default search action
BibTeX records: Prateek Saxena
@article{DBLP:journals/pacmpl/WangKNBS23, author = {Bo Wang and Aashish Kolluri and Ivica Nikolic and Teodora Baluta and Prateek Saxena}, title = {User-Customizable Transpilation of Scripting Languages}, journal = {Proc. {ACM} Program. Lang.}, volume = {7}, number = {{OOPSLA1}}, pages = {201--229}, year = {2023}, url = {https://doi.org/10.1145/3586034}, doi = {10.1145/3586034}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pacmpl/WangKNBS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BalutaNJAS23, author = {Teodora Baluta and Ivica Nikolic and Racchit Jain and Divesh Aggarwal and Prateek Saxena}, editor = {Weizhi Meng and Christian Damsgaard Jensen and Cas Cremers and Engin Kirda}, title = {Unforgeability in Stochastic Gradient Descent}, booktitle = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2023, Copenhagen, Denmark, November 26-30, 2023}, pages = {1138--1152}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576915.3623093}, doi = {10.1145/3576915.3623093}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BalutaNJAS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigsoft/WangLLS23, author = {Bo Wang and Ruishi Li and Mingkai Li and Prateek Saxena}, editor = {Satish Chandra and Kelly Blincoe and Paolo Tonella}, title = {TransMap: Pinpointing Mistakes in Neural Code Translation}, booktitle = {Proceedings of the 31st {ACM} Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, {ESEC/FSE} 2023, San Francisco, CA, USA, December 3-9, 2023}, pages = {999--1011}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3611643.3616322}, doi = {10.1145/3611643.3616322}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigsoft/WangLLS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/YuWBCS23, author = {Jason Zhijingcheng Yu and Conrad Watt and Aditya Badole and Trevor E. Carlson and Prateek Saxena}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {Capstone: {A} Capability-based Foundation for Trustless Secure Memory Access}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {787--804}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/yu-jason}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/YuWBCS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2301-11220, author = {Bo Wang and Aashish Kullori and Ivica Nikolic and Teodora Baluta and Prateek Saxena}, title = {User-customizable Transpilation of Scripting Languages}, journal = {CoRR}, volume = {abs/2301.11220}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2301.11220}, doi = {10.48550/ARXIV.2301.11220}, eprinttype = {arXiv}, eprint = {2301.11220}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2301-11220.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-13053, author = {Aashish Kolluri and Sarthak Choudhary and Bryan Hooi and Prateek Saxena}, title = {{RETEXO:} Scalable Neural Network Training over Distributed Graphs}, journal = {CoRR}, volume = {abs/2302.13053}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.13053}, doi = {10.48550/ARXIV.2302.13053}, eprinttype = {arXiv}, eprint = {2302.13053}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-13053.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-13863, author = {Jason Zhijingcheng Yu and Conrad Watt and Aditya Badole and Trevor E. Carlson and Prateek Saxena}, title = {Capstone: {A} Capability-based Foundation for Trustless Secure Memory Access (Extended Version)}, journal = {CoRR}, volume = {abs/2302.13863}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.13863}, doi = {10.48550/ARXIV.2302.13863}, eprinttype = {arXiv}, eprint = {2302.13863}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-13863.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-14461, author = {Sarthak Choudhary and Aashish Kolluri and Prateek Saxena}, title = {Attacking Byzantine Robust Aggregation in High Dimensions}, journal = {CoRR}, volume = {abs/2312.14461}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.14461}, doi = {10.48550/ARXIV.2312.14461}, eprinttype = {arXiv}, eprint = {2312.14461}, timestamp = {Thu, 18 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-14461.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/CuiSSSY22, author = {Jinhua Cui and Shweta Shinde and Satyaki Sen and Prateek Saxena and Pinghai Yuan}, title = {Dynamic Binary Translation for {SGX} Enclaves}, journal = {{ACM} Trans. Priv. Secur.}, volume = {25}, number = {4}, pages = {32:1--32:40}, year = {2022}, url = {https://doi.org/10.1145/3532862}, doi = {10.1145/3532862}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/CuiSSSY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BalutaSHTS22, author = {Teodora Baluta and Shiqi Shen and S. Hitarth and Shruti Tople and Prateek Saxena}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {Membership Inference Attacks and Generalization: {A} Causal Perspective}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {249--262}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3560694}, doi = {10.1145/3548606.3560694}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BalutaSHTS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KolluriBHS22, author = {Aashish Kolluri and Teodora Baluta and Bryan Hooi and Prateek Saxena}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {LPGNet: Link Private Graph Networks for Node Classification}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {1813--1827}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3560705}, doi = {10.1145/3548606.3560705}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/KolluriBHS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/HouYS22, author = {Ruomu Hou and Haifeng Yu and Prateek Saxena}, title = {Using Throughput-Centric Byzantine Broadcast to Tolerate Malicious Majority in Blockchains}, booktitle = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco, CA, USA, May 22-26, 2022}, pages = {1263--1280}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SP46214.2022.9833617}, doi = {10.1109/SP46214.2022.9833617}, timestamp = {Thu, 21 Sep 2023 15:57:27 +0200}, biburl = {https://dblp.org/rec/conf/sp/HouYS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/JiZJLCSR22, author = {Kaihang Ji and Jun Zeng and Yuancheng Jiang and Zhenkai Liang and Zheng Leong Chua and Prateek Saxena and Abhik Roychoudhury}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {FlowMatrix: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {2567--2584}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/ji}, timestamp = {Tue, 18 Oct 2022 17:10:36 +0200}, biburl = {https://dblp.org/rec/conf/uss/JiZJLCSR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/YuSCS22, author = {Jason Zhijingcheng Yu and Shweta Shinde and Trevor E. Carlson and Prateek Saxena}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {Elasticlave: An Efficient Memory Model for Enclaves}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {4111--4128}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/yu-jason}, timestamp = {Tue, 06 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/YuSCS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2205-03105, author = {Aashish Kolluri and Teodora Baluta and Bryan Hooi and Prateek Saxena}, title = {LPGNet: Link Private Graph Networks for Node Classification}, journal = {CoRR}, volume = {abs/2205.03105}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2205.03105}, doi = {10.48550/ARXIV.2205.03105}, eprinttype = {arXiv}, eprint = {2205.03105}, timestamp = {Wed, 11 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2205-03105.