Publications from the last three years

Guohong Cao

Y. Wu, Y. Wang, W. Hu, X. Zhang, and G. Cao, “Resource-Aware Photo Crowdsourcing Through Disruption Tolerant Networks,” IEEE International Conference on Distributed Computing Systems (ICDCS), 2016

Z. Lu, G. Cao and T. La Porta, “Networking Smartphones for Disaster Recovery,” IEEE PerCom, 2016.

J. Zhao X. Zhuo, Q. Li, W. Gao, G. Cao, “Contact Duration Aware Data Replication in DTNs with Licensed and Unlicensed Spectrum,” IEEE Transactions on Mobile Computing, April, 2016.

Z. Lu, Y. Wen, W. Zhang, Q. Zheng, and G. Cao, “Towards Information Diffusion in Mobile Social Networks,” IEEE Transactions on Mobile Computing (TMC), May 2016.

Jing Zhao, Wei Gao, Yi Wang, and Guohong Cao, “Delay-Constrained Caching in Cognitive Radio Networks,” IEEE Transactions on Mobile Computing, March, 2016.

Y. Wu, Y. Wang, W. Hu, and G. Cao, “SmartPhoto: A Resource-Aware Crowdsourcing Approach for Image Sensing with Smartphones,” IEEE Transactions on Mobile Computing, May 2016.

Qinghua Li and Guohong Cao, “Providing Privacy-Aware Incentives in Mobile Sensing Systems,” IEEE Transactions on Mobile Computing, June 2016.

Y. Geng, W. Hu, Y. Yang, W. Gao, and G. Cao, “Energy-Efficient Computation Offloading in Cellular Networks,” IEEE International Conference on Network Protocols (ICNP), 2015.

X. Sun, Z. Lu, W. Hu, and G. Cao, “SymDetector: Detecting Sound-Related Respiratory Symptoms Using Smartphones,” ACM International Conference on Pervasive and Ubiquitous Computing (UbiComp), 2015.

Wenjie Hu and Guohong Cao “Energy-Aware Video Streaming on Smartphones,” IEEE infocom, 2015.

B. Niu, Q. Li, X. Zhu, G. Cao, H. Li, “Enhancing Privacy through Caching in Location-Based Services,” IEEE INFOCOM, 2015.

X. Sun, Z. Lu, X. Zhang, M. Salathé, and G. Cao, “Targeted Vaccination Based on a Wireless Sensor System,” IEEE International Conference on Pervasive Computing and Comunications (Percom), 2015.

Q. Li and G. Cao, “Privacy-Preserving Participatory Sensing,” IEEE Communication Magazine, August, 2015.

W. Gao, Q. Li, and G. Cao, “Forwarding Redundancy in Opportunistic Mobile Networks: Investigation, Elimination and Exploitation,” IEEE Transactions on Mobile Computing, April, 2015.

B. Zhao, W. Hu, Q. Zheng, and G. Cao, “Energy-Aware Web Browsing on Smartphones,” IEEE Transactions on Parallel and Distributed Systems, March 2015.

Yi Wang, Wenjie Hu, Yibo Wu, and Guohong Cao, “SmartPhoto: A Resource-Aware Crowdsourcing Approach for Image Sensing with Smartphones,” ACM Mobihoc, 2014.

Wenjie Hu and Guohong Cao, “Quality-Aware Traffic Offloading in Wireless Networks,” ACM Mobihoc, 2014.

Wenjie Hu and Guohong Cao, “Energy Optimization Through Traffic Aggregation in Wireless Networks,” IEEE infocom, 2014.

Jing Zhao, Wei Gao, Yi Wang, and Guohong Cao, “Delay-Constrained Caching in Cognitive Radio Networks,” IEEE infocom, 2014.

Jing Zhao and Guohong Cao, “Spectrum-Aware Data Replication in Intermittently Connected Cognitive Radio Networks,” IEEE infocom, 2014.

Wei Gao, Qinghua Li, and Guohong Cao, “Forwarding Redundancy in Opportunistic Mobile Networks: Investigation and Elimination,” IEEE infocom, 2014.

Z. Lu, Y. Wen, and G. Cao, “Information Diffusion in Mobile Social Networks: The Speed Perspective,” IEEE infocom, 2014.

Trent Jaeger

Xinyang Ge, Nirupama Talele, Mathias Payer, Trent Jaeger.  Fine-Grained Control-Flow Integrity for Kernel Software.  In Proceedings of the 1st European Symposium on Security and Privacy (IEEE EuroS&P), March 2016.

Giuseppe Petracca, Yuqiong Sun, Trent Jaeger, Ahmad Atamli.  AuDroid: Preventing Attacks on Audio Channels in Mobile Devices.  In Proceedings of the 31st Annual Computer Security Applications Conference (ACSAC), December 2015.

