
Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks. NDSS 2014 - [c65]Amir Houmansadr, Edmund L. Wong, Vitaly Shmatikov:
No Direction Home: The True Cost of Routing Around Decoys. NDSS 2014 - [c64]Chad Brubaker, Amir Houmansadr, Vitaly Shmatikov:
CloudTransport: Using Cloud Storage for Censorship-Resistant Networking. Privacy Enhancing Technologies 2014: 1-20 - [c63]Chad Brubaker, Suman Jana, Baishakhi Ray, Sarfraz Khurshid, Vitaly Shmatikov:
Using Frankencerts for Automated Adversarial Testing of Certificate Validation in SSL/TLS Implementations. IEEE Symposium on Security and Privacy 2014: 114-129 - 2013
- [c62]Sooel Son, Kathryn S. McKinley, Vitaly Shmatikov:
Diglossia: detecting code injection attacks with precision and efficiency. CCS 2013: 1181-1192 - [c61]Aaron Johnson, Vitaly Shmatikov:
Privacy-preserving data exploration in genome-wide association studies. KDD 2013: 1079-1087 - [c60]Sooel Son, Kathryn S. McKinley, Vitaly Shmatikov:
Fix Me Up: Repairing Access-Control Bugs in Web Applications. NDSS 2013 - [c59]Sooel Son, Vitaly Shmatikov:
The Postman Always Rings Twice: Attacking and Defending postMessage in HTML5 Websites. NDSS 2013 - [c58]Sangmin Lee, Edmund L. Wong, Deepak Goel, Mike Dahlin, Vitaly Shmatikov:
πBox: A Platform for Privacy-Preserving Apps. NSDI 2013: 501-514 - [c57]Amir Houmansadr, Chad Brubaker, Vitaly Shmatikov:
The Parrot Is Dead: Observing Unobservable Network Communications. IEEE Symposium on Security and Privacy 2013: 65-79 - [c56]Suman Jana, Arvind Narayanan, Vitaly Shmatikov:
A Scanner Darkly: Protecting User Privacy from Perceptual Applications. IEEE Symposium on Security and Privacy 2013: 349-363 - 2012
- [c55]Martin Georgiev, Subodh Iyengar, Suman Jana, Rishita Anubhai, Dan Boneh, Vitaly Shmatikov:
The most dangerous code in the world: validating SSL certificates in non-browser software. CCS 2012: 38-49 - [c54]Alan M. Dunn, Michael Z. Lee, Suman Jana, Sangman Kim, Mark Silberstein, Yuanzhong Xu, Vitaly Shmatikov, Emmett Witchel:
Eternal Sunshine of the Spotless Machine: Protecting Privacy with Ephemeral Channels. OSDI 2012: 61-75 - [c53]Suman Jana, Vitaly Shmatikov:
Abusing File Processing in Malware Detectors for Fun and Profit. IEEE Symposium on Security and Privacy 2012: 80-94 - [c52]Suman Jana, Vitaly Shmatikov:
Memento: Learning Secrets from Process Footprints. IEEE Symposium on Security and Privacy 2012: 143-157 - 2011
- [j10]Vitaly Shmatikov:
Anonymity is not privacy: technical perspective. Commun. ACM 54(12): 132 (2011) - [c51]Edmund L. Wong, Vitaly Shmatikov:
Get off my prefix! the need for dynamic, gerontocratic policies in inter-domain routing. DSN 2011: 233-244 - [c50]Suman Jana, Vitaly Shmatikov:
EVE: Verifying Correct Execution of Cloud-Hosted Web Applications. HotCloud 2011 - [c49]Sooel Son, Kathryn S. McKinley, Vitaly Shmatikov:
RoleCast: finding missing security checks when you do not know what checks are. OOPSLA 2011: 1069-1084 - [c48]Sooel Son, Vitaly Shmatikov:
SAFERPHP: finding semantic vulnerabilities in PHP applications. PLAS 2011: 8 - [c47]Varun Srivastava, Michael D. Bond, Kathryn S. McKinley, Vitaly Shmatikov:
A security policy oracle: detecting security holes using multiple API implementations. PLDI 2011: 343-354 - [c46]Joseph A. Calandrino, Ann Kilzer, Arvind Narayanan, Edward W. Felten, Vitaly Shmatikov:
"You Might Also Like: " Privacy Risks of Collaborative Filtering. IEEE Symposium on Security and Privacy 2011: 231-246 - [c45]Suman Jana, Donald E. Porter, Vitaly Shmatikov:
TxBox: Building Secure, Efficient Sandboxes with System Transactions. IEEE Symposium on Security and Privacy 2011: 329-344 - [e3]Yan Chen, George Danezis, Vitaly Shmatikov:
Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011, Chicago, Illinois, USA, October 17-21, 2011. ACM 2011, ISBN 978-1-4503-0948-6 [contents] - 2010
- [j9]Arvind Narayanan, Vitaly Shmatikov:
Myths and fallacies of "personally identifiable information". Commun. ACM 53(6): 24-26 (2010) - [c44]Indrajit Roy, Srinath T. V. Setty, Ann Kilzer, Vitaly Shmatikov, Emmett Witchel:
Airavat: Security and Privacy for MapReduce. NSDI 2010: 297-312 - [c43]Michael D. Bond, Varun Srivastava, Kathryn S. McKinley, Vitaly Shmatikov:
Efficient, context-sensitive detection of real-world semantic attacks. PLAS 2010: 1 - [c42]Sooel Son, Vitaly Shmatikov:
The Hitchhiker's Guide to DNS Cache Poisoning. SecureComm 2010: 466-483 - [e2]Ehab Al-Shaer, Angelos D. Keromytis, Vitaly Shmatikov:
Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, Chicago, Illinois, USA, October 4-8, 2010. ACM 2010, ISBN 978-1-4503-0245-6 [contents]
2000 – 2009
- 2009
- [c41]Richard M. Chang, Guofei Jiang, Franjo Ivancic, Sriram Sankaranarayanan, Vitaly Shmatikov:
Inputs of Coma: Static Detection of Denial-of-Service Vulnerabilities. CSF 2009: 186-199 - [c40]Justin Brickell, Vitaly Shmatikov:
Privacy-Preserving Classifier Learning. Financial Cryptography 2009: 128-147 - [c39]Arvind Narayanan, Vitaly Shmatikov:
De-anonymizing Social Networks. SP 2009: 173-187 - [i6]Arvind Narayanan, Vitaly Shmatikov:
De-anonymizing Social Networks. CoRR abs/0903.3276 (2009) - 2008
- [c38]Justin Brickell, Vitaly Shmatikov:
The cost of privacy: destruction of data-mining utility in anonymized data publishing. KDD 2008: 70-78 - [c37]Arvind Narayanan, Vitaly Shmatikov:
Robust De-anonymization of Large Sparse Datasets. SP 2008: 111-125 - [c36]Somesh Jha, Louis Kruger, Vitaly Shmatikov:
Towards Practical Privacy for Genomic Computation. SP 2008: 216-230 - [e1]Vitaly Shmatikov:
Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering, FMSE 2008, Alexandria, VA, USA, October 27, 2008. ACM 2008, ISBN 978-1-60558-288-7 [contents] - 2007
- [c35]Vitaly Shmatikov, Ming-Hsiu Wang:
Secure Verification of Location Claims with Simultaneous Distance Modification. ASIAN 2007: 181-195 - [c34]Justin Brickell, Donald E. Porter, Vitaly Shmatikov, Emmett Witchel:
Privacy-preserving remote diagnostics. CCS 2007: 498-507 - [c33]Prateek Gupta, Vitaly Shmatikov:
Security Analysis of Voice-over-IP Protocols. CSF 2007: 49-63 - [c32]Stanislaw Jarecki, Vitaly Shmatikov:
Efficient Two-Party Secure Computation on Committed Inputs. EUROCRYPT 2007: 97-114 - [c31]Ajay Mahimkar, Jasraj Dange, Vitaly Shmatikov, Harrick M. Vin, Yin Zhang:
dFence: Transparent Network-based Denial of Service Mitigation. NSDI 2007 - [c30]Edmund L. Wong, Praveen Balasubramanian, Lorenzo Alvisi, Mohamed G. Gouda, Vitaly Shmatikov:
Truth in advertising: lightweight verification of route integrity. PODC 2007: 147-156 - [c29]Vitaly Shmatikov, Ming-Hsiu Wang:
Security against probe-response attacks in collaborative intrusion detection. LSAD@SIGCOMM 2007: 129-136 - 2006
- [j8]Gethin Norman, Vitaly Shmatikov:
Analysis of probabilistic contract signing. J. Comput. Secur. 14(6): 561-589 (2006) - [c28]Vitaly Shmatikov, Ming-Hsiu Wang:
Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses. ESORICS 2006: 18-33 - [c27]Justin Brickell, Vitaly Shmatikov:
Efficient anonymity-preserving data collection. KDD 2006: 76-85 - [c26]Phillip A. Porras, Vitaly Shmatikov:
Large-scale collection and sanitization of network security data: risks and challenges. NSPW 2006: 57-64 - [c25]Vitaly Shmatikov, Ming-Hsiu Wang:
Measuring relationship anonymity in mix networks. WPES 2006: 59-62 - [i5]Arvind Narayanan, Vitaly Shmatikov:
How To Break Anonymity of the Netflix Prize Dataset. CoRR abs/cs/0610105 (2006) - [i4]Prateek Gupta, Vitaly Shmatikov:
Key confirmation and adaptive corruptions in the protocol security logic. IACR Cryptol. ePrint Arch. 2006: 171 (2006) - [i3]Arvind Narayanan, Vitaly Shmatikov:
On the Limits of Point Function Obfuscation. IACR Cryptol. ePrint Arch. 2006: 182 (2006) - [i2]Prateek Gupta, Vitaly Shmatikov:
Security Analysis of Voice-over-IP Protocols. IACR Cryptol. ePrint Arch. 2006: 424 (2006) - 2005
- [j7]Vitaly Shmatikov, Carolyn L. Talcott:
Reputation-based trust management. J. Comput. Secur. 13(1): 167-190 (2005) - [j6]Jonathan K. Millen, Vitaly Shmatikov:
Symbolic protocol analysis with an Abelian group operator or Diffie-Hellman exponentiation. J. Comput. Secur. 13(3): 515-564 (2005) - [j5]Jonathan K. Millen, Vitaly Shmatikov:
Symbolic protocol analysis with an Abelian group operator or Diffie-Hellman exponentiation. J. Comput. Secur. 13(4): 695- (2005) - [j4]Rohit Chadha, John C. Mitchell, Andre Scedrov, Vitaly Shmatikov:
Contract signing, optimism, and advantage. J. Log. Algebraic Methods Program. 64(2): 189-218 (2005) - [c24]Justin Brickell, Vitaly Shmatikov:
Privacy-Preserving Graph Algorithms in the Semi-honest Model. ASIACRYPT 2005: 236-252 - [c23]Prateek Gupta, Vitaly Shmatikov:
Towards computationally sound symbolic analysis of key exchange protocols. FMSE 2005: 23-32 - [c22]Arvind Narayanan, Vitaly Shmatikov:
Obfuscated databases and group privacy. CCS 2005: 102-111 - [c21]Arvind Narayanan, Vitaly Shmatikov:
Fast dictionary attacks on passwords using time-space tradeoff. CCS 2005: 364-372 - [c20]Ajay Mahimkar, Vitaly Shmatikov:
Game-Based Analysis of Denial-of-Service Prevention Protocols. CSFW 2005: 287-301 - [c19]