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2209-08615, author = {Teodora Baluta and Shiqi Shen and S. Hitarth and Shruti Tople and Prateek Saxena}, title = {Membership Inference Attacks and Generalization: {A} Causal Perspective}, journal = {CoRR}, volume = {abs/2209.08615}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2209.08615}, doi = {10.48550/ARXIV.2209.08615}, eprinttype = {arXiv}, eprint = {2209.08615}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2209-08615.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/ShenKDSR21, author = {Shiqi Shen and Aashish Kolluri and Zhen Dong and Prateek Saxena and Abhik Roychoudhury}, editor = {Jiannong Cao and Man Ho Au and Zhiqiang Lin and Moti Yung}, title = {Localizing Vulnerabilities Statistically From One Exploit}, booktitle = {{ASIA} {CCS} '21: {ACM} Asia Conference on Computer and Communications Security, Virtual Event, Hong Kong, June 7-11, 2021}, pages = {537--549}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3433210.3437528}, doi = {10.1145/3433210.3437528}, timestamp = {Wed, 09 Jun 2021 15:14:39 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/ShenKDSR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CuiYSSC21, author = {Jinhua Cui and Jason Zhijingcheng Yu and Shweta Shinde and Prateek Saxena and Zhiping Cai}, editor = {Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi}, title = {SmashEx: Smashing {SGX} Enclaves Using Exceptions}, booktitle = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021}, pages = {779--793}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460120.3484821}, doi = {10.1145/3460120.3484821}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/CuiYSSC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KolluriBS21, author = {Aashish Kolluri and Teodora Baluta and Prateek Saxena}, editor = {Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi}, title = {Private Hierarchical Clustering in Federated Networks}, booktitle = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021}, pages = {2342--2360}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460120.3484822}, doi = {10.1145/3460120.3484822}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/KolluriBS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/NikolicMSS21, author = {Ivica Nikolic and Radu Mantu and Shiqi Shen and Prateek Saxena}, editor = {Leyla Bilge and Lorenzo Cavallaro and Giancarlo Pellegrino and Nuno Neves}, title = {Refined Grey-Box Fuzzing with Sivo}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 18th International Conference, {DIMVA} 2021, Virtual Event, July 14-16, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12756}, pages = {106--129}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-80825-9\_6}, doi = {10.1007/978-3-030-80825-9\_6}, timestamp = {Tue, 13 Jul 2021 16:53:38 +0200}, biburl = {https://dblp.org/rec/conf/dimva/NikolicMSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/BalutaCMS21a, author = {Teodora Baluta and Zheng Leong Chua and Kuldeep S. Meel and Prateek Saxena}, title = {Scalable Quantitative Verification for Deep Neural Networks}, booktitle = {43rd {IEEE/ACM} International Conference on Software Engineering: Companion Proceedings, {ICSE} Companion 2021, Madrid, Spain, May 25-28, 2021}, pages = {248--249}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICSE-Companion52605.2021.00115}, doi = {10.1109/ICSE-COMPANION52605.2021.00115}, timestamp = {Mon, 28 Jun 2021 13:24:52 +0200}, biburl = {https://dblp.org/rec/conf/icse/BalutaCMS21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/BalutaCMS21, author = {Teodora Baluta and Zheng Leong Chua and Kuldeep S. Meel and Prateek Saxena}, title = {Scalable Quantitative Verification For Deep Neural Networks}, booktitle = {43rd {IEEE/ACM} International Conference on Software Engineering, {ICSE} 2021, Madrid, Spain, 22-30 May 2021}, pages = {312--323}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICSE43902.2021.00039}, doi = {10.1109/ICSE43902.2021.00039}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse/BalutaCMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigsoft/WangBKS21, author = {Bo Wang and Teodora Baluta and Aashish Kolluri and Prateek Saxena}, editor = {Diomidis Spinellis and Georgios Gousios and Marsha Chechik and Massimiliano Di Penta}, title = {SynGuar: guaranteeing generalization in programming by example}, booktitle = {{ESEC/FSE} '21: 29th {ACM} Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, Athens, Greece, August 23-28, 2021}, pages = {677--689}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3468264.3468621}, doi = {10.1145/3468264.3468621}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigsoft/WangBKS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tsd/SaxenaP21, author = {Prateek Saxena and Soma Paul}, editor = {Kamil Ekstein and Frantisek P{\'{a}}rtl and Miloslav Konop{\'{\i}}k}, title = {Labelled {EPIE:} {A} Dataset for Idiom Sense Disambiguation}, booktitle = {Text, Speech, and Dialogue - 24th International Conference, {TSD} 2021, Olomouc, Czech Republic, September 6-9, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12848}, pages = {210--221}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-83527-9\_18}, doi = {10.1007/978-3-030-83527-9\_18}, timestamp = {Mon, 19 Sep 2022 18:41:41 +0200}, biburl = {https://dblp.org/rec/conf/tsd/SaxenaP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2102-02394, author = {Ivica Nikolic and Radu Mantu and Shiqi Shen and Prateek Saxena}, title = {Refined Grey-Box Fuzzing with {SIVO}}, journal = {CoRR}, volume = {abs/2102.02394}, year = {2021}, url = {https://arxiv.org/abs/2102.02394}, eprinttype = {arXiv}, eprint = {2102.02394}, timestamp = {Tue, 09 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2102-02394.