Yuqiong Sun, Susanta Nanda, Trent Jaeger.  Security-as-a-Service for Microservices-Based Cloud Applications.  In Proceedings of the 7th International Conference on Cloud Computing Technology and Science (IEEE CloudCom), November 2015.

Yuqiong Sun, Giuseppe Petracca, Trent Jaeger, Hayawardh Vijayakumar, Joshua Schiffman.  CloudArmor: Protecting cloud commands from compromised cloud services.  In Proceedings of the 8th IEEE International Conference on Cloud Computing (IEEE CLOUD), June 2015.
Divya Muthukumaran, Nirupama Talele, Trent Jaeger, Gang Tan.  Producing hook placements to enforce expected access control policies.  In Proceedings of the 2015 International Symposium on Engineering Secure Software and Systems (ESSoS), March 2015.
Hayawardh Vijayakumar, Xinyang Ge, Mathias Payer, Trent Jaeger.  Jigsaw: Protecting resource access by inferring programmer expectations. In Proceedings of the 23rd USENIX Security Symposium, August 2014.

Xinyang Ge, Hayawardh Vijayakumar, Trent Jaeger.  SProbes: Enforcing kernel code integrity on the TrustZone architecture.  In Proceedings of the Mobile Security Technologies 2014 Workshop (MoST’14), in conjunction with the IEEE Symposium on Security and Privacy, May 2014.

David Schmidt and Trent Jaeger.  Pitfalls in the automated strengthening of passwords.  In Proceedings of the 29th Annual Computer Security Applications Conference (ACSAC), December 2013.

Hayawardh Vijayakumar, Joshua Schiffman, Trent Jaeger. Process Firewalls: Protecting processes during resource access.  In Proceedings of the 2013 ACM European Conference on Computer Systems (ACM EuroSys), April 2013.

Patrick McDaniel

Journal Publications:

Alexander Kott, Ananthram Swami, and Patrick Drew McDaniel, Security Outlook: Six Cyber Game Changers for the Next 15 Years. IEEE Computer, 47(12):104-106, 2014.

Zhenfu Cao, Keqiu Li, Xu Li, Patrick McDaniel, Radha Poovendran, Guojun Wang, and Yang Xiang, Guest Editors’ Introduction: Special Issue on Trust, Security, and Privacy in Parallel and Distributed Systems. IEEE Transactions on Parallel and Distributed Systems, 25(2):279-282, 2014.

William Enck, Peter Gilbert, Seungyeop Han, Vasant Tendulkar, Byung-Gon Chun, Landon Cox, Jaeyeon Jung, Patrick McDaniel, and Anmol Sheth, TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. ACM Transactions on Computer Systems (TOCS), 2014. to appear. (extends egc+10)

William Enck, Peter Gilbert, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick McDaniel, and Anmol N. Sheth, TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones.Communications of the ACM, 57(3), March, 2014. Research Highlight.

 

Conference Publications:

Chaz Lever, Robert Walls, Yacin Nadji, David Dagon, Patrick McDaniel, and Manos Antonakakis. Domain-Z: 28 Registrations Later. Proceedings of the 37th IEEE Symposium on Security and Privacy, May 2016. San Francisco, CA.

Yasemin Acar, Michael Backes, Sven Bugiel, Sascha Fahl, Patrick McDaniel, and Matthew Smith. Lessons Learned From Android Security Research For Appified Software Platforms. Proceedings of the 37th IEEE Symposium on Security and Privacy, May 2016. San Francisco, CA.

Nicolas Papernot, Patrick McDaniel, Xi Wu, Somesh Jha, and Ananthram Swami. Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks. Proceedings of the 37th IEEE Symposium on Security and Privacy, May 2016. San Francisco, CA.

Charles J. Huber, Scott E. Brown, Patrick McDaniel, and Lisa M. Marvel. Cyber Fighter Associate: A Decision Support System for Cyber Agility. Proceedings of the 50th Annual Conference on Information Sciences and Systems (CISS), March 2016. Princeton, NJ.

Nicolas Papernot, Patrick McDaniel, Somesh Jha, Matt Fredrikson, Z. Berkay Celik, and Ananthram Swami. The Limitations of Deep Learning in Adversarial Settings. Proceedings of the 1st IEEE European Symposium on Security and Privacy, IEEE 2016. Saarbrucken, Germany.

Damien Octeau, Somesh Jha, Matthew Dering, Patrick McDaniel, Alexandre Bartel, Li Li, Jacques Klein, and Yves Le Traon. Combining Static Analysis with Probabilistic Models to Enable Market-Scale Android Inter-Component Analysis. Proceedings of the 43rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL), January 2016. St. Petersburg, Florida, USA.

