BibTeX records: Prateek Saxena

download as .bib file

@article{DBLP:journals/pacmpl/WangKNBS23,
  author       = {Bo Wang and
                  Aashish Kolluri and
                  Ivica Nikolic and
                  Teodora Baluta and
                  Prateek Saxena},
  title        = {User-Customizable Transpilation of Scripting Languages},
  journal      = {Proc. {ACM} Program. Lang.},
  volume       = {7},
  number       = {{OOPSLA1}},
  pages        = {201--229},
  year         = {2023},
  url          = {https://doi.org/10.1145/3586034},
  doi          = {10.1145/3586034},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pacmpl/WangKNBS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BalutaNJAS23,
  author       = {Teodora Baluta and
                  Ivica Nikolic and
                  Racchit Jain and
                  Divesh Aggarwal and
                  Prateek Saxena},
  editor       = {Weizhi Meng and
                  Christian Damsgaard Jensen and
                  Cas Cremers and
                  Engin Kirda},
  title        = {Unforgeability in Stochastic Gradient Descent},
  booktitle    = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2023, Copenhagen, Denmark, November
                  26-30, 2023},
  pages        = {1138--1152},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3576915.3623093},
  doi          = {10.1145/3576915.3623093},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BalutaNJAS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigsoft/WangLLS23,
  author       = {Bo Wang and
                  Ruishi Li and
                  Mingkai Li and
                  Prateek Saxena},
  editor       = {Satish Chandra and
                  Kelly Blincoe and
                  Paolo Tonella},
  title        = {TransMap: Pinpointing Mistakes in Neural Code Translation},
  booktitle    = {Proceedings of the 31st {ACM} Joint European Software Engineering
                  Conference and Symposium on the Foundations of Software Engineering,
                  {ESEC/FSE} 2023, San Francisco, CA, USA, December 3-9, 2023},
  pages        = {999--1011},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3611643.3616322},
  doi          = {10.1145/3611643.3616322},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigsoft/WangLLS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/YuWBCS23,
  author       = {Jason Zhijingcheng Yu and
                  Conrad Watt and
                  Aditya Badole and
                  Trevor E. Carlson and
                  Prateek Saxena},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {Capstone: {A} Capability-based Foundation for Trustless Secure Memory
                  Access},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {787--804},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/yu-jason},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/YuWBCS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2301-11220,
  author       = {Bo Wang and
                  Aashish Kullori and
                  Ivica Nikolic and
                  Teodora Baluta and
                  Prateek Saxena},
  title        = {User-customizable Transpilation of Scripting Languages},
  journal      = {CoRR},
  volume       = {abs/2301.11220},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2301.11220},
  doi          = {10.48550/ARXIV.2301.11220},
  eprinttype    = {arXiv},
  eprint       = {2301.11220},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2301-11220.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2302-13053,
  author       = {Aashish Kolluri and
                  Sarthak Choudhary and
                  Bryan Hooi and
                  Prateek Saxena},
  title        = {{RETEXO:} Scalable Neural Network Training over Distributed Graphs},
  journal      = {CoRR},
  volume       = {abs/2302.13053},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2302.13053},
  doi          = {10.48550/ARXIV.2302.13053},
  eprinttype    = {arXiv},
  eprint       = {2302.13053},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2302-13053.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2302-13863,
  author       = {Jason Zhijingcheng Yu and
                  Conrad Watt and
                  Aditya Badole and
                  Trevor E. Carlson and
                  Prateek Saxena},
  title        = {Capstone: {A} Capability-based Foundation for Trustless Secure Memory
                  Access (Extended Version)},
  journal      = {CoRR},
  volume       = {abs/2302.13863},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2302.13863},
  doi          = {10.48550/ARXIV.2302.13863},
  eprinttype    = {arXiv},
  eprint       = {2302.13863},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2302-13863.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-14461,
  author       = {Sarthak Choudhary and
                  Aashish Kolluri and
                  Prateek Saxena},
  title        = {Attacking Byzantine Robust Aggregation in High Dimensions},
  journal      = {CoRR},
  volume       = {abs/2312.14461},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2312.14461},
  doi          = {10.48550/ARXIV.2312.14461},
  eprinttype    = {arXiv},
  eprint       = {2312.14461},
  timestamp    = {Thu, 18 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2312-14461.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/CuiSSSY22,
  author       = {Jinhua Cui and
                  Shweta Shinde and
                  Satyaki Sen and
                  Prateek Saxena and
                  Pinghai Yuan},
  title        = {Dynamic Binary Translation for {SGX} Enclaves},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {25},
  number       = {4},
  pages        = {32:1--32:40},
  year         = {2022},
  url          = {https://doi.org/10.1145/3532862},
  doi          = {10.1145/3532862},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/CuiSSSY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BalutaSHTS22,
  author       = {Teodora Baluta and
                  Shiqi Shen and
                  S. Hitarth and
                  Shruti Tople and
                  Prateek Saxena},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {Membership Inference Attacks and Generalization: {A} Causal Perspective},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {249--262},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3560694},
  doi          = {10.1145/3548606.3560694},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BalutaSHTS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KolluriBHS22,
  author       = {Aashish Kolluri and
                  Teodora Baluta and
                  Bryan Hooi and
                  Prateek Saxena},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {LPGNet: Link Private Graph Networks for Node Classification},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {1813--1827},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3560705},
  doi          = {10.1145/3548606.3560705},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/KolluriBHS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/HouYS22,
  author       = {Ruomu Hou and
                  Haifeng Yu and
                  Prateek Saxena},
  title        = {Using Throughput-Centric Byzantine Broadcast to Tolerate Malicious
                  Majority in Blockchains},
  booktitle    = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco,
                  CA, USA, May 22-26, 2022},
  pages        = {1263--1280},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SP46214.2022.9833617},
  doi          = {10.1109/SP46214.2022.9833617},
  timestamp    = {Thu, 21 Sep 2023 15:57:27 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/HouYS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/JiZJLCSR22,
  author       = {Kaihang Ji and
                  Jun Zeng and
                  Yuancheng Jiang and
                  Zhenkai Liang and
                  Zheng Leong Chua and
                  Prateek Saxena and
                  Abhik Roychoudhury},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {FlowMatrix: GPU-Assisted Information-Flow Analysis through Matrix-Based
                  Representation},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {2567--2584},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/ji},
  timestamp    = {Tue, 18 Oct 2022 17:10:36 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/JiZJLCSR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/YuSCS22,
  author       = {Jason Zhijingcheng Yu and
                  Shweta Shinde and
                  Trevor E. Carlson and
                  Prateek Saxena},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {Elasticlave: An Efficient Memory Model for Enclaves},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {4111--4128},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/yu-jason},
  timestamp    = {Tue, 06 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/YuSCS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2205-03105,
  author       = {Aashish Kolluri and
                  Teodora Baluta and
                  Bryan Hooi and
                  Prateek Saxena},
  title        = {LPGNet: Link Private Graph Networks for Node Classification},
  journal      = {CoRR},
  volume       = {abs/2205.03105},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2205.03105},
  doi          = {10.48550/ARXIV.2205.03105},
  eprinttype    = {arXiv},
  eprint       = {2205.03105},
  timestamp    = {Wed, 11 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2205-03105.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2209-08615,
  author       = {Teodora Baluta and
                  Shiqi Shen and
                  S. Hitarth and
                  Shruti Tople and
                  Prateek Saxena},
  title        = {Membership Inference Attacks and Generalization: {A} Causal Perspective},
  journal      = {CoRR},
  volume       = {abs/2209.08615},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2209.08615},
  doi          = {10.48550/ARXIV.2209.08615},
  eprinttype    = {arXiv},
  eprint       = {2209.08615},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2209-08615.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/ShenKDSR21,
  author       = {Shiqi Shen and
                  Aashish Kolluri and
                  Zhen Dong and
                  Prateek Saxena and
                  Abhik Roychoudhury},
  editor       = {Jiannong Cao and
                  Man Ho Au and
                  Zhiqiang Lin and
                  Moti Yung},
  title        = {Localizing Vulnerabilities Statistically From One Exploit},