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-15289, author = {Jinhua Cui and Shweta Shinde and Satyaki Sen and Prateek Saxena and Pinghai Yuan}, title = {Dynamic Binary Translation for {SGX} Enclaves}, journal = {CoRR}, volume = {abs/2103.15289}, year = {2021}, url = {https://arxiv.org/abs/2103.15289}, eprinttype = {arXiv}, eprint = {2103.15289}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-15289.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-09057, author = {Aashish Kolluri and Teodora Baluta and Prateek Saxena}, title = {Private Hierarchical Clustering in Federated Networks}, journal = {CoRR}, volume = {abs/2105.09057}, year = {2021}, url = {https://arxiv.org/abs/2105.09057}, eprinttype = {arXiv}, eprint = {2105.09057}, timestamp = {Mon, 31 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-09057.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2106-11610, author = {Bo Wang and Teodora Baluta and Aashish Kolluri and Prateek Saxena}, title = {SynGuar: Guaranteeing Generalization in Programming by Example}, journal = {CoRR}, volume = {abs/2106.11610}, year = {2021}, url = {https://arxiv.org/abs/2106.11610}, eprinttype = {arXiv}, eprint = {2106.11610}, timestamp = {Wed, 30 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2106-11610.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2108-01341, author = {Ruomu Hou and Haifeng Yu and Prateek Saxena}, title = {Using Throughput-Centric Byzantine Broadcast to Tolerate Malicious Majority in Blockchains}, journal = {CoRR}, volume = {abs/2108.01341}, year = {2021}, url = {https://arxiv.org/abs/2108.01341}, eprinttype = {arXiv}, eprint = {2108.01341}, timestamp = {Thu, 05 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2108-01341.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2110-06657, author = {Jinhua Cui and Jason Zhijingcheng Yu and Shweta Shinde and Prateek Saxena and Zhiping Cai}, title = {SmashEx: Smashing {SGX} Enclaves Using Exceptions}, journal = {CoRR}, volume = {abs/2110.06657}, year = {2021}, url = {https://arxiv.org/abs/2110.06657}, eprinttype = {arXiv}, eprint = {2110.06657}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2110-06657.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/debu/TrieuSSSS20, author = {Ni Trieu and Kareem Shehata and Prateek Saxena and Reza Shokri and Dawn Song}, title = {Epione: Lightweight Contact Tracing with Strong Privacy}, journal = {{IEEE} Data Eng. Bull.}, volume = {43}, number = {2}, pages = {95--107}, year = {2020}, url = {http://sites.computer.org/debull/A20june/p95.pdf}, timestamp = {Tue, 21 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/debu/TrieuSSSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/HouJLSY20, author = {Ruomu Hou and Irvan Jahja and Loi Luu and Prateek Saxena and Haifeng Yu}, title = {Randomized View Reconciliation in Permissionless Distributed Systems}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {28}, number = {5}, pages = {1925--1938}, year = {2020}, url = {https://doi.org/10.1109/TNET.2020.3004834}, doi = {10.1109/TNET.2020.3004834}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/HouJLSY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/JiaTMGSL20, author = {Yaoqi Jia and Shruti Tople and Tarik Moataz and Deli Gong and Prateek Saxena and Zhenkai Liang}, title = {Robust {P2P} Primitives Using {SGX} Enclaves}, booktitle = {40th {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2020, Singapore, November 29 - December 1, 2020}, pages = {1185--1186}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICDCS47774.2020.00134}, doi = {10.1109/ICDCS47774.2020.00134}, timestamp = {Tue, 02 Mar 2021 12:16:24 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/JiaTMGSL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/JiaTMGSL20, author = {Yaoqi Jia and Shruti Tople and Tarik Moataz and Deli Gong and Prateek Saxena and Zhenkai Liang}, editor = {Manuel Egele and Leyla Bilge}, title = {Robust {P2P} Primitives Using {SGX} Enclaves}, booktitle = {23rd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020}, pages = {209--224}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/raid2020/presentation/jia}, timestamp = {Thu, 17 Jun 2021 16:04:48 +0200}, biburl = {https://dblp.org/rec/conf/raid/JiaTMGSL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/YuNHS20, author = {Haifeng Yu and Ivica Nikolic and Ruomu Hou and Prateek Saxena}, title = {{OHIE:} Blockchain Scaling Made Simple}, booktitle = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco, CA, USA, May 18-21, 2020}, pages = {90--105}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SP40000.2020.00008}, doi = {10.1109/SP40000.2020.00008}, timestamp = {Thu, 21 Sep 2023 15:57:24 +0200}, biburl = {https://dblp.org/rec/conf/sp/YuNHS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tsd/SaxenaP20, author = {Prateek Saxena and Soma Paul}, editor = {Petr Sojka and Ivan Kopecek and Karel Pala and Ales Hor{\'{a}}k}, title = {{EPIE} Dataset: {A} Corpus for Possible Idiomatic Expressions}, booktitle = {Text, Speech, and Dialogue - 23rd International Conference, {TSD} 2020, Brno, Czech Republic, September 8-11, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12284}, pages = {87--94}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-58323-1\_9}, doi = {10.1007/978-3-030-58323-1\_9}, timestamp = {Sat, 19 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tsd/SaxenaP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ShindeWYHRS20, author = {Shweta Shinde and Shengyi Wang and Pinghai Yuan and Aquinas Hobor and Abhik Roychoudhury and Prateek Saxena}, editor = {Srdjan Capkun and Franziska Roesner}, title = {BesFS: {A} {POSIX} Filesystem for Enclaves with a Mechanized Safety Proof}, booktitle = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14, 2020}, pages = {523--540}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/usenixsecurity20/presentation/shinde}, timestamp = {Fri, 29 Jan 2021 22:08:55 +0100}, biburl = {https://dblp.org/rec/conf/uss/ShindeWYHRS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2002-06864, author = {Teodora Baluta and Zheng Leong Chua and Kuldeep S. Meel and Prateek Saxena}, title = {Scalable Quantitative Verification For Deep Neural Networks}, journal = {CoRR}, volume = {abs/2002.06864}, year = {2020}, url = {https://arxiv.org/abs/2002.06864}, eprinttype = {arXiv}, eprint = {2002.06864}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2002-06864.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2004-13293, author = {Ni Trieu and Kareem Shehata and Prateek Saxena and Reza Shokri and Dawn Song}, title = {Epione: Lightweight Contact Tracing with Strong Privacy}, journal = {CoRR}, volume = {abs/2004.13293}, year = {2020}, url = {https://arxiv.org/abs/2004.13293}, eprinttype = {arXiv}, eprint = {2004.13293}, timestamp = {Sat, 02 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2004-13293.