Robert J. Walls, Eric D. Kilmer, Nathaniel Lageman, and Patrick D. McDaniel. Measuring the Impact and Perception of Acceptable Advertisements. Proceedings of the ACM 2015 Internet Measurement Conference (IMC), October 2015.

Nicolas Papernot, Patrick McDaniel, and Robert Walls. Enforcing Agile Access Control Policies in Relational Databases using Views. Proceedings of the Military Communications Conference (MILCOM), October 2015. Tampa, FL.

Alessandro Oltramari, Lorrie Faith Cranor, Robert Walls, and Patrick McDaniel. Computational Ontology of Network Operations. Proceedings of the Military Communications Conference (MILCOM), October 2015. Tampa, FL.

Berkay Celik, Robert Walls, Patrick McDaniel, and Ananthram Swami. Malware Traffic Detection using Tamper Resistant Features. Proceedings of the Military Communications Conference (MILCOM), October 2015. Tampa, FL.

Devin Pohly, Charles Sestito, and Patrick McDaniel. Adaptive Protocol Switching Using Dynamically Insertable Bumps in the Stack. Proceedings of the Military Communications Conference (MILCOM), October 2015. Tampa, FL.

Azeem Aqil, Ahmed Atya, Trent Jaeger, Srikanth Krishnamurthy, Karl Levitt, Patrick McDaniel, Jeff Rowe, and Ananthram Swami. Detection of Stealthy TCP-based DoS Attacks. Proceedings of the Military Communications Conference (MILCOM), October 2015. Tampa, FL.

Daniel E. Krych, Stephen Lange-Maney, Patrick McDaniel, and William Glodek. Investigating Weaknesses in Android Certificate Security. SPIE 9478, Modeling and Simulation for Defense Systems and Applications X, May 2015.

Damien Octeau, Daniel Luchaup, Matthew Dering, Somesh Jha, and Patrick McDaniel. Composite Constant Propagation: Application to Android Inter-Component Communication Analysis. Proceedings of the 37th International Conference on Software Engineering (ICSE), May 2015.

Tom La Porta

S. Silvestri, N. Bartolini, S. Ciavaralla, T.F. La Porta, “On the Vulnerabilities of Voronoi-based Approaches to Mobile Sensor Deployment,” IEEE Transactions on Mobile Computing, to appear.

R. Ramanathan, E. Ciftcioglu, A. Samanta, R. Urgaonkar, T. F. La Porta, “Symptotics: A Framework for Estimating the Scalability of Real-World Wireless Networks,” ACM/Springer Wireless Networks Journal, DOI 10.1007/s11276-016-1204-4, to to appear.

B. Holbert, S. Tati, S. Silvestri, T.F. La Porta, A. Swami, “Network Topology Inference with Partial Information,” IEEE Transactions on Network and Service Management, 12(3):406-419.

A. Atya, I. Broustis, S. Singh, D. Syrivelis, S. Krishnamurthy, T.F. La Porta, “A Policy Aware Enforcement Logic for Appropriately Invoking Network Coding,” IEEE/ACM Transactions on Networking, to appear.

Y. Alayev, A. Bar-Noy, M.P. Johnson, L. Kaplan, T.F. La Porta, “You Can’t Get There From Here: Sensor Scheduling with Refocusing Delays,” ACM/Springer Wireless Networks Journal, 21(5):1683-1698, 2015.

Z. Lu, X. Sun, W. Wen, G. Cao. T.F. La Porta, “Algorithms and Applications for Community Detection in Weighted Networks,” IEEE Transactions on Parallel and Distributed Systems, to appear.

S. Tati, S. Rager, B.-J. Ko, G. Cao, A. Swami, T.F. La Porta, “netCSI: A Generic Fault Diagnosis Algorithm for Large-Scale Failures in Computer Networks,” IEEE Transactions on Dependable and Secure Computing, to appear.

E. Ciftioglu, A. Michaloliakos, A. Yener, K. Psounis, T.F. La Porta, R. Govindan, “Operational Information Content Sum Capacity: From Theory to Practice,” Computer Networks, Elsevier, 10.1016/j.comnet.2014.08.017 pp. 1-17.

Y. Aleyev, F. Chen, Y. Hou, M. P. Johnson, A. Bar-Noy, T. F. La Porta, K. Leung, “Throughput Maximization in Mobile WSN Scheduling with Power Control and Rate Selection,” IEEE Transactions on Wireless, 13(7):4066-4079, July, 2014.

G. Bongiovani, N. Bartolini, T. F. La Porta, S. Silvestri, “On the Vulnerabilities of the Virtual Force Approach to Mobile Sensor Deployment,” IEEE Transactions on Mobile Computing, 13(11):2592-2605, Nov., 2014.