  booktitle    = {{ASIA} {CCS} '21: {ACM} Asia Conference on Computer and Communications
                  Security, Virtual Event, Hong Kong, June 7-11, 2021},
  pages        = {537--549},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3433210.3437528},
  doi          = {10.1145/3433210.3437528},
  timestamp    = {Wed, 09 Jun 2021 15:14:39 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/ShenKDSR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CuiYSSC21,
  author       = {Jinhua Cui and
                  Jason Zhijingcheng Yu and
                  Shweta Shinde and
                  Prateek Saxena and
                  Zhiping Cai},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Giovanni Vigna and
                  Elaine Shi},
  title        = {SmashEx: Smashing {SGX} Enclaves Using Exceptions},
  booktitle    = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, Republic of Korea, November 15 - 19, 2021},
  pages        = {779--793},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460120.3484821},
  doi          = {10.1145/3460120.3484821},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/CuiYSSC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KolluriBS21,
  author       = {Aashish Kolluri and
                  Teodora Baluta and
                  Prateek Saxena},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Giovanni Vigna and
                  Elaine Shi},
  title        = {Private Hierarchical Clustering in Federated Networks},
  booktitle    = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, Republic of Korea, November 15 - 19, 2021},
  pages        = {2342--2360},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460120.3484822},
  doi          = {10.1145/3460120.3484822},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/KolluriBS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/NikolicMSS21,
  author       = {Ivica Nikolic and
                  Radu Mantu and
                  Shiqi Shen and
                  Prateek Saxena},
  editor       = {Leyla Bilge and
                  Lorenzo Cavallaro and
                  Giancarlo Pellegrino and
                  Nuno Neves},
  title        = {Refined Grey-Box Fuzzing with Sivo},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 18th International Conference, {DIMVA} 2021, Virtual Event, July
                  14-16, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12756},
  pages        = {106--129},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-80825-9\_6},
  doi          = {10.1007/978-3-030-80825-9\_6},
  timestamp    = {Tue, 13 Jul 2021 16:53:38 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/NikolicMSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/BalutaCMS21a,
  author       = {Teodora Baluta and
                  Zheng Leong Chua and
                  Kuldeep S. Meel and
                  Prateek Saxena},
  title        = {Scalable Quantitative Verification for Deep Neural Networks},
  booktitle    = {43rd {IEEE/ACM} International Conference on Software Engineering:
                  Companion Proceedings, {ICSE} Companion 2021, Madrid, Spain, May 25-28,
                  2021},
  pages        = {248--249},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICSE-Companion52605.2021.00115},
  doi          = {10.1109/ICSE-COMPANION52605.2021.00115},
  timestamp    = {Mon, 28 Jun 2021 13:24:52 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/BalutaCMS21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/BalutaCMS21,
  author       = {Teodora Baluta and
                  Zheng Leong Chua and
                  Kuldeep S. Meel and
                  Prateek Saxena},
  title        = {Scalable Quantitative Verification For Deep Neural Networks},
  booktitle    = {43rd {IEEE/ACM} International Conference on Software Engineering,
                  {ICSE} 2021, Madrid, Spain, 22-30 May 2021},
  pages        = {312--323},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICSE43902.2021.00039},
  doi          = {10.1109/ICSE43902.2021.00039},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/BalutaCMS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigsoft/WangBKS21,
  author       = {Bo Wang and
                  Teodora Baluta and
                  Aashish Kolluri and
                  Prateek Saxena},
  editor       = {Diomidis Spinellis and
                  Georgios Gousios and
                  Marsha Chechik and
                  Massimiliano Di Penta},
  title        = {SynGuar: guaranteeing generalization in programming by example},
  booktitle    = {{ESEC/FSE} '21: 29th {ACM} Joint European Software Engineering Conference
                  and Symposium on the Foundations of Software Engineering, Athens,
                  Greece, August 23-28, 2021},
  pages        = {677--689},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3468264.3468621},
  doi          = {10.1145/3468264.3468621},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigsoft/WangBKS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tsd/SaxenaP21,
  author       = {Prateek Saxena and
                  Soma Paul},
  editor       = {Kamil Ekstein and
                  Frantisek P{\'{a}}rtl and
                  Miloslav Konop{\'{\i}}k},
  title        = {Labelled {EPIE:} {A} Dataset for Idiom Sense Disambiguation},
  booktitle    = {Text, Speech, and Dialogue - 24th International Conference, {TSD}
                  2021, Olomouc, Czech Republic, September 6-9, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12848},
  pages        = {210--221},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-83527-9\_18},
  doi          = {10.1007/978-3-030-83527-9\_18},
  timestamp    = {Mon, 19 Sep 2022 18:41:41 +0200},
  biburl       = {https://dblp.org/rec/conf/tsd/SaxenaP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2102-02394,
  author       = {Ivica Nikolic and
                  Radu Mantu and
                  Shiqi Shen and
                  Prateek Saxena},
  title        = {Refined Grey-Box Fuzzing with {SIVO}},
  journal      = {CoRR},
  volume       = {abs/2102.02394},
  year         = {2021},
  url          = {https://arxiv.org/abs/2102.02394},
  eprinttype    = {arXiv},
  eprint       = {2102.02394},
  timestamp    = {Tue, 09 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2102-02394.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2103-15289,
  author       = {Jinhua Cui and
                  Shweta Shinde and
                  Satyaki Sen and
                  Prateek Saxena and
                  Pinghai Yuan},
  title        = {Dynamic Binary Translation for {SGX} Enclaves},
  journal      = {CoRR},
  volume       = {abs/2103.15289},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.15289},
  eprinttype    = {arXiv},
  eprint       = {2103.15289},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-15289.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-09057,
  author       = {Aashish Kolluri and
                  Teodora Baluta and
                  Prateek Saxena},
  title        = {Private Hierarchical Clustering in Federated Networks},
  journal      = {CoRR},
  volume       = {abs/2105.09057},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.09057},
  eprinttype    = {arXiv},
  eprint       = {2105.09057},
  timestamp    = {Mon, 31 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-09057.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2106-11610,
  author       = {Bo Wang and
                  Teodora Baluta and
                  Aashish Kolluri and
                  Prateek Saxena},
  title        = {SynGuar: Guaranteeing Generalization in Programming by Example},
  journal      = {CoRR},
  volume       = {abs/2106.11610},
  year         = {2021},
  url          = {https://arxiv.org/abs/2106.11610},
  eprinttype    = {arXiv},
  eprint       = {2106.11610},
  timestamp    = {Wed, 30 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2106-11610.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2108-01341,
  author       = {Ruomu Hou and
                  Haifeng Yu and
                  Prateek Saxena},
  title        = {Using Throughput-Centric Byzantine Broadcast to Tolerate Malicious
                  Majority in Blockchains},
  journal      = {CoRR},
  volume       = {abs/2108.01341},
  year         = {2021},
  url          = {https://arxiv.org/abs/2108.01341},
  eprinttype    = {arXiv},
  eprint       = {2108.01341},
  timestamp    = {Thu, 05 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2108-01341.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2110-06657,
  author       = {Jinhua Cui and
                  Jason Zhijingcheng Yu and
                  Shweta Shinde and
                  Prateek Saxena and
                  Zhiping Cai},
  title        = {SmashEx: Smashing {SGX} Enclaves Using Exceptions},
  journal      = {CoRR},
  volume       = {abs/2110.06657},
  year         = {2021},
  url          = {https://arxiv.org/abs/2110.06657},
  eprinttype    = {arXiv},
  eprint       = {2110.06657},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2110-06657.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/debu/TrieuSSSS20,
  author       = {Ni Trieu and
                  Kareem Shehata and
                  Prateek Saxena and
                  Reza Shokri and
                  Dawn Song},
  title        = {Epione: Lightweight Contact Tracing with Strong Privacy},
  journal      = {{IEEE} Data Eng. Bull.},
  volume       = {43},
  number       = {2},
  pages        = {95--107},
  year         = {2020},
  url          = {http://sites.computer.org/debull/A20june/p95.pdf},
  timestamp    = {Tue, 21 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/debu/TrieuSSSS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/HouJLSY20,
  author       = {Ruomu Hou and
                  Irvan Jahja and
                  Loi Luu and
                  Prateek Saxena and
                  Haifeng Yu},
  title        = {Randomized View Reconciliation in Permissionless Distributed Systems},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {28},
  number       = {5},
  pages        = {1925--1938},
  year         = {2020},
  url          = {https://doi.org/10.1109/TNET.2020.3004834},
  doi          = {10.1109/TNET.2020.3004834},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/HouJLSY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/JiaTMGSL20,
  author       = {Yaoqi Jia and
                  Shruti Tople and
                  Tarik Moataz and
                  Deli Gong and
                  Prateek Saxena and
                  Zhenkai Liang},
  title        = {Robust {P2P} Primitives Using {SGX} Enclaves},