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-09479, author = {Prateek Saxena and Soma Paul}, title = {{EPIE} Dataset: {A} Corpus For Possible Idiomatic Expressions}, journal = {CoRR}, volume = {abs/2006.09479}, year = {2020}, url = {https://arxiv.org/abs/2006.09479}, eprinttype = {arXiv}, eprint = {2006.09479}, timestamp = {Tue, 23 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-09479.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2008-04516, author = {Shiqi Shen and Aashish Kolluri and Zhen Dong and Prateek Saxena and Abhik Roychoudhury}, title = {Localizing Patch Points From One Exploit}, journal = {CoRR}, volume = {abs/2008.04516}, year = {2020}, url = {https://arxiv.org/abs/2008.04516}, eprinttype = {arXiv}, eprint = {2008.04516}, timestamp = {Fri, 14 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2008-04516.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2009-01144, author = {Shweta Shinde and Jinhua Cui and Satyaki Sen and Pinghai Yuan and Prateek Saxena}, title = {Binary Compatibility For {SGX} Enclaves}, journal = {CoRR}, volume = {abs/2009.01144}, year = {2020}, url = {https://arxiv.org/abs/2009.01144}, eprinttype = {arXiv}, eprint = {2009.01144}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2009-01144.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-08440, author = {Zhijingcheng Yu and Shweta Shinde and Trevor E. Carlson and Prateek Saxena}, title = {Elasticlave: An Efficient Memory Model for Enclaves}, journal = {CoRR}, volume = {abs/2010.08440}, year = {2020}, url = {https://arxiv.org/abs/2010.08440}, eprinttype = {arXiv}, eprint = {2010.08440}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-08440.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BalutaSSMS19, author = {Teodora Baluta and Shiqi Shen and Shweta Shinde and Kuldeep S. Meel and Prateek Saxena}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {Quantitative Verification of Neural Networks and Its Security Applications}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {1249--1264}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3354245}, doi = {10.1145/3319535.3354245}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BalutaSSMS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/GongTSJSSK19, author = {Deli Gong and Muoi Tran and Shweta Shinde and Hao Jin and Vyas Sekar and Prateek Saxena and Min Suk Kang}, title = {Practical Verifiable In-network Filtering for DDoS Defense}, booktitle = {39th {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2019, Dallas, TX, USA, July 7-10, 2019}, pages = {1161--1174}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICDCS.2019.00118}, doi = {10.1109/ICDCS.2019.00118}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdcs/GongTSJSSK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issta/KolluriNSHS19, author = {Aashish Kolluri and Ivica Nikolic and Ilya Sergey and Aquinas Hobor and Prateek Saxena}, editor = {Dongmei Zhang and Anders M{\o}ller}, title = {Exploiting the laws of order in smart contracts}, booktitle = {Proceedings of the 28th {ACM} {SIGSOFT} International Symposium on Software Testing and Analysis, {ISSTA} 2019, Beijing, China, July 15-19, 2019}, pages = {363--373}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3293882.3330560}, doi = {10.1145/3293882.3330560}, timestamp = {Thu, 23 Jun 2022 07:46:09 +0200}, biburl = {https://dblp.org/rec/conf/issta/KolluriNSHS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/ChuaWBSLS19, author = {Zheng Leong Chua and Yanhao Wang and Teodora Baluta and Prateek Saxena and Zhenkai Liang and Purui Su}, title = {One Engine To Serve 'em All: Inferring Taint Rules Without Architectural Semantics}, booktitle = {26th Annual Network and Distributed System Security Symposium, {NDSS} 2019, San Diego, California, USA, February 24-27, 2019}, publisher = {The Internet Society}, year = {2019}, url = {https://www.ndss-symposium.org/ndss-paper/one-engine-to-serve-em-all-inferring-taint-rules-without-architectural-semantics/}, timestamp = {Mon, 01 Feb 2021 08:42:22 +0100}, biburl = {https://dblp.org/rec/conf/ndss/ChuaWBSLS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/ShenSRRS19, author = {Shiqi Shen and Shweta Shinde and Soundarya Ramesh and Abhik Roychoudhury and Prateek Saxena}, title = {Neuro-Symbolic Execution: Augmenting Symbolic Execution with Neural Constraints}, booktitle = {26th Annual Network and Distributed System Security Symposium, {NDSS} 2019, San Diego, California, USA, February 24-27, 2019}, publisher = {The Internet Society}, year = {2019}, url = {https://www.ndss-symposium.org/ndss-paper/neuro-symbolic-execution-augmenting-symbolic-execution-with-neural-constraints/}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/ShenSRRS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/TopleJS19, author = {Shruti Tople and Yaoqi Jia and Prateek Saxena}, title = {{PRO-ORAM:} Practical Read-Only Oblivious {RAM}}, booktitle = {22nd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September 23-25, 2019}, pages = {197--211}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/raid2019/presentation/tople}, timestamp = {Wed, 10 Feb 2021 22:02:04 +0100}, biburl = {https://dblp.org/rec/conf/raid/TopleJS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1901-00955, author = {Deli Gong and Muoi Tran and Shweta Shinde and Hao Jin and Vyas Sekar and Prateek Saxena and Min Suk Kang}, title = {Practical Verifiable In-network Filtering for DDoS defense}, journal = {CoRR}, volume = {abs/1901.00955}, year = {2019}, url = {http://arxiv.org/abs/1901.00955}, eprinttype = {arXiv}, eprint = {1901.00955}, timestamp = {Thu, 31 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1901-00955.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1906-10395, author = {Teodora Baluta and Shiqi Shen and Shweta Shinde and Kuldeep S. Meel and Prateek Saxena}, title = {Quantitative Verification of Neural Networks And its Security Applications}, journal = {CoRR}, volume = {abs/1906.10395}, year = {2019}, url = {http://arxiv.org/abs/1906.10395}, eprinttype = {arXiv}, eprint = {1906.10395}, timestamp = {Thu, 27 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1906-10395.