S. Tati, B.J. Ko, G. Cao, A. Swami, T.F. La Porta, “Adaptive Algorithms for Diagnosing Large-Scale Failures in Computer Networks,” IEEE Transactions on Parallel and Distributed Systems, 26(3):646, 2015.

G. Papageorgiou, S. Singh, S. Krishnamurthy, R. Govindan, T.F. La Porta, “A Distortion Resistant Routing Framework for Video Traffic in Wireless Multi-hop Networks,” IEEE/ACM Transactions on Networking, 23(2):412-425, April, 2015.

T.F. La Porta, C. Petrioli, C. Phillips, D. Spenza, “Sensor-mission assignment in rechargeable wireless sensor networks,” ACM Transactions on Sensor Networks, 10(4), 2014.

Q. Li, G. Cao, T.F. La Porta, “Efficient and Privacy-Aware Data Aggregation in Mobile Sensing,” IEEE Transactions on Dependable and Secure Computing, 11(2):115-129, March/April, 2014.

J. Edwards, A. Bahjat, Y. Jiang, T. Cook, T.F. La Porta, “Quality of Information-aware Mobile Applications,” Pervasive and Mobile Computing, Elsevier, 11 (2014):216–228.

Q. Zheng, G. Cao. T. F. La Porta, A. Swami, “A Cross-Layer Approach for Minimizing Routing Disrpution in IP Networks,” IEEE Transactions on Parallel and Distributed Systems, 25 (7): 1659-1669 (2014).

T-S. Kim, I. Broustis , S. Vural, D. Syrivelis, S. Singh, S.V. Krishnamurthy, T.F. La Porta, “Realizing the Benefits of Wireless Network Coding in Multi-Rate Settings,” IEEE/ACM Transactions on Networking, 21(3):950-962, June, 2013.

L.A. Tang, Y. Zheng, J. Yuan, J. Han, A. Leung, W.-C. Peng, T.F. La Porta, “A Framework of Traveling Companion Discovery on Trajectory Data Streams,” ACM Transactions on Intelligent Systems and Technology” to appear.

S. Ray, T.F. La Porta, P. Basu. G. Cao, S. Schaffer, D. Dent, “Metric Driven Mobility Modeling in Tactical Networks,” Journal of Defense Modeling and Simulation, 10(2):161-180, April 2013.

L.A. Tang, X. Yu, S. Kim, J. Han, W.-C. Peng, Y. Sun. A. Leung, T.F. La Porta, “Multidimensional Sensor Data Analysis in Cyber-Physical System: An Atypical Cube Approach,” International Journal of Distributed Sensor Networks, to appear.

F. Chen, M.P. Johnson, A. Bar-Noy, T.F. La Porta, “Proactive Data Dissemination to Mission Sites,” Springer/ACM Wireless Networks, 18(7):749-762.

W. Gao, G. Cao, T.F. La Porta, J. Han, “On Exploiting Transient Social Contact Patterns for Data Forwarding in Delay Tolerant Networks,” IEEE Transactions on Mobile Computing, January, 201

N. Bartolini, S. Ciavarella, T. F. La Porta, S. Silvestri, “Network Recovery After Massive Failures,” IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2016), to appear.

S. Achleitner, T.F. La Porta, S. Krishnamurthy, V.S. Quizhpi, “Network Coding Efficiency in the Presence of an Intermittent Backhaul Network,” Proc. of IEEE ICC 2016 (to appear).

J. Edwards, T. Cassidy, G. de Mel, T. F. La Porta, “Integrating Quality of Information with Pragmatic Assistance,” Proc. of IEEE 13th International Workshop on Managing Communications and Services, March, 2013.

S. Rager, E. Ciftioglu, R. Ramanathan, T.F. La Porta, R. Govindan, “Scalability and Satisfiability of Quality of Information in Wireless Networks,” Proc. of IEEE WCNC, 2016.

Z. Lu, X. Sun, T. F. La Porta, “Cooperative Data Offloading in Opportunistic Mobile Networks,” Proc. of IEEE INFOCOM, 2016 (to appear).

M. Lin, N. Bartolini, T. F. La Porta, “Power Adjustment and Scheduling in OFDMA Femtocell Networks,” Proc. of IEEE INFOCOM, 2016 (to appear).

Z. Lu, G. Cao, T.F. La Porta, “Networking Smartphones for Disaster Recovery,” Proc. of IEEE PERCOM, 2016.

N. Hu, T. F. La Porta, N. Bartolini, “Self-Adaptive Resource Allocation for Event Monitoring with Uncertainty in Sensor Networks,” Proc. of IEEE MASS, 2015.

M. Lin, S. Silvestri, N. Bartolini, T.F. La Porta, “Energy-Efficient Selective Activation in Femtocell Networks,” Proc. of IEEE MASS, 2015.