  booktitle    = {40th {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} 2020, Singapore, November 29 - December 1, 2020},
  pages        = {1185--1186},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICDCS47774.2020.00134},
  doi          = {10.1109/ICDCS47774.2020.00134},
  timestamp    = {Tue, 02 Mar 2021 12:16:24 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/JiaTMGSL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/JiaTMGSL20,
  author       = {Yaoqi Jia and
                  Shruti Tople and
                  Tarik Moataz and
                  Deli Gong and
                  Prateek Saxena and
                  Zhenkai Liang},
  editor       = {Manuel Egele and
                  Leyla Bilge},
  title        = {Robust {P2P} Primitives Using {SGX} Enclaves},
  booktitle    = {23rd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020},
  pages        = {209--224},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/raid2020/presentation/jia},
  timestamp    = {Thu, 17 Jun 2021 16:04:48 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/JiaTMGSL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/YuNHS20,
  author       = {Haifeng Yu and
                  Ivica Nikolic and
                  Ruomu Hou and
                  Prateek Saxena},
  title        = {{OHIE:} Blockchain Scaling Made Simple},
  booktitle    = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco,
                  CA, USA, May 18-21, 2020},
  pages        = {90--105},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SP40000.2020.00008},
  doi          = {10.1109/SP40000.2020.00008},
  timestamp    = {Thu, 21 Sep 2023 15:57:24 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/YuNHS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tsd/SaxenaP20,
  author       = {Prateek Saxena and
                  Soma Paul},
  editor       = {Petr Sojka and
                  Ivan Kopecek and
                  Karel Pala and
                  Ales Hor{\'{a}}k},
  title        = {{EPIE} Dataset: {A} Corpus for Possible Idiomatic Expressions},
  booktitle    = {Text, Speech, and Dialogue - 23rd International Conference, {TSD}
                  2020, Brno, Czech Republic, September 8-11, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12284},
  pages        = {87--94},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-58323-1\_9},
  doi          = {10.1007/978-3-030-58323-1\_9},
  timestamp    = {Sat, 19 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tsd/SaxenaP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ShindeWYHRS20,
  author       = {Shweta Shinde and
                  Shengyi Wang and
                  Pinghai Yuan and
                  Aquinas Hobor and
                  Abhik Roychoudhury and
                  Prateek Saxena},
  editor       = {Srdjan Capkun and
                  Franziska Roesner},
  title        = {BesFS: {A} {POSIX} Filesystem for Enclaves with a Mechanized Safety
                  Proof},
  booktitle    = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14,
                  2020},
  pages        = {523--540},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/usenixsecurity20/presentation/shinde},
  timestamp    = {Fri, 29 Jan 2021 22:08:55 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ShindeWYHRS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2002-06864,
  author       = {Teodora Baluta and
                  Zheng Leong Chua and
                  Kuldeep S. Meel and
                  Prateek Saxena},
  title        = {Scalable Quantitative Verification For Deep Neural Networks},
  journal      = {CoRR},
  volume       = {abs/2002.06864},
  year         = {2020},
  url          = {https://arxiv.org/abs/2002.06864},
  eprinttype    = {arXiv},
  eprint       = {2002.06864},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2002-06864.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2004-13293,
  author       = {Ni Trieu and
                  Kareem Shehata and
                  Prateek Saxena and
                  Reza Shokri and
                  Dawn Song},
  title        = {Epione: Lightweight Contact Tracing with Strong Privacy},
  journal      = {CoRR},
  volume       = {abs/2004.13293},
  year         = {2020},
  url          = {https://arxiv.org/abs/2004.13293},
  eprinttype    = {arXiv},
  eprint       = {2004.13293},
  timestamp    = {Sat, 02 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2004-13293.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2006-09479,
  author       = {Prateek Saxena and
                  Soma Paul},
  title        = {{EPIE} Dataset: {A} Corpus For Possible Idiomatic Expressions},
  journal      = {CoRR},
  volume       = {abs/2006.09479},
  year         = {2020},
  url          = {https://arxiv.org/abs/2006.09479},
  eprinttype    = {arXiv},
  eprint       = {2006.09479},
  timestamp    = {Tue, 23 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-09479.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2008-04516,
  author       = {Shiqi Shen and
                  Aashish Kolluri and
                  Zhen Dong and
                  Prateek Saxena and
                  Abhik Roychoudhury},
  title        = {Localizing Patch Points From One Exploit},
  journal      = {CoRR},
  volume       = {abs/2008.04516},
  year         = {2020},
  url          = {https://arxiv.org/abs/2008.04516},
  eprinttype    = {arXiv},
  eprint       = {2008.04516},
  timestamp    = {Fri, 14 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2008-04516.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2009-01144,
  author       = {Shweta Shinde and
                  Jinhua Cui and
                  Satyaki Sen and
                  Pinghai Yuan and
                  Prateek Saxena},
  title        = {Binary Compatibility For {SGX} Enclaves},
  journal      = {CoRR},
  volume       = {abs/2009.01144},
  year         = {2020},
  url          = {https://arxiv.org/abs/2009.01144},
  eprinttype    = {arXiv},
  eprint       = {2009.01144},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2009-01144.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2010-08440,
  author       = {Zhijingcheng Yu and
                  Shweta Shinde and
                  Trevor E. Carlson and
                  Prateek Saxena},
  title        = {Elasticlave: An Efficient Memory Model for Enclaves},
  journal      = {CoRR},
  volume       = {abs/2010.08440},
  year         = {2020},
  url          = {https://arxiv.org/abs/2010.08440},
  eprinttype    = {arXiv},
  eprint       = {2010.08440},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-08440.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BalutaSSMS19,
  author       = {Teodora Baluta and
                  Shiqi Shen and
                  Shweta Shinde and
                  Kuldeep S. Meel and
                  Prateek Saxena},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {Quantitative Verification of Neural Networks and Its Security Applications},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {1249--1264},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3354245},
  doi          = {10.1145/3319535.3354245},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BalutaSSMS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/GongTSJSSK19,
  author       = {Deli Gong and
                  Muoi Tran and
                  Shweta Shinde and
                  Hao Jin and
                  Vyas Sekar and
                  Prateek Saxena and
                  Min Suk Kang},
  title        = {Practical Verifiable In-network Filtering for DDoS Defense},
  booktitle    = {39th {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} 2019, Dallas, TX, USA, July 7-10, 2019},
  pages        = {1161--1174},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICDCS.2019.00118},
  doi          = {10.1109/ICDCS.2019.00118},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdcs/GongTSJSSK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issta/KolluriNSHS19,
  author       = {Aashish Kolluri and
                  Ivica Nikolic and
                  Ilya Sergey and
                  Aquinas Hobor and
                  Prateek Saxena},
  editor       = {Dongmei Zhang and
                  Anders M{\o}ller},
  title        = {Exploiting the laws of order in smart contracts},
  booktitle    = {Proceedings of the 28th {ACM} {SIGSOFT} International Symposium on
                  Software Testing and Analysis, {ISSTA} 2019, Beijing, China, July
                  15-19, 2019},
  pages        = {363--373},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3293882.3330560},
  doi          = {10.1145/3293882.3330560},
  timestamp    = {Thu, 23 Jun 2022 07:46:09 +0200},
  biburl       = {https://dblp.org/rec/conf/issta/KolluriNSHS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ChuaWBSLS19,
  author       = {Zheng Leong Chua and
                  Yanhao Wang and
                  Teodora Baluta and
                  Prateek Saxena and
                  Zhenkai Liang and
                  Purui Su},
  title        = {One Engine To Serve 'em All: Inferring Taint Rules Without Architectural
                  Semantics},
  booktitle    = {26th Annual Network and Distributed System Security Symposium, {NDSS}
                  2019, San Diego, California, USA, February 24-27, 2019},
  publisher    = {The Internet Society},
  year         = {2019},
  url          = {https://www.ndss-symposium.org/ndss-paper/one-engine-to-serve-em-all-inferring-taint-rules-without-architectural-semantics/},
  timestamp    = {Mon, 01 Feb 2021 08:42:22 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/ChuaWBSLS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ShenSRRS19,
  author       = {Shiqi Shen and
                  Shweta Shinde and
                  Soundarya Ramesh and
                  Abhik Roychoudhury and
                  Prateek Saxena},
  title        = {Neuro-Symbolic Execution: Augmenting Symbolic Execution with Neural
                  Constraints},
  booktitle    = {26th Annual Network and Distributed System Security Symposium, {NDSS}
                  2019, San Diego, California, USA, February 24-27, 2019},
  publisher    = {The Internet Society},
  year         = {2019},
  url          = {https://www.ndss-symposium.org/ndss-paper/neuro-symbolic-execution-augmenting-symbolic-execution-with-neural-constraints/},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/ShenSRRS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/TopleJS19,
  author       = {Shruti Tople and
                  Yaoqi Jia and
                  Prateek Saxena},
  title        = {{PRO-ORAM:} Practical Read-Only Oblivious {RAM}},