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ToplePKS18, author = {Shruti Tople and Soyeon Park and Min Suk Kang and Prateek Saxena}, editor = {Bart Preneel and Frederik Vercauteren}, title = {VeriCount: Verifiable Resource Accounting Using Hardware and Software Isolation}, booktitle = {Applied Cryptography and Network Security - 16th International Conference, {ACNS} 2018, Leuven, Belgium, July 2-4, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10892}, pages = {657--677}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93387-0\_34}, doi = {10.1007/978-3-319-93387-0\_34}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/acns/ToplePKS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/NikolicKSSH18, author = {Ivica Nikolic and Aashish Kolluri and Ilya Sergey and Prateek Saxena and Aquinas Hobor}, title = {Finding The Greedy, Prodigal, and Suicidal Contracts at Scale}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {653--663}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274743}, doi = {10.1145/3274694.3274743}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/NikolicKSSH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/TranLKBS18, author = {Muoi Tran and Loi Luu and Min Suk Kang and Iddo Bentov and Prateek Saxena}, title = {Obscuro: {A} Bitcoin Mixer using Trusted Execution Environments}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {692--701}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274750}, doi = {10.1145/3274694.3274750}, timestamp = {Wed, 05 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/TranLKBS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/DasKSY18, author = {Sourav Das and Aashish Kolluri and Prateek Saxena and Haifeng Yu}, editor = {Vinod Ganapathy and Trent Jaeger and R. K. Shyamasundar}, title = {(Invited Paper) on the Security of Blockchain Consensus Protocols}, booktitle = {Information Systems Security - 14th International Conference, {ICISS} 2018, Bangalore, India, December 17-19, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11281}, pages = {465--480}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-05171-6\_24}, doi = {10.1007/978-3-030-05171-6\_24}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/iciss/DasKSY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/HouJLSY18, author = {Ruomu Hou and Irvan Jahja and Loi Luu and Prateek Saxena and Haifeng Yu}, title = {Randomized View Reconciliation in Permissionless Distributed Systems}, booktitle = {2018 {IEEE} Conference on Computer Communications, {INFOCOM} 2018, Honolulu, HI, USA, April 16-19, 2018}, pages = {2528--2536}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/INFOCOM.2018.8486394}, doi = {10.1109/INFOCOM.2018.8486394}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/HouJLSY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1802-06038, author = {Ivica Nikolic and Aashish Kolluri and Ilya Sergey and Prateek Saxena and Aquinas Hobor}, title = {Finding The Greedy, Prodigal, and Suicidal Contracts at Scale}, journal = {CoRR}, volume = {abs/1802.06038}, year = {2018}, url = {http://arxiv.org/abs/1802.06038}, eprinttype = {arXiv}, eprint = {1802.06038}, timestamp = {Tue, 17 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1802-06038.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1807-00477, author = {Shweta Shinde and Shengyi Wang and Pinghai Yuan and Aquinas Hobor and Abhik Roychoudhury and Prateek Saxena}, title = {BesFS: Mechanized Proof of an Iago-Safe Filesystem for Enclaves}, journal = {CoRR}, volume = {abs/1807.00477}, year = {2018}, url = {http://arxiv.org/abs/1807.00477}, eprinttype = {arXiv}, eprint = {1807.00477}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1807-00477.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1807-00575, author = {Shiqi Shen and Soundarya Ramesh and Shweta Shinde and Abhik Roychoudhury and Prateek Saxena}, title = {Neuro-Symbolic Execution: The Feasibility of an Inductive Approach to Symbolic Execution}, journal = {CoRR}, volume = {abs/1807.00575}, year = {2018}, url = {http://arxiv.org/abs/1807.00575}, eprinttype = {arXiv}, eprint = {1807.00575}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1807-00575.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1810-11605, author = {Aashish Kolluri and Ivica Nikolic and Ilya Sergey and Aquinas Hobor and Prateek Saxena}, title = {Exploiting The Laws of Order in Smart Contracts}, journal = {CoRR}, volume = {abs/1810.11605}, year = {2018}, url = {http://arxiv.org/abs/1810.11605}, eprinttype = {arXiv}, eprint = {1810.11605}, timestamp = {Wed, 31 Oct 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1810-11605.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1811-12628, author = {Haifeng Yu and Ivica Nikolic and Ruomu Hou and Prateek Saxena}, title = {{OHIE:} Blockchain Scaling Made Simple}, journal = {CoRR}, volume = {abs/1811.12628}, year = {2018}, url = {http://arxiv.org/abs/1811.12628}, eprinttype = {arXiv}, eprint = {1811.12628}, timestamp = {Mon, 03 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1811-12628.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TopleJS18, author = {Shruti Tople and Yaoqi Jia and Prateek Saxena}, title = {{PRO-ORAM:} Constant Latency Read-Only Oblivious {RAM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {220}, year = {2018}, url = {http://eprint.iacr.org/2018/220}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TopleJS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/TopleS17, author = {Shruti Tople and Prateek Saxena}, editor = {Michalis Polychronakis and Michael Meier}, title = {On the Trade-Offs in Oblivious Execution Techniques}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 14th International Conference, {DIMVA} 2017, Bonn, Germany, July 6-7, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10327}, pages = {25--47}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60876-1\_2}, doi = {10.1007/978-3-319-60876-1\_2}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/dimva/TopleS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/KumarFTS17, author = {Amrit Kumar and Cl{\'{e}}ment Fischer and Shruti Tople and Prateek Saxena}, editor = {Simon N. Foley and Dieter Gollmann and Einar Snekkenes}, title = {A Traceability Analysis of Monero's Blockchain}, booktitle = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10493}, pages = {153--173}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66399-9\_9}, doi = {10.1007/978-3-319-66399-9\_9}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/KumarFTS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/ShindeTTS17, author = {Shweta Shinde and Dat Le Tien and Shruti Tople and Prateek Saxena}, title = {Panoply: Low-TCB Linux Applications With {SGX} Enclaves}, booktitle = {24th Annual Network and Distributed System Security Symposium, {NDSS} 2017, San Diego, California, USA, February 26 - March 1, 2017}, publisher = {The Internet Society}, year = {2017}, url = {https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/panoply-low-tcb-linux-applications-sgx-enclaves/}, timestamp = {Mon, 01 Feb 2021 08:42:15 +0100}, biburl = {https://dblp.org/rec/conf/ndss/ShindeTTS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ChuaSSL17, author = {Zheng Leong Chua and Shiqi Shen and Prateek Saxena and Zhenkai Liang}, editor = {Engin Kirda and Thomas Ristenpart}, title = {Neural Nets Can Learn Function Type Signatures From Binaries}, booktitle = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver, BC, Canada, August 16-18, 2017}, pages = {99--116}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/chua}, timestamp = {Mon, 01 Feb 2021 08:42:59 +0100}, biburl = {https://dblp.org/rec/conf/uss/ChuaSSL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LuuVTS17, author = {Loi Luu and Yaron Velner and Jason Teutsch and Prateek Saxena}, editor = {Engin Kirda and Thomas Ristenpart}, title = {SmartPool: Practical Decentralized Pooled Mining}, booktitle = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver, BC, Canada, August 16-18, 2017}, pages = {1409--1426}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/luu}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/LuuVTS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuuVTS17, author = {Loi Luu and Yaron Velner and Jason Teutsch and Prateek Saxena}, title = {{SMART} {POOL} : Practical Decentralized Pooled Mining}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {19}, year = {2017}, url = {http://eprint.iacr.org/2017/019}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuuVTS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JiaTMGSL17, author = {Yaoqi Jia and Shruti Tople and Tarik Moataz and Deli Gong and Prateek Saxena and Zhenkai Liang}, title = {Robust Synchronous {P2P} Primitives Using {SGX} Enclaves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {180}, year = {2017}, url = {http://eprint.iacr.org/2017/180}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JiaTMGSL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KumarFTS17, author = {Amrit Kumar and Cl{\'{e}}ment Fischer and Shruti Tople and Prateek Saxena}, title = {A Traceability Analysis of Monero's Blockchain}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {338}, year = {2017}, url = {http://eprint.iacr.org/2017/338}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KumarFTS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TopleDSC17, author = {Shruti Tople and Hung Dang and Prateek Saxena and Ee{-}Chien Chang}, title = {PermuteRam: Optimizing Oblivious Computation for Efficiency}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {885}, year = {2017}, url = {http://eprint.iacr.org/2017/885}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TopleDSC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TranLKBS17, author = {Muoi Tran and Loi Luu and Min Suk Kang and Iddo Bentov and Prateek Saxena}, title = {Obscuro: {A} Bitcoin Mixer using Trusted Execution Environments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {974}, year = {2017}, url = {http://eprint.iacr.org/2017/974}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TranLKBS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/JiaBSL16, author = {Yaoqi Jia and Guangdong Bai and Prateek Saxena and Zhenkai Liang}, title = {Anonymity in Peer-assisted CDNs: Inference Attacks and Mitigation}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2016}, number = {4}, pages = {294--314}, year = {2016}, url = {https://doi.org/10.1515/popets-2016-0041}, doi = {10.1515/POPETS-2016-0041}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/JiaBSL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ShenTS16, author = {Shiqi Shen and Shruti Tople and Prateek Saxena}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {Auror: defending against poisoning attacks in collaborative deep learning systems}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {508--519}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991125}, timestamp = {Tue, 06 Nov 2018 16:59:24 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ShenTS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LuuNZBGS16, author = {Loi Luu and Viswesh Narayanan and Chaodong Zheng and Kunal Baweja and Seth Gilbert and Prateek Saxena}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {A Secure Sharding Protocol For Open Blockchains}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {17--30}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2978389}, doi = {10.1145/2976749.2978389}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LuuNZBGS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LuuCOSH16, author = {Loi Luu and Duc{-}Hiep Chu and Hrishi Olickel and Prateek Saxena and Aquinas Hobor}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {Making Smart Contracts Smarter}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {254--269}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2978309}, doi = {10.1145/2976749.2978309}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LuuCOSH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ShindeCNS16, author = {Shweta Shinde and Zheng Leong Chua and Viswesh Narayanan and Prateek Saxena}, editor = {Xiaofeng Chen and XiaoFeng Wang and Xinyi Huang}, title = {Preventing Page Faults from Telling Your Secrets}, booktitle = {Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016}, pages = {317--328}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2897845.2897885}, doi = {10.1145/2897845.2897885}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ShindeCNS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JiaCHCSL16, author = {Yaoqi Jia and Zheng Leong Chua and Hong Hu and Shuo Chen and Prateek Saxena and Zhenkai Liang}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {"The Web/Local" Boundary Is Fuzzy: {A} Security Study of Chrome's Process-based Sandboxing}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {791--804}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2978414}, doi = {10.1145/2976749.2978414}, timestamp = {Wed, 01 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JiaCHCSL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/CromanDEGJKMSSS16, author = {Kyle Croman and Christian Decker and Ittay Eyal and Adem Efe Gencer and Ari Juels and Ahmed E. Kosba and Andrew Miller and Prateek Saxena and Elaine Shi and Emin G{\"{u}}n Sirer and Dawn Song and Roger Wattenhofer}, editor = {Jeremy Clark and Sarah Meiklejohn and Peter Y. A. Ryan and Dan S. Wallach and Michael Brenner and Kurt Rohloff}, title = {On Scaling Decentralized Blockchains - {(A} Position Paper)}, booktitle = {Financial Cryptography and Data Security - {FC} 