S. Silvestri, B. Holbert, P. Novotny, T. F. La Porta, A. Wolf, A. Swami, “Inferring Network Topologies in MANETs Applied to Service Redeployment,” IEEE International Conference on Computer Communication Networks (ICCCN), 2015.

M. Mukherjee, J. Edwards, H. Kwong, T.F. La Porta, “Quality of Information-aware Real-time Traffic Flow Analysis and Reporting,” Proc. of 7th International Workshop on Information Quality and Quality of Service for Pervasive Computing (I2QS), in conjunction with IEEE PERCOM, 2015.

B. Prabhala, T.F. La Porta, “Spatial and Temporal Considerations in Next Place Predictions,” Proc. Seventh IEEE International Workshop on Network Science for Communication Networks (NetSciCom 2015).

B. Holbert, S.Tati, S. Silvestri, T.F. La Porta, A. Swami, “Network Topology Inference with Partial Path Information,” International Conference on Computing, Networking and Communications, Network Algorithm & Performance Evaluation Symposium (ICNC), 2015.

T. Dao, A. Chowdhury, H. Madhyastha, S. Krishnamurthy, T.F. La Porta, “Managing Redundant Content in Bandwidth Constrained Wireless Networks,” Proc. of ACM CoNEXT, 2014.

S. Rager, E. Ciftioglu, T. F. La Porta, Performance Analysis of Practical Distributed Backpressure Protocols, Proc. of IEEE ICCCN, 2014.

S. Rager, E. Ciftioglu, T. F. La Porta, A. Leung, W. Dron, R. Ramanathan, J. Hancock, “Data Selection for Maximum Coverage in Sensor Networks with Cost Constraints,” Proc. of IEEE DCOSS, 2014.

S. Tati, S. Silvestri, T. He, T. F. La Porta, “Robust Network Tomography in the Presence of Failures,” Proc. of IEEE ICDCS, 2014.

N. Bartolini, B. Bongiovanni, T.F. La Porta, S. Silvestri, F. Vincenti, “Voronoi-based Deployment of  Mobile Sensors in the Face of Adversaries,” Proc. of IEEE ICC 2014.

B. Prabhala, J. Wang, B. Deb, T.F. La Porta, J. Han, “Leveraging Periodicity in Human Mobility for Next Place Prediction,” Proc. of IEEE WCNC, 2014.

Ciftcioglu, A. Michaloliakos, K. Psounis, T.F. La Porta, A. Yener,” Power Minimization with Quality-of-Information Outages,” Proc. of IEEE WCNC, 2014.

E.N. Ciftcioglu, A. Michaloliakos, K. Psounis, T.F. La Porta, A. Yener,” Power Minimization with Quality-of-Information Outages,” Proc. of IEEE WCNC, 2014.

M. Lin, T. F. La Porta, “Energy-Aware Enterprise Femtocell Deployment, “Proc of IEEE WCNC, 2014.

G. Papageorgiou, J. Gasparis, S.V. Krishnamurthy, R. Govindan, T.F. La Porta, “Resource Thrifty Secure Mobile Video Transfer on Open WiFi Networks,” Proc. of 9th ACM International Conference on Emerging Network Experiments and Technologies (CoNext), 2103.

B. Holbert, S. Tati, S. Silvestri, A. Swami, T.F. La Porta,” Effects of Partial Topology on Fault Diagnosis,” IEEE MILOCM 2013.

E. Ciftioglu, R. Ramanathan, T.F. La Porta, “Scalability Analysis of Tactical Mobility Patterns,” IEEE MILCOM 2013.

N. Hu, D. Pizzocaro, M.P. Johnson, T. F. La Porta, A. Preece, “Resource Allocation With Non-Deterministic Demands and Profits,” Proc. of IEEE MASS, 2013.

M. Lin, T.F. La Porta, “Utility-based Femto-cell Pilot Management,” IEEE PIMRC, 2013.

L.-A. Tang, X. Yu, Q. Gu, J. Han, A. Leung, T. F. La Porta, “Mining Lines in the Sand: On Trajectory Discovery From Untrustworthy Data in Cyber-Physical System.” Proc of 19th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD), 2013.

N. Bartolini, G. Bongiovanni, T.F. La Porta, S. Silvestri, “On the Security Vulnerabilities of the Virtual Force Approach to Mobile Sensor Deployment,” Proc. of IEEE INFOCOM 2013.

A.F. Atya, I. Broustis,  S. Singh, D. Syrivelis, S.V. Krishnamurthy, T.F. La Porta, “Wireless Network Coding: Deciding When to Flip the Switch,” Proc. of IEEE INFOCOM Mini-conference, 2013.