  booktitle    = {22nd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September
                  23-25, 2019},
  pages        = {197--211},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/raid2019/presentation/tople},
  timestamp    = {Wed, 10 Feb 2021 22:02:04 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/TopleJS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1901-00955,
  author       = {Deli Gong and
                  Muoi Tran and
                  Shweta Shinde and
                  Hao Jin and
                  Vyas Sekar and
                  Prateek Saxena and
                  Min Suk Kang},
  title        = {Practical Verifiable In-network Filtering for DDoS defense},
  journal      = {CoRR},
  volume       = {abs/1901.00955},
  year         = {2019},
  url          = {http://arxiv.org/abs/1901.00955},
  eprinttype    = {arXiv},
  eprint       = {1901.00955},
  timestamp    = {Thu, 31 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1901-00955.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1906-10395,
  author       = {Teodora Baluta and
                  Shiqi Shen and
                  Shweta Shinde and
                  Kuldeep S. Meel and
                  Prateek Saxena},
  title        = {Quantitative Verification of Neural Networks And its Security Applications},
  journal      = {CoRR},
  volume       = {abs/1906.10395},
  year         = {2019},
  url          = {http://arxiv.org/abs/1906.10395},
  eprinttype    = {arXiv},
  eprint       = {1906.10395},
  timestamp    = {Thu, 27 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1906-10395.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ToplePKS18,
  author       = {Shruti Tople and
                  Soyeon Park and
                  Min Suk Kang and
                  Prateek Saxena},
  editor       = {Bart Preneel and
                  Frederik Vercauteren},
  title        = {VeriCount: Verifiable Resource Accounting Using Hardware and Software
                  Isolation},
  booktitle    = {Applied Cryptography and Network Security - 16th International Conference,
                  {ACNS} 2018, Leuven, Belgium, July 2-4, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10892},
  pages        = {657--677},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93387-0\_34},
  doi          = {10.1007/978-3-319-93387-0\_34},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/ToplePKS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/NikolicKSSH18,
  author       = {Ivica Nikolic and
                  Aashish Kolluri and
                  Ilya Sergey and
                  Prateek Saxena and
                  Aquinas Hobor},
  title        = {Finding The Greedy, Prodigal, and Suicidal Contracts at Scale},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {653--663},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274743},
  doi          = {10.1145/3274694.3274743},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/NikolicKSSH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/TranLKBS18,
  author       = {Muoi Tran and
                  Loi Luu and
                  Min Suk Kang and
                  Iddo Bentov and
                  Prateek Saxena},
  title        = {Obscuro: {A} Bitcoin Mixer using Trusted Execution Environments},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {692--701},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274750},
  doi          = {10.1145/3274694.3274750},
  timestamp    = {Wed, 05 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/TranLKBS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/DasKSY18,
  author       = {Sourav Das and
                  Aashish Kolluri and
                  Prateek Saxena and
                  Haifeng Yu},
  editor       = {Vinod Ganapathy and
                  Trent Jaeger and
                  R. K. Shyamasundar},
  title        = {(Invited Paper) on the Security of Blockchain Consensus Protocols},
  booktitle    = {Information Systems Security - 14th International Conference, {ICISS}
                  2018, Bangalore, India, December 17-19, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11281},
  pages        = {465--480},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-05171-6\_24},
  doi          = {10.1007/978-3-030-05171-6\_24},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/DasKSY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/HouJLSY18,
  author       = {Ruomu Hou and
                  Irvan Jahja and
                  Loi Luu and
                  Prateek Saxena and
                  Haifeng Yu},
  title        = {Randomized View Reconciliation in Permissionless Distributed Systems},
  booktitle    = {2018 {IEEE} Conference on Computer Communications, {INFOCOM} 2018,
                  Honolulu, HI, USA, April 16-19, 2018},
  pages        = {2528--2536},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/INFOCOM.2018.8486394},
  doi          = {10.1109/INFOCOM.2018.8486394},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/HouJLSY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1802-06038,
  author       = {Ivica Nikolic and
                  Aashish Kolluri and
                  Ilya Sergey and
                  Prateek Saxena and
                  Aquinas Hobor},
  title        = {Finding The Greedy, Prodigal, and Suicidal Contracts at Scale},
  journal      = {CoRR},
  volume       = {abs/1802.06038},
  year         = {2018},
  url          = {http://arxiv.org/abs/1802.06038},
  eprinttype    = {arXiv},
  eprint       = {1802.06038},
  timestamp    = {Tue, 17 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1802-06038.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1807-00477,
  author       = {Shweta Shinde and
                  Shengyi Wang and
                  Pinghai Yuan and
                  Aquinas Hobor and
                  Abhik Roychoudhury and
                  Prateek Saxena},
  title        = {BesFS: Mechanized Proof of an Iago-Safe Filesystem for Enclaves},
  journal      = {CoRR},
  volume       = {abs/1807.00477},
  year         = {2018},
  url          = {http://arxiv.org/abs/1807.00477},
  eprinttype    = {arXiv},
  eprint       = {1807.00477},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1807-00477.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1807-00575,
  author       = {Shiqi Shen and
                  Soundarya Ramesh and
                  Shweta Shinde and
                  Abhik Roychoudhury and
                  Prateek Saxena},
  title        = {Neuro-Symbolic Execution: The Feasibility of an Inductive Approach
                  to Symbolic Execution},
  journal      = {CoRR},
  volume       = {abs/1807.00575},
  year         = {2018},
  url          = {http://arxiv.org/abs/1807.00575},
  eprinttype    = {arXiv},
  eprint       = {1807.00575},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1807-00575.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1810-11605,
  author       = {Aashish Kolluri and
                  Ivica Nikolic and
                  Ilya Sergey and
                  Aquinas Hobor and
                  Prateek Saxena},
  title        = {Exploiting The Laws of Order in Smart Contracts},
  journal      = {CoRR},
  volume       = {abs/1810.11605},
  year         = {2018},
  url          = {http://arxiv.org/abs/1810.11605},
  eprinttype    = {arXiv},
  eprint       = {1810.11605},
  timestamp    = {Wed, 31 Oct 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1810-11605.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1811-12628,
  author       = {Haifeng Yu and
                  Ivica Nikolic and
                  Ruomu Hou and
                  Prateek Saxena},
  title        = {{OHIE:} Blockchain Scaling Made Simple},
  journal      = {CoRR},
  volume       = {abs/1811.12628},
  year         = {2018},
  url          = {http://arxiv.org/abs/1811.12628},
  eprinttype    = {arXiv},
  eprint       = {1811.12628},
  timestamp    = {Mon, 03 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1811-12628.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TopleJS18,
  author       = {Shruti Tople and
                  Yaoqi Jia and
                  Prateek Saxena},
  title        = {{PRO-ORAM:} Constant Latency Read-Only Oblivious {RAM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {220},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/220},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TopleJS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/TopleS17,
  author       = {Shruti Tople and
                  Prateek Saxena},
  editor       = {Michalis Polychronakis and
                  Michael Meier},
  title        = {On the Trade-Offs in Oblivious Execution Techniques},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 14th International Conference, {DIMVA} 2017, Bonn, Germany, July
                  6-7, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10327},
  pages        = {25--47},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60876-1\_2},
  doi          = {10.1007/978-3-319-60876-1\_2},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/TopleS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/KumarFTS17,
  author       = {Amrit Kumar and
                  Cl{\'{e}}ment Fischer and
                  Shruti Tople and
                  Prateek Saxena},
  editor       = {Simon N. Foley and
                  Dieter Gollmann and
                  Einar Snekkenes},
  title        = {A Traceability Analysis of Monero's Blockchain},
  booktitle    = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research
                  in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10493},
  pages        = {153--173},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66399-9\_9},
  doi          = {10.1007/978-3-319-66399-9\_9},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/KumarFTS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ShindeTTS17,
  author       = {Shweta Shinde and
                  Dat Le Tien and
                  Shruti Tople and
                  Prateek Saxena},
  title        = {Panoply: Low-TCB Linux Applications With {SGX} Enclaves},
  booktitle    = {24th Annual Network and Distributed System Security Symposium, {NDSS}
                  2017, San Diego, California, USA, February 26 - March 1, 2017},
  publisher    = {The Internet Society},
  year         = {2017},
  url          = {https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/panoply-low-tcb-linux-applications-sgx-enclaves/},
  timestamp    = {Mon, 01 Feb 2021 08:42:15 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/ShindeTTS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ChuaSSL17,