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9604}, pages = {106--125}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53357-4\_8}, doi = {10.1007/978-3-662-53357-4\_8}, timestamp = {Wed, 12 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/CromanDEGJKMSSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/TeutschJS16, author = {Jason Teutsch and Sanjay Jain and Prateek Saxena}, editor = {Jens Grossklags and Bart Preneel}, title = {When Cryptocurrencies Mine Their Own Business}, booktitle = {Financial Cryptography and Data Security - 20th International Conference, {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9603}, pages = {499--514}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-54970-4\_29}, doi = {10.1007/978-3-662-54970-4\_29}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/TeutschJS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/HuSACSL16, author = {Hong Hu and Shweta Shinde and Sendroiu Adrian and Zheng Leong Chua and Prateek Saxena and Zhenkai Liang}, title = {Data-Oriented Programming: On the Expressiveness of Non-control Data Attacks}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA, USA, May 22-26, 2016}, pages = {969--986}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SP.2016.62}, doi = {10.1109/SP.2016.62}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/HuSACSL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/JiaMTS16, author = {Yaoqi Jia and Tarik Moataz and Shruti Tople and Prateek Saxena}, editor = {Thorsten Holz and Stefan Savage}, title = {OblivP2P: An Oblivious Peer-to-Peer Content Sharing System}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {945--962}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/jia}, timestamp = {Mon, 01 Feb 2021 08:43:18 +0100}, biburl = {https://dblp.org/rec/conf/uss/JiaMTS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/JainSST16, author = {Sanjay Jain and Prateek Saxena and Frank Stephan and Jason Teutsch}, title = {How to verify computation with a rational network}, journal = {CoRR}, volume = {abs/1606.05917}, year = {2016}, url = {http://arxiv.org/abs/1606.05917}, eprinttype = {arXiv}, eprint = {1606.05917}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/JainSST16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuuCOSH16, author = {Loi Luu and Duc{-}Hiep Chu and Hrishi Olickel and Prateek Saxena and Aquinas Hobor}, title = {Making Smart Contracts Smarter}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {633}, year = {2016}, url = {http://eprint.iacr.org/2016/633}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuuCOSH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/JiaCDSML15, author = {Yaoqi Jia and Yue Chen and Xinshu Dong and Prateek Saxena and Jian Mao and Zhenkai Liang}, title = {Man-in-the-browser-cache: Persisting {HTTPS} attacks via browser cache poisoning}, journal = {Comput. Secur.}, volume = {55}, pages = {62--80}, year = {2015}, url = {https://doi.org/10.1016/j.cose.2015.07.004}, doi = {10.1016/J.COSE.2015.07.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/JiaCDSML15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/internet/JiaDLS15, author = {Yaoqi Jia and Xinshu Dong and Zhenkai Liang and Prateek Saxena}, title = {I Know Where You've Been: Geo-Inference Attacks via the Browser Cache}, journal = {{IEEE} Internet Comput.}, volume = {19}, number = {1}, pages = {44--53}, year = {2015}, url = {https://doi.org/10.1109/MIC.2014.103}, doi = {10.1109/MIC.2014.103}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/internet/JiaDLS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LuuTKS15, author = {Loi Luu and Jason Teutsch and Raghav Kulkarni and Prateek Saxena}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Demystifying Incentives in the Consensus Computer}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {706--719}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813659}, doi = {10.1145/2810103.2813659}, timestamp = {Tue, 10 Nov 2020 19:58:09 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LuuTKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SoniBS15, author = {Pratik Soni and Enrico Budianto and Prateek Saxena}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {The {SICILIAN} Defense: Signature-based Whitelisting of Web JavaScript}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1542--1557}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813710}, doi = {10.1145/2810103.2813710}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SoniBS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/LuuSPSH15, author = {Loi Luu and Ratul Saha and Inian Parameshwaran and Prateek Saxena and Aquinas Hobor}, editor = {C{\'{e}}dric Fournet and Michael W. Hicks and Luca Vigan{\`{o}}}, title = {On Power Splitting Games in Distributed Computation: The Case of Bitcoin Pooled Mining}, booktitle = {{IEEE} 28th Computer Security Foundations Symposium, {CSF} 2015, Verona, Italy, 13-17 July, 2015}, pages = {397--411}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CSF.2015.34}, doi = {10.1109/CSF.2015.34}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/LuuSPSH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/HuCLS15, author = {Hong Hu and Zheng Leong Chua and Zhenkai Liang and Prateek Saxena}, editor = {G{\"{u}}nther Pernul and Peter Y. A. Ryan and Edgar R. Weippl}, title = {Identifying Arbitrary Memory Access Vulnerabilities in Privilege-Separated Software}, booktitle = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9327}, pages = {312--331}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24177-7\_16}, doi = {10.1007/978-3-319-24177-7\_16}, timestamp = {Thu, 15 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/HuCLS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/HassanshahiJYSL15, author = {Behnaz Hassanshahi and Yaoqi Jia and Roland H. C. Yap and Prateek Saxena and Zhenkai Liang}, editor = {G{\"{u}}nther Pernul and Peter Y. A. Ryan and Edgar R. Weippl}, title = {Web-to-Application Injection Attacks on Android: Characterization and Detection}, booktitle = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9327}, pages = {577--598}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24177-7\_29}, doi = {10.1007/978-3-319-24177-7\_29}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/HassanshahiJYSL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/FazziniSO15, author = {Mattia Fazzini and Prateek Saxena and Alessandro Orso}, editor = {Antonia Bertolino and Gerardo Canfora and Sebastian G. Elbaum}, title = {AutoCSP: Automatically Retrofitting {CSP} to Web Applications}, booktitle = {37th {IEEE/ACM} International Conference on Software Engineering, {ICSE} 2015, Florence, Italy, May 16-24, 