Z. Feng, G. Papageorgiou, S.V. Krishnamurthy, R, Govindan, T.F. La Porta, “Trading Off Distortion for Delay for Video Transmissions in Wireless Networks,” Proc. of IEEE INFOCOM 2013.

 

Adam Smith

Raef Bassily, Kobbi Nissim, Adam Smith, Thomas Steinke, Uri Stemmer, Jonathan Ullman. Algorithmic Stability for Adaptive Data Analysis. STOC 2016.

Ran Canetti, Benjamin Fuller, Omer Paneth, Leonid Reyzin, Adam Smith. Reusable Fuzzy Extractors for Low-Entropy Sources. EUROCRYPT 2016.

Craig Gentry, Jens Groth, Yuval Ishai, Chris Peikert, Amit Sahai, Adam D. Smith: Using Fully Homomorphic Hybrid Encryption to Minimize Non-interactive Zero-Knowledge Proofs. J. Cryptology 28(4): 820-843 (2015).

Christian Borgs, Jennifer T. Chayes, Adam Smith: Private Graphon Estimation in Sparse Graphs. NIPS 2015.

Cynthia Dwork, Adam D. Smith, Thomas Steinke, Jonathan Ullman, Salil P. Vadhan: Robust Traceability from Trace Amounts. FOCS 2015: 650-669.

Avrim Blum, Jamie Morgenstern, Ankit Sharma, Adam D. Smith: Privacy-Preserving Public Information for Sequential Games. ITCS 2015: 173 180.

Raef Bassily, Adam D. Smith: Local, Private, Efficient Protocols for Succinct Histograms. STOC 2015: 127 135.

Adam Smith, Ye Zhang: On the Regularity of Lossy RSA – Improved Bounds and Applications to Padding-Based Encryption. TCC (1) 2015: 609-628.

Vishesh Karwa, Sofya Raskhodnikova, Adam D. Smith, Grigory Yaroslavtsev: Private Analysis of Graph Structure. ACM Trans. Database Syst. 39(3): 22:1-22:33 (2014).

Raef Bassily, Adam Smith, Abhradeep Thakurta: Private Empirical Risk Minimization: Efficient Algorithms and Tight Error Bounds. FOCS 2014: 464-473.

Sofya Raskhodnikova, Dana Ron, Ronitt Rubinfeld, Adam Smith: Sublinear Algorithms for Approximating String Compressibility. Algorithmica 65(3): 685-709 (2013).

Abhradeep Thakurta, Adam Smith: Differentially Private Feature Selection via Stability Arguments, and the Robustness of the Lasso. COLT 2013: 819-850.

Mark Lewko, Adam O’Neill, Adam Smith: Regularity of Lossy RSA on Subdomains and Its Applications. EUROCRYPT 2013: 55-75.

Raef Bassily, Adam Groce, Jonathan Katz, Adam Smith: Coupled-Worlds Privacy: Exploiting Adversarial Uncertainty in Statistical Data Privacy. FOCS 2013: 439-448.

Abhradeep Guha Thakurta, Adam D. Smith: (Nearly) Optimal Algorithms for Private Online Learning in Full-information and Bandit Settings. NIPS 2013: 2733-2741.

Shiva Prasad Kasiviswanathan, Mark Rudelson, Adam Smith: The Power of Linear Reconstruction Attacks. SODA 2013: 1415-1433.

Shiva Prasad Kasiviswanathan, Kobbi Nissim, Sofya Raskhodnikova, Adam Smith: Analyzing Graphs with Node Differential Privacy. TCC 2013: 457-476.

Li Li, Alexandre Bartel, Tegawende Bissyande, Jacques Klein, Yves Le Traon, Steven Arzt, Siegfried Rasthofer, Eric Bodden, Damien Octeau, and Patrick McDaniel. IccTA: Detecting Inter-Component Privacy Leaks in Android Apps.Proceedings of the 37th International Conference on Software Engineering (ICSE), May 2015.

Jing Tian, Kevin R. B. Butler, Patrick McDaniel, and Padma Krishnaswamy. Securing ARP From the Ground Up.CODASPY ’15: Proceedings of the 5th ACM Conference on Data Application and Security and Privacy, March 2015. San Antonio, TX, USA.

Alessandro Oltramari, Lorrie Cranor, Robert J. Walls, and Patrick McDaniel. Building an Ontology of Cyber Security.Proc. Intl. Conference on Semantic Technologies for Intelligence, Defense, and Security (STIDS), November 2014.

Matthew Dering and Patrick McDaniel. Android Market Reconstruction and Analysis. Proceedings of the Military Communications Conference (MILCOM), October 2014. Baltimore, MD.

Wenhui Hu, Damien Octeau, Patrick McDaniel, and Peng Liu. Duet: Library Integrity Verification for Android Applications. Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), July 2014. Oxford, United Kingdom.