  author       = {Zheng Leong Chua and
                  Shiqi Shen and
                  Prateek Saxena and
                  Zhenkai Liang},
  editor       = {Engin Kirda and
                  Thomas Ristenpart},
  title        = {Neural Nets Can Learn Function Type Signatures From Binaries},
  booktitle    = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver,
                  BC, Canada, August 16-18, 2017},
  pages        = {99--116},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/chua},
  timestamp    = {Mon, 01 Feb 2021 08:42:59 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ChuaSSL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LuuVTS17,
  author       = {Loi Luu and
                  Yaron Velner and
                  Jason Teutsch and
                  Prateek Saxena},
  editor       = {Engin Kirda and
                  Thomas Ristenpart},
  title        = {SmartPool: Practical Decentralized Pooled Mining},
  booktitle    = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver,
                  BC, Canada, August 16-18, 2017},
  pages        = {1409--1426},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/luu},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/LuuVTS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuuVTS17,
  author       = {Loi Luu and
                  Yaron Velner and
                  Jason Teutsch and
                  Prateek Saxena},
  title        = {{SMART} {POOL} : Practical Decentralized Pooled Mining},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {19},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/019},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuuVTS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JiaTMGSL17,
  author       = {Yaoqi Jia and
                  Shruti Tople and
                  Tarik Moataz and
                  Deli Gong and
                  Prateek Saxena and
                  Zhenkai Liang},
  title        = {Robust Synchronous {P2P} Primitives Using {SGX} Enclaves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {180},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/180},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JiaTMGSL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KumarFTS17,
  author       = {Amrit Kumar and
                  Cl{\'{e}}ment Fischer and
                  Shruti Tople and
                  Prateek Saxena},
  title        = {A Traceability Analysis of Monero's Blockchain},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {338},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/338},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KumarFTS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TopleDSC17,
  author       = {Shruti Tople and
                  Hung Dang and
                  Prateek Saxena and
                  Ee{-}Chien Chang},
  title        = {PermuteRam: Optimizing Oblivious Computation for Efficiency},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {885},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/885},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TopleDSC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TranLKBS17,
  author       = {Muoi Tran and
                  Loi Luu and
                  Min Suk Kang and
                  Iddo Bentov and
                  Prateek Saxena},
  title        = {Obscuro: {A} Bitcoin Mixer using Trusted Execution Environments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {974},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/974},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TranLKBS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/JiaBSL16,
  author       = {Yaoqi Jia and
                  Guangdong Bai and
                  Prateek Saxena and
                  Zhenkai Liang},
  title        = {Anonymity in Peer-assisted CDNs: Inference Attacks and Mitigation},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2016},
  number       = {4},
  pages        = {294--314},
  year         = {2016},
  url          = {https://doi.org/10.1515/popets-2016-0041},
  doi          = {10.1515/POPETS-2016-0041},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/JiaBSL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ShenTS16,
  author       = {Shiqi Shen and
                  Shruti Tople and
                  Prateek Saxena},
  editor       = {Stephen Schwab and
                  William K. Robertson and
                  Davide Balzarotti},
  title        = {Auror: defending against poisoning attacks in collaborative deep learning
                  systems},
  booktitle    = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
                  {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages        = {508--519},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2991125},
  timestamp    = {Tue, 06 Nov 2018 16:59:24 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ShenTS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LuuNZBGS16,
  author       = {Loi Luu and
                  Viswesh Narayanan and
                  Chaodong Zheng and
                  Kunal Baweja and
                  Seth Gilbert and
                  Prateek Saxena},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {A Secure Sharding Protocol For Open Blockchains},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {17--30},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2978389},
  doi          = {10.1145/2976749.2978389},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LuuNZBGS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LuuCOSH16,
  author       = {Loi Luu and
                  Duc{-}Hiep Chu and
                  Hrishi Olickel and
                  Prateek Saxena and
                  Aquinas Hobor},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {Making Smart Contracts Smarter},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {254--269},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2978309},
  doi          = {10.1145/2976749.2978309},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LuuCOSH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ShindeCNS16,
  author       = {Shweta Shinde and
                  Zheng Leong Chua and
                  Viswesh Narayanan and
                  Prateek Saxena},
  editor       = {Xiaofeng Chen and
                  XiaoFeng Wang and
                  Xinyi Huang},
  title        = {Preventing Page Faults from Telling Your Secrets},
  booktitle    = {Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016},
  pages        = {317--328},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2897845.2897885},
  doi          = {10.1145/2897845.2897885},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ShindeCNS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JiaCHCSL16,
  author       = {Yaoqi Jia and
                  Zheng Leong Chua and
                  Hong Hu and
                  Shuo Chen and
                  Prateek Saxena and
                  Zhenkai Liang},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {"The Web/Local" Boundary Is Fuzzy: {A} Security Study of
                  Chrome's Process-based Sandboxing},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {791--804},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2978414},
  doi          = {10.1145/2976749.2978414},
  timestamp    = {Wed, 01 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/JiaCHCSL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/CromanDEGJKMSSS16,
  author       = {Kyle Croman and
                  Christian Decker and
                  Ittay Eyal and
                  Adem Efe Gencer and
                  Ari Juels and
                  Ahmed E. Kosba and
                  Andrew Miller and
                  Prateek Saxena and
                  Elaine Shi and
                  Emin G{\"{u}}n Sirer and
                  Dawn Song and
                  Roger Wattenhofer},
  editor       = {Jeremy Clark and
                  Sarah Meiklejohn and
                  Peter Y. A. Ryan and
                  Dan S. Wallach and
                  Michael Brenner and
                  Kurt Rohloff},
  title        = {On Scaling Decentralized Blockchains - {(A} Position Paper)},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2016 International
                  Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February
                  26, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9604},
  pages        = {106--125},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53357-4\_8},
  doi          = {10.1007/978-3-662-53357-4\_8},
  timestamp    = {Wed, 12 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/CromanDEGJKMSSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/TeutschJS16,
  author       = {Jason Teutsch and
                  Sanjay Jain and
                  Prateek Saxena},
  editor       = {Jens Grossklags and
                  Bart Preneel},
  title        = {When Cryptocurrencies Mine Their Own Business},
  booktitle    = {Financial Cryptography and Data Security - 20th International Conference,
                  {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9603},
  pages        = {499--514},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-54970-4\_29},
  doi          = {10.1007/978-3-662-54970-4\_29},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/TeutschJS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/HuSACSL16,
  author       = {Hong Hu and
                  Shweta Shinde and
                  Sendroiu Adrian and
                  Zheng Leong Chua and
                  Prateek Saxena and
                  Zhenkai Liang},
  title        = {Data-Oriented Programming: On the Expressiveness of Non-control Data
                  Attacks},
  booktitle    = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA,
                  USA, May 22-26, 2016},
  pages        = {969--986},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SP.2016.62},
  doi          = {10.1109/SP.2016.62},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/HuSACSL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/JiaMTS16,
  author       = {Yaoqi Jia and
                  Tarik Moataz and
                  Shruti Tople and
                  Prateek Saxena},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {OblivP2P: An Oblivious Peer-to-Peer Content Sharing System},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {945--962},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/jia},
  timestamp    = {Mon, 01 Feb 2021 08:43:18 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/JiaMTS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/JainSST16,
  author       = {Sanjay Jain and
                  Prateek Saxena and
                  Frank Stephan and
                  Jason Teutsch},
  title        = {How to verify computation with a rational network},
  journal      = {CoRR},
  volume       = {abs/1606.05917},
  year         = {2016},
  url          = {http://arxiv.org/abs/1606.05917},
  eprinttype    = {arXiv},
  eprint       = {1606.05917},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/JainSST16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuuCOSH16,
  author       = {Loi Luu and
                  Duc{-}Hiep Chu and
                  Hrishi Olickel and
                  Prateek Saxena and
                  Aquinas Hobor},
  title        = {Making Smart Contracts Smarter},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {633},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/633},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuuCOSH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JiaCDSML15,
  author       = {Yaoqi Jia and
                  Yue Chen and
                  Xinshu Dong and
                  Prateek Saxena and
                  Jian Mao and
                  Zhenkai Liang},
  title        = {Man-in-the-browser-cache: Persisting {HTTPS} attacks via browser cache
                  poisoning},
  journal      = {Comput. Secur.},
  volume       = {55},
  pages        = {62--80},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.cose.2015.07.004},
  doi          = {10.1016/J.COSE.2015.07.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/JiaCDSML15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/internet/JiaDLS15,
  author       = {Yaoqi Jia and
                  Xinshu Dong and
                  Zhenkai Liang and
                  Prateek Saxena},
  title        = {I Know Where You've Been: Geo-Inference Attacks via the Browser Cache},
  journal      = {{IEEE} Internet Comput.},
  volume       = {19},
  number       = {1},
  pages        = {44--53},
  year         = {2015},
  url          = {https://doi.org/10.1109/MIC.2014.103},
  doi          = {10.1109/MIC.2014.103},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/internet/JiaDLS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LuuTKS15,
  author       = {Loi Luu and
                  Jason Teutsch and
                  Raghav Kulkarni and
                  Prateek Saxena},
  editor       = {Indrajit Ray and
                  Ninghui Li and
                  Christopher Kruegel},
  title        = {Demystifying Incentives in the Consensus Computer},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages        = {706--719},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2810103.2813659},
  doi          = {10.1145/2810103.2813659},
  timestamp    = {Tue, 10 Nov 2020 19:58:09 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LuuTKS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SoniBS15,
  author       = {Pratik Soni and
                  Enrico Budianto and
                  Prateek Saxena},
  editor       = {Indrajit Ray and
                  Ninghui Li and
                  Christopher Kruegel},
  title        = {The {SICILIAN} Defense: Signature-based Whitelisting of Web JavaScript},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages        = {1542--1557},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2810103.2813710},
  doi          = {10.1145/2810103.2813710},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SoniBS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/LuuSPSH15,
  author       = {Loi Luu and
                  Ratul Saha and
                  Inian Parameshwaran and
                  Prateek Saxena and
                  Aquinas Hobor},
  editor       = {C{\'{e}}dric Fournet and
                  Michael W. Hicks and
                  Luca Vigan{\`{o}}},
  title        = {On Power Splitting Games in Distributed Computation: The Case of Bitcoin
                  Pooled Mining},
  booktitle    = {{IEEE} 28th Computer Security Foundations Symposium, {CSF} 2015, Verona,
                  Italy, 13-17 July, 2015},
  pages        = {397--411},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CSF.2015.34},
  doi          = {10.1109/CSF.2015.34},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/LuuSPSH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/HuCLS15,
  author       = {Hong Hu and
                  Zheng Leong Chua and
                  Zhenkai Liang and
                  Prateek Saxena},
  editor       = {G{\"{u}}nther Pernul and
                  Peter Y. A. Ryan and
                  Edgar R. Weippl},
  title        = {Identifying Arbitrary Memory Access Vulnerabilities in Privilege-Separated
                  Software},
  booktitle    = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research
                  in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9327},
  pages        = {312--331},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24177-7\_16},
  doi          = {10.1007/978-3-319-24177-7\_16},
  timestamp    = {Thu, 15 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/HuCLS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/HassanshahiJYSL15,
  author       = {Behnaz Hassanshahi and
                  Yaoqi Jia and
                  Roland H. C. Yap and
                  Prateek Saxena and
                  Zhenkai Liang},
  editor       = {G{\"{u}}nther Pernul and
                  Peter Y. A. Ryan and
                  Edgar R. Weippl},
  title        = {Web-to-Application Injection Attacks on Android: Characterization
                  and Detection},
  booktitle    = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research
                  in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9327},
  pages        = {577--598},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24177-7\_29},
  doi          = {10.1007/978-3-319-24177-7\_29},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/HassanshahiJYSL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/FazziniSO15,
  author       = {Mattia Fazzini and
                  Prateek Saxena and
                  Alessandro Orso},
  editor       = {Antonia Bertolino and
                  Gerardo Canfora and
                  Sebastian G. Elbaum},
  title        = {AutoCSP: Automatically Retrofitting {CSP} to Web Applications},
  booktitle    = {37th {IEEE/ACM} International Conference on Software Engineering,
                  {ICSE} 2015, Florence, Italy, May 16-24, 2015, Volume 1},
  pages        = {336--346},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICSE.2015.53},
  doi          = {10.1109/ICSE.2015.53},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/FazziniSO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigsoft/ParameshwaranBS15,
  author       = {Inian Parameshwaran and
                  Enrico Budianto and
                  Shweta Shinde and
                  Hung Dang and
                  Atul Sadhu and
                  Prateek Saxena},
  editor       = {Elisabetta Di Nitto and
                  Mark Harman and
                  Patrick Heymans},
  title        = {Auto-patching DOM-based {XSS} at scale},
  booktitle    = {Proceedings of the 2015 10th Joint Meeting on Foundations of Software
                  Engineering, {ESEC/FSE} 2015, Bergamo, Italy, August 30 - September
                  4, 2015},
  pages        = {272--283},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2786805.2786821},
  doi          = {10.1145/2786805.2786821},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigsoft/ParameshwaranBS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigsoft/ParameshwaranBS15a,
  author       = {Inian Parameshwaran and
                  Enrico Budianto and
                  Shweta Shinde and
                  Hung Dang and
                  Atul Sadhu and
                  Prateek Saxena},
  editor       = {Elisabetta Di Nitto and
                  Mark Harman and
                  Patrick Heymans},
  title        = {DexterJS: robust testing platform for DOM-based {XSS} vulnerabilities},
  booktitle    = {Proceedings of the 2015 10th Joint Meeting on Foundations of Software
                  Engineering, {ESEC/FSE} 2015, Bergamo, Italy, August 30 - September
                  4, 2015},
  pages        = {946--949},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2786805.2803191},
  doi          = {10.1145/2786805.2803191},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigsoft/ParameshwaranBS15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/HuCASL15,
  author       = {Hong Hu and
                  Zheng Leong Chua and
                  Sendroiu Adrian and
                  Prateek Saxena and
                  Zhenkai Liang},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {Automatic Generation of Data-Oriented Exploits},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {177--192},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/hu},
  timestamp    = {Mon, 01 Feb 2021 08:42:57 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/HuCASL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/DinhSCOZ15,
  author       = {Tien Tuan Anh Dinh and
                  Prateek Saxena and
                  Ee{-}Chien Chang and
                  Beng Chin Ooi and
                  Chunwang Zhang},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {{M2R:} Enabling Stronger Privacy in MapReduce Computation},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {447--462},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/dinh},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/DinhSCOZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ShindeCNS15,
  author       = {Shweta Shinde and
                  Zheng Leong Chua and
                  Viswesh Narayanan and
                  Prateek Saxena},
  title        = {Preventing Your Faults From Telling Your Secrets: Defenses Against
                  Pigeonhole Attacks},
  journal      = {CoRR},
  volume       = {abs/1506.04832},
  year         = {2015},
  url          = {http://arxiv.org/abs/1506.04832},
  eprinttype    = {arXiv},
  eprint       = {1506.04832},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ShindeCNS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuuSPSH15,
  author       = {Loi Luu and
                  Ratul Saha and
                  Inian Parameshwaran and
                  Prateek Saxena and
                  Aquinas Hobor},
  title        = {On Power Splitting Games in Distributed Computation: The Case of Bitcoin
                  Pooled Mining},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {155},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/155},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuuSPSH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuuTKS15,
  author       = {Loi Luu and
                  Jason Teutsch and
                  Raghav Kulkarni and
                  Prateek Saxena},
  title        = {Demystifying incentives in the consensus computer},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {702},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/702},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuuTKS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iceccs/LiHBJLS14,
  author       = {Xiaolei Li and
                  Hong Hu and
                  Guangdong Bai and
                  Yaoqi Jia and
                  Zhenkai Liang and
                  Prateek Saxena},
  title        = {DroidVault: {A} Trusted Data Vault for Android Devices},
  booktitle    = {2014 19th International Conference on Engineering of Complex Computer
                  Systems, Tianjin, China, August 4-7, 2014},
  pages        = {29--38},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICECCS.2014.13},
  doi          = {10.1109/ICECCS.2014.13},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iceccs/LiHBJLS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pldi/LuuSSD14,
  author       = {Loi Luu and
                  Shweta Shinde and
                  Prateek Saxena and
                  Brian Demsky},
  editor       = {Michael F. P. O'Boyle and
                  Keshav Pingali},
  title        = {A model counter for constraints over unbounded strings},
  booktitle    = {{ACM} {SIGPLAN} Conference on Programming Language Design and Implementation,
                  {PLDI} '14, Edinburgh, United Kingdom - June 09 - 11, 2014},
  pages        = {565--576},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2594291.2594331},
  doi          = {10.1145/2594291.2594331},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pldi/LuuSSD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BudiantoJDSL14,
  author       = {Enrico Budianto and
                  Yaoqi Jia and
                  Xinshu Dong and
                  Prateek Saxena and
                  Zhenkai Liang},
  editor       = {Angelos Stavrou and
                  Herbert Bos and
                  Georgios Portokalidis},
  title        = {You Can't Be Me: Enabling Trusted Paths and User Sub-origins in Web
                  Browsers},
  booktitle    = {Research in Attacks, Intrusions and Defenses - 17th International
                  Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8688},
  pages        = {150--171},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11379-1\_8},
  doi          = {10.1007/978-3-319-11379-1\_8},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/BudiantoJDSL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BlondUGCSK14,
  author       = {Stevens Le Blond and
                  Adina Uritesc and
                  C{\'{e}}dric Gilbert and
                  Zheng Leong Chua and
                  Prateek Saxena and
                  Engin Kirda},
  editor       = {Kevin Fu and
                  Jaeyeon Jung},
  title        = {A Look at Targeted Attacks Through the Lense of an {NGO}},
  booktitle    = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA,
                  USA, August 20-22, 2014},
  pages        = {543--558},
  publisher    = {{USENIX} Association},
  year         = {2014},
  url          = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/le-blond},
  timestamp    = {Mon, 01 Feb 2021 08:43:04 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/BlondUGCSK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LimTSC14,
  author       = {Hoon Wei Lim and
                  Shruti Tople and
                  Prateek Saxena and
                  Ee{-}Chien Chang},
  title        = {Faster Secure Arithmetic Computation Using Switchable Homomorphic
                  Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {539},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/539},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LimTSC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NarayanS13,
  author       = {Akshay Narayan and
                  Prateek Saxena},
  editor       = {William Enck and
                  Adrienne Porter Felt and
                  N. Asokan},
  title        = {The curse of 140 characters: evaluating the efficacy of {SMS} spam
                  detection on android},
  booktitle    = {SPSM'13, Proceedings of the 2013 {ACM} Workshop on Security and Privacy
                  in Smartphones and Mobile Devices, Co-located with {CCS} 2013, November
                  8, 2013, Berlin, Germany},
  pages        = {33--42},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2516760.2516772},
  doi          = {10.1145/2516760.2516772},
  timestamp    = {Mon, 23 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/NarayanS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/TopleSCS13,
  author       = {Shruti Tople and
                  Shweta Shinde and
                  Zhaofeng Chen and
                  Prateek Saxena},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {{AUTOCRYPT:} enabling homomorphic computation on servers to protect
                  sensitive web content},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {1297--1310},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2516666},
  doi          = {10.1145/2508859.2516666},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/TopleSCS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DongCSTSL13,
  author       = {Xinshu Dong and
                  Zhaofeng Chen and
                  Hossein Siadati and
                  Shruti Tople and
                  Prateek Saxena and
                  Zhenkai Liang},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {Protecting sensitive web content from client-side vulnerabilities
                  with {CRYPTONS}},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {1311--1324},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2516743},
  doi          = {10.1145/2508859.2516743},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DongCSTSL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChenDSL13,
  author       = {Zhaofeng Chen and
                  Xinshu Dong and
                  Prateek Saxena and
                  Zhenkai Liang},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {{CRYPTSERVER:} strong data protection in commodity {LAMP} servers},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {1457--1460},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2512525},
  doi          = {10.1145/2508859.2512525},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ChenDSL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/DongHSL13,
  author       = {Xinshu Dong and
                  Hong Hu and
                  Prateek Saxena and
                  Zhenkai Liang},
  editor       = {Jason Crampton and
                  Sushil Jajodia and
                  Keith Mayes},
  title        = {A Quantitative Evaluation of Privilege Separation in Web Browser Designs},
  booktitle    = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research
                  in Computer Security, Egham, UK, September 9-13, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8134},
  pages        = {75--93},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40203-6\_5},
  doi          = {10.1007/978-3-642-40203-6\_5},
  timestamp    = {Thu, 15 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/DongHSL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AkhaweLHSS13,
  author       = {Devdatta Akhawe and
                  Frank Li and
                  Warren He and
                  Prateek Saxena and
                  Dawn Song},
  editor       = {Jason Crampton and
                  Sushil Jajodia and
                  Keith Mayes},
  title        = {Data-Confined {HTML5} Applications},
  booktitle    = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research
                  in Computer Security, Egham, UK, September 9-13, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8134},
  pages        = {736--754},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40203-6\_41},
  doi          = {10.1007/978-3-642-40203-6\_41},
  timestamp    = {Tue, 21 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/AkhaweLHSS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/BaiLMVS00D13,
  author       = {Guangdong Bai and
                  Jike Lei and
                  Guozhu Meng and
                  Sai Sathyanarayan Venkatraman and
                  Prateek Saxena and
                  Jun Sun and
                  Yang Liu and
                  Jin Song Dong},
  title        = {{AUTHSCAN:} Automatic Extraction of Web Authentication Protocols from
                  Implementations},
  booktitle    = {20th Annual Network and Distributed System Security Symposium, {NDSS}
                  2013, San Diego, California, USA, February 24-27, 2013},
  publisher    = {The Internet Society},
  year         = {2013},
  url          = {https://www.ndss-symposium.org/ndss2013/authscan-automatic-extraction-web-authentication-protocols-implementations},
  timestamp    = {Mon, 01 Feb 2021 08:42:13 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/BaiLMVS00D13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/peccs/SaxenaKSNP13,
  author       = {Prateek Saxena and
                  Vinay B. Y. Kumar and
                  Dilawar Singh and
                  H. Narayanan and
                  Sachin B. Patkar},
  editor       = {C{\'{e}}sar Benavente{-}Peces and
                  Joaquim Filipe},
  title        = {Hardware-software Scalable Architectures for Gaussian Elimination
                  over {GF(2)} and Higher Galois Fields},
  booktitle    = {{PECCS} 2013 - Proceedings of the 3rd International Conference on
                  Pervasive Embedded Computing and Communication Systems, Barcelona,
                  Spain, 19-21 February, 2013},
  pages        = {195--201},
  publisher    = {SciTePress},
  year         = {2013},
  timestamp    = {Sun, 14 Jul 2013 12:16:13 +0200},
  biburl       = {https://dblp.org/rec/conf/peccs/SaxenaKSNP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wocn/GaelCSG13,
  author       = {Pankai Gael and
                  Mahesh Chandra and
                  Prateek Saxena and
                  Vijay Kumar Gupta},
  title        = {Comparative analysis of speech enhancement methods},
  booktitle    = {Tenth International Conference on Wireless and Optical Communications
                  Networks, {WOCN} 2013, Bhopal, India, July 26-28, 2013},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WOCN.2013.6616238},
  doi          = {10.1109/WOCN.2013.6616238},
  timestamp    = {Tue, 27 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wocn/GaelCSG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/basesearch/Saxena12,
  author       = {Prateek Saxena},
  title        = {Systematic Techniques for Finding and Preventing Script Injection
                  Vulnerabilities},
  school       = {University of California, Berkeley, {USA}},
  year         = {2012},
  url          = {http://www.escholarship.org/uc/item/89m7p9xw},
  timestamp    = {Mon, 24 Apr 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/basesearch/Saxena12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AkhaweSS12,
  author       = {Devdatta Akhawe and
                  Prateek Saxena and
                  Dawn Song},
  editor       = {Tadayoshi Kohno},
  title        = {Privilege Separation in {HTML5} Applications},
  booktitle    = {Proceedings of the 21th {USENIX} Security Symposium, Bellevue, WA,
                  USA, August 8-10, 2012},
  pages        = {429--444},
  publisher    = {{USENIX} Association},
  year         = {2012},
  url          = {https://www.usenix.org/conference/usenixsecurity12/technical-sessions/presentation/akhawe},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/AkhaweSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SamuelSS11,
  author       = {Mike Samuel and
                  Prateek Saxena and
                  Dawn Song},
  editor       = {Yan Chen and
                  George Danezis and
                  Vitaly Shmatikov},
  title        = {Context-sensitive auto-sanitization in web templating languages using
                  type qualifiers},
  booktitle    = {Proceedings of the 18th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages        = {587--600},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046707.2046775},
  doi          = {10.1145/2046707.2046775},
  timestamp    = {Tue, 10 Nov 2020 19:56:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SamuelSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SaxenaML11,
  author       = {Prateek Saxena and
                  David Molnar and
                  Benjamin Livshits},
  editor       = {Yan Chen and
                  George Danezis and
                  Vitaly Shmatikov},
  title        = {{SCRIPTGARD:} automatic context-sensitive sanitization for large-scale
                  legacy web applications},
  booktitle    = {Proceedings of the 18th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages        = {601--614},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046707.2046776},
  doi          = {10.1145/2046707.2046776},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SaxenaML11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/WeinbergerSAFSS11,
  author       = {Joel Weinberger and
                  Prateek Saxena and
                  Devdatta Akhawe and
                  Matthew Finifter and
                  Eui Chul Richard Shin and
                  Dawn Song},
  editor       = {Vijay Atluri and
                  Claudia D{\'{\i}}az},
  title        = {A Systematic Analysis of {XSS} Sanitization in Web Application Frameworks},
  booktitle    = {Computer Security - {ESORICS} 2011 - 16th European Symposium on Research
                  in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6879},
  pages        = {150--171},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23822-2\_9},
  doi          = {10.1007/978-3-642-23822-2\_9},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/WeinbergerSAFSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/HooimeijerLMSV11,
  author       = {Pieter Hooimeijer and
                  Benjamin Livshits and
                  David Molnar and
                  Prateek Saxena and
                  Margus Veanes},
  title        = {Fast and Precise Sanitizer Analysis with {BEK}},
  booktitle    = {20th {USENIX} Security Symposium, San Francisco, CA, USA, August 8-12,
                  2011, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2011},
  url          = {http://static.usenix.org/events/sec11/tech/full\_papers/Hooimeijer.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/HooimeijerLMSV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/BarthFSB10,
  author       = {Adam Barth and
                  Adrienne Porter Felt and
                  Prateek Saxena and
                  Aaron Boodman},
  title        = {Protecting Browsers from Extension Vulnerabilities},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2010, San Diego, California, USA, 28th February - 3rd March
                  2010},
  publisher    = {The Internet Society},
  year         = {2010},
  url          = {https://www.ndss-symposium.org/ndss2010/protecting-browsers-extension-vulnerabilities},
  timestamp    = {Mon, 01 Feb 2021 08:42:17 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/BarthFSB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/SaxenaHPS10,
  author       = {Prateek Saxena and
                  Steve Hanna and
                  Pongsin Poosankam and
                  Dawn Song},
  title        = {{FLAX:} Systematic Discovery of Client-side Validation Vulnerabilities
                  in Rich Web Applications},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2010, San Diego, California, USA, 28th February - 3rd March
                  2010},
  publisher    = {The Internet Society},
  year         = {2010},
  url          = {https://www.ndss-symposium.org/ndss2010/flax-systematic-discovery-client-side-validation-vulnerabilities-rich-web-applications},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/SaxenaHPS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/SaxenaAHMMS10,
  author       = {Prateek Saxena and
                  Devdatta Akhawe and
                  Steve Hanna and
                  Feng Mao and
                  Stephen McCamant and
                  Dawn Song},
  title        = {A Symbolic Execution Framework for JavaScript},
  booktitle    = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May
                  2010, Berleley/Oakland, California, {USA}},
  pages        = {513--528},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SP.2010.38},
  doi          = {10.1109/SP.2010.38},
  timestamp    = {Thu, 21 Sep 2023 16:14:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/SaxenaAHMMS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issta/SaxenaPMS09,
  author       = {Prateek Saxena and
                  Pongsin Poosankam and
                  Stephen McCamant and
                  Dawn Song},
  editor       = {Gregg Rothermel and
                  Laura K. Dillon},
  title        = {Loop-extended symbolic execution on binary programs},
  booktitle    = {Proceedings of the Eighteenth International Symposium on Software
                  Testing and Analysis, {ISSTA} 2009, Chicago, IL, USA, July 19-23,
                  2009},
  pages        = {225--236},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1572272.1572299},
  doi          = {10.1145/1572272.1572299},
  timestamp    = {Tue, 06 Nov 2018 16:57:30 +0100},
  biburl       = {https://dblp.org/rec/conf/issta/SaxenaPMS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/NadjiSS09,
  author       = {Yacin Nadji and
                  Prateek Saxena and
                  Dawn Song},
  title        = {Document Structure Integrity: {A} Robust Basis for Cross-site Scripting
                  Defense},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2009, San Diego, California, USA, 8th February - 11th February
                  2009},
  publisher    = {The Internet Society},
  year         = {2009},
  url          = {https://www.ndss-symposium.org/ndss2009/document-structure-integrity-a-robust-basis-for-cross-site-scripting-defense/},
  timestamp    = {Mon, 01 Feb 2021 08:42:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/NadjiSS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cgo/SaxenaSP08,
  author       = {Prateek Saxena and
                  R. Sekar and
                  Varun Puranik},
  editor       = {Mary Lou Soffa and
                  Evelyn Duesterwald},
  title        = {Efficient fine-grained binary instrumentationwith applications to
                  taint-tracking},
  booktitle    = {Sixth International Symposium on Code Generation and Optimization
                  {(CGO} 2008), April 5-9, 2008, Boston, MA, {USA}},
  pages        = {74--83},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1356058.1356069},
  doi          = {10.1145/1356058.1356069},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cgo/SaxenaSP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/CavallaroSS08,
  author       = {Lorenzo Cavallaro and
                  Prateek Saxena and
                  R. Sekar},
  editor       = {Diego Zamboni},
  title        = {On the Limits of Information Flow Techniques for Malware Analysis
                  and Containment},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment,
                  5th International Conference, {DIMVA} 2008, Paris, France, July 10-11,
                  2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5137},
  pages        = {143--163},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70542-0\_8},
  doi          = {10.1007/978-3-540-70542-0\_8},
  timestamp    = {Mon, 30 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/CavallaroSS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/SongBYCJKLNPS08,
  author       = {Dawn Xiaodong Song and
                  David Brumley and
                  Heng Yin and
                  Juan Caballero and
                  Ivan Jager and
                  Min Gyung Kang and
                  Zhenkai Liang and
                  James Newsome and
                  Pongsin Poosankam and
                  Prateek Saxena},
  editor       = {R. Sekar and
                  Arun K. Pujari},
  title        = {BitBlaze: {A} New Approach to Computer Security via Binary Analysis},
  booktitle    = {Information Systems Security, 4th International Conference, {ICISS}
                  2008, Hyderabad, India, December 16-20, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5352},
  pages        = {1--25},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89862-7\_1},
  doi          = {10.1007/978-3-540-89862-7\_1},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iciss/SongBYCJKLNPS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}