2015, Volume 1}, pages = {336--346}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICSE.2015.53}, doi = {10.1109/ICSE.2015.53}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/FazziniSO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigsoft/ParameshwaranBS15, author = {Inian Parameshwaran and Enrico Budianto and Shweta Shinde and Hung Dang and Atul Sadhu and Prateek Saxena}, editor = {Elisabetta Di Nitto and Mark Harman and Patrick Heymans}, title = {Auto-patching DOM-based {XSS} at scale}, booktitle = {Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, {ESEC/FSE} 2015, Bergamo, Italy, August 30 - September 4, 2015}, pages = {272--283}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2786805.2786821}, doi = {10.1145/2786805.2786821}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigsoft/ParameshwaranBS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigsoft/ParameshwaranBS15a, author = {Inian Parameshwaran and Enrico Budianto and Shweta Shinde and Hung Dang and Atul Sadhu and Prateek Saxena}, editor = {Elisabetta Di Nitto and Mark Harman and Patrick Heymans}, title = {DexterJS: robust testing platform for DOM-based {XSS} vulnerabilities}, booktitle = {Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, {ESEC/FSE} 2015, Bergamo, Italy, August 30 - September 4, 2015}, pages = {946--949}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2786805.2803191}, doi = {10.1145/2786805.2803191}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigsoft/ParameshwaranBS15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/HuCASL15, author = {Hong Hu and Zheng Leong Chua and Sendroiu Adrian and Prateek Saxena and Zhenkai Liang}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {Automatic Generation of Data-Oriented Exploits}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {177--192}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/hu}, timestamp = {Mon, 01 Feb 2021 08:42:57 +0100}, biburl = {https://dblp.org/rec/conf/uss/HuCASL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/DinhSCOZ15, author = {Tien Tuan Anh Dinh and Prateek Saxena and Ee{-}Chien Chang and Beng Chin Ooi and Chunwang Zhang}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {{M2R:} Enabling Stronger Privacy in MapReduce Computation}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {447--462}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/dinh}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/DinhSCOZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ShindeCNS15, author = {Shweta Shinde and Zheng Leong Chua and Viswesh Narayanan and Prateek Saxena}, title = {Preventing Your Faults From Telling Your Secrets: Defenses Against Pigeonhole Attacks}, journal = {CoRR}, volume = {abs/1506.04832}, year = {2015}, url = {http://arxiv.org/abs/1506.04832}, eprinttype = {arXiv}, eprint = {1506.04832}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ShindeCNS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuuSPSH15, author = {Loi Luu and Ratul Saha and Inian Parameshwaran and Prateek Saxena and Aquinas Hobor}, title = {On Power Splitting Games in Distributed Computation: The Case of Bitcoin Pooled Mining}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {155}, year = {2015}, url = {http://eprint.iacr.org/2015/155}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuuSPSH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuuTKS15, author = {Loi Luu and Jason Teutsch and Raghav Kulkarni and Prateek Saxena}, title = {Demystifying incentives in the consensus computer}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {702}, year = {2015}, url = {http://eprint.iacr.org/2015/702}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuuTKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iceccs/LiHBJLS14, author = {Xiaolei Li and Hong Hu and Guangdong Bai and Yaoqi Jia and Zhenkai Liang and Prateek Saxena}, title = {DroidVault: {A} Trusted Data Vault for Android Devices}, booktitle = {2014 19th International Conference on Engineering of Complex Computer Systems, Tianjin, China, August 4-7, 2014}, pages = {29--38}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/ICECCS.2014.13}, doi = {10.1109/ICECCS.2014.13}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iceccs/LiHBJLS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/LuuSSD14, author = {Loi Luu and Shweta Shinde and Prateek Saxena and Brian Demsky}, editor = {Michael F. P. O'Boyle and Keshav Pingali}, title = {A model counter for constraints over unbounded strings}, booktitle = {{ACM} {SIGPLAN} Conference on Programming Language Design and Implementation, {PLDI} '14, Edinburgh, United Kingdom - June 09 - 11, 2014}, pages = {565--576}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2594291.2594331}, doi = {10.1145/2594291.2594331}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pldi/LuuSSD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/BudiantoJDSL14, author = {Enrico Budianto and Yaoqi Jia and Xinshu Dong and Prateek Saxena and Zhenkai Liang}, editor = {Angelos Stavrou and Herbert Bos and Georgios Portokalidis}, title = {You Can't Be Me: Enabling Trusted Paths and User Sub-origins in Web Browsers}, booktitle = {Research in Attacks, Intrusions and Defenses - 17th International Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8688}, pages = {150--171}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11379-1\_8}, doi = {10.1007/978-3-319-11379-1\_8}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/BudiantoJDSL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BlondUGCSK14, author = {Stevens Le Blond and Adina Uritesc and C{\'{e}}dric Gilbert and Zheng Leong Chua and Prateek Saxena and Engin Kirda}, editor = {Kevin Fu and Jaeyeon Jung}, title = {A Look at Targeted Attacks Through the Lense of an {NGO}}, booktitle = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA, USA, August 20-22, 2014}, pages = {543--558}, publisher = {{USENIX} Association}, year = {2014}, url = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/le-blond}, timestamp = {Mon, 01 Feb 2021 08:43:04 +0100}, biburl = {https://dblp.org/rec/conf/uss/BlondUGCSK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LimTSC14, author = {Hoon Wei Lim and Shruti Tople and Prateek Saxena and Ee{-}Chien Chang}, title = {Faster Secure Arithmetic Computation Using Switchable Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {539}, year = {2014}, url = {http://eprint.iacr.org/2014/539}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LimTSC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NarayanS13, author = {Akshay Narayan and Prateek Saxena}, editor = {William Enck and Adrienne Porter Felt and N. Asokan}, title = {