Steven Arzt, Siegfried Rasthofer, Christian Fritz, Eric Bodden, Alexandre Bartel, Jacques Klein, Yves Le Traon, Damien Octeau, and Patrick McDaniel. FlowDroid: Precise Context, Flow, Field, Object-sensitive and Lifecycle-aware Taint Analysis for Android Apps. Proceedings of the 35th Conference on Programming Language Design and Implementation (PLDI), June 2014.

Phillip Koshy, Diana Koshy, and Patrick McDaniel. An Analysis of Anonymity in Bitcoin Using P2P Network Traffic.Proceedings of Financial Cryptography 2014, International Financial Cryptography Association (IFCA), February 2014. Christ Church, Barbados.

Stephen McLaughlin, Devin Pohly, Patrick McDaniel, and Saman Zonouz. A Trusted Safety Verifier for Process Controller Code. Proc. ISOC Network and Distributed Systems Security Symposium (NDSS), February 2014. San Diego, CA.

Damien Octeau, Patrick McDaniel, Somesh Jha, Alexandre Bartel, Eric Bodden, Jacques Klein, and Yves Le Traon. Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security Analysis. Proceed

Gang Gary Tan

Ben Niu and Gang Tan. Per-Input Control-Flow Integrity. In 22nd ACM Conference on Computer and Communication Security (CCS), 2015.

Divya Muthukumaran, N. Talele, T. Jaeger, and G. Tan. Producing Hook Placements to Enforce Expected Access Control Policies. In 2015 International Symposium on Engineering Secure Software and Systems (ESSoS), Mar. 2015.

Ben Niu and Gang Tan. RockJIT: Securing Just-In-Time Compilation Using Modular Control-Flow Integrity. In 21st ACM Conference on Computer and Communication Security (CCS), 2014.

Siliang Li and Gang Tan. Finding Reference-Counting Errors in Python/C Programs with Affine Analysis. In the 27th European Conference on Object-Oriented Programming (ECOOP), Jul. 2014.

Mengtao Sun and Gang Tan. NativeGuard: Protecting Android Applications from ThirdParty Native Libraries. In the 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), Jul. 2014.

Ben Niu and Gang Tan. Per-Input Control-Flow Integrity. In 22nd ACM Conference on Computer and Communication Security (CCS), 2015.

Divya Muthukumaran, N. Talele, T. Jaeger, and G. Tan. Producing Hook Placements to Enforce Expected Access Control Policies. In 2015 International Symposium on Engineering Secure Software and Systems (ESSoS), Mar. 2015.

Ben Niu and Gang Tan. RockJIT: Securing Just-In-Time Compilation Using Modular Control-Flow Integrity. In 21st ACM Conference on Computer and Communication Security (CCS), 2014.

Siliang Li and Gang Tan. Finding Reference-Counting Errors in Python/C Programs with Affine Analysis. In the 27th European Conference on Object-Oriented Programming (ECOOP), Jul. 2014.

Mengtao Sun and Gang Tan. NativeGuard: Protecting Android Applications from ThirdParty Native Libraries. In the 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), Jul. 2014.

Danfeng Zhang

SecDCP: Secure Dynamic Cache Partitioning for Efficient Timing Channel Protection Yao Wang, Andrew Ferraiuolo, Danfeng Zhang, Andrew C. Myers, and G. Edward Suh.Proceedings of the the 53rd Design Automation Conference (DAC), June 2016, to appear.

Lattice Priority Scheduling: Low-Overhead Timing Channel Protection for a Shared Memory Controller.Andrew Ferraiuolo, Yao Wang, Danfeng Zhang, Andrew C. Myers and G. Edward Suh.Proceedings of the 22nd International Symposium on High-Performance Computer Architecture (HPCA), 2016, to appear.

Diagnosing Type Errors with Class.Danfeng Zhang, Andrew C. Myers, Dimitrios Vytiniotis and Simon Peyton‑Jones.Proc. of the 36th ACM SIGPLAN conference on Programming Language Design and Implementation (PLDI), 2015, pp. 12–21.

A Hardware Design Language for Timing-Sensitive Information-Flow Security. Danfeng Zhang, Yao Wang, G. Edward Suh and Andrew C. Myers.Proc. of the 20th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), 2015, pp. 503–516.

Ironclad Apps: End-to-End Security via Automated Full-System Verification.Chris Hawblitzel, Jon Howell, Jacob R. Lorch, Arjun Narayan, Bryan Parno, Danfeng Zhang and Brian Zill.Proc. of the 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI), 2014, pp. 165-181.

Toward General Diagnosis of Static Errors.Danfeng Zhang and Andrew C. Myers.Proc. of the 41st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL), 2014, pp. 569-581.

Sencun Zhu

L. Luo, Y. Fu, D. Wu, S. Zhu and P. Liu. Repackage-proofing Android Apps.  To appear in Proceedings of The 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2016.

Q. Guan, H. Huang, W. Luo and S. Zhu. Semantics-based Repackaging Detection for Mobile Apps.To appear in Proceedings of International Symposium on Engineering Secure Software and Systems (ESSOS), 2016.

H. Huang, S. Zhu, K. Chen and P. Liu. From System Services Freezing to System Server Shutdown in Android: All You Need Is a Loop in an Application.Proceedings of the 22th ACM Conference on Computer and Communications Security (CCS), 2015.

H. Huang and S. Zhu. Multi-objective Software Assignment for Active Cyber Defense. Proceedings of IEEE Conference on Communications and Network Security (CNS), 2015.

X. Chen and S. Zhu. DroidJust: Automated Functionality-Aware Privacy Leakage Analysis for Android Applications. Proceedings of the 8th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2015.

Z. Xie and S. Zhu. AppWatcher: Unveiling the Underground Market of Trading Mobile App Reviews. Proceedings of the 8th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2015.

Z. Xu and S. Zhu. SemaDroid: A Privacy-Aware Sensor Management Framework for Smartphones. Proceedings of The Fifth ACM Conference on Data and Application Security and Privacy (CODASPY), 2015.  (Outstanding paper award)

H. Huang, K. Chen, C. Ren, P. Liu, S. Zhu and D. Wu..Proceedings of ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2015.

Y. Jhi, X. Jia, X. Wang, S. Zhu, P. Liu, and D. Wu. Program Characterization Using Runtime Values and Its Application to Software Plagiarism Detection. IEEE Transactions on Software Engineering (TSE), 2015.

F. Zhang, D. Wu, P. Liu, and S. Zhu. Program Logic Based Software Plagiarism Detection. Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering (ISSRE), 2014.

L. Li, S. Zhu, D. Torrieri, and S. Jajodia. Self- Healing Wireless Networks under Insider Jamming Attacks. Proceedings of IEEE Conference on Communications and Network Security (CNS), 2014.

L. Luo, J. Ming, D. Wu, P. Liu and S. Zhu.Proceedings of The 22nd ACM SIGSOFT International Symposium on the Foundations of Software Engineering (FSE), 2014.

C. Huang, S. Zhu, and R. Erbacher. Toward Software Diversity in Heterogeneous Networked Systems. Proceedings of the 28th IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec), 2014.

X. Xie and S. Zhu. GroupTie: Toward Hidden Collusion Group Discovery in App Stores. Proceedings of the 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2014.

F. Zhang, H. Huang, S. Zhu, D. Wu, and P. Liu. ViewDroid: Towards Obfuscation-Resilient Mobile Application Repackaging Detection.Proceedings of the 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2014.

X. Chen, J. Cho, and S. Zhu. GlobalTrust: An Attack-Resilient Reputation System for Tactical Networks. Proceedings of 11th IEEE Conference on Sensing and Communication in Wireless Networks (SECON), 2014.

W. Xu, F. Zhang, and S. Zhu. Permlyzer: Analyzing Permission Usage in Android Apps. Proceedings of the 24th IEEE International Symposium on Software Reliability Engineering (ISSRE), 2013.

Y. Chen, S. Zhu, H. Xu, and Y. Zhou.Children’s Exposure to Mobile In-App Advertising: An Analysis of Content Appropriateness.Proceedings of The ASE/IEEE International Conference on Social Computing (SocialCom), 2013.

H. Huang, S. Zhu, P. Liu and D. Wu. A Framework for Evaluating Mobile App Repackaging Detection Algorithms. Proceedings of the 6th International Conference on Trust & Trustworthy Computing (TRUST), 2013.

Y. Chen, H. Xu, Y. Zhou and S. Zhu. Is This App Safe for Children? A Comparison Study of Maturity Ratings on Android and iOS Applications. Proceedings of the 22nd International World Wide Web conference (WWW), 2013.

X. Chen, H. Patankar, S. Zhu, M. Srivatsa, J. Opper. Zigzag: Partial Mutual Revocation Based Trust Management in Tactical Ad Hoc Networks. Proceedings of 10th IEEE Conference on Sensing and Communication in Wireless Networks (SECON), 2013.

W. Xu, F. Zhang and S. Zhu. JStill: Mostly Static Detection of Obfuscated Malicious JavaScript Code. Proceedings of Third ACM Conference on Data and Application Security and Privacy (CODASPY), 2013.

T. Cheng, P. Li,  S. Zhu, and D. Torrieri. M-cluster and X-ray: Two Methods for Multi-Jammer Localization in Wireless Sensor Networks. Journal of Integrated Computer-Aided Engineering (ICAE), 2013.

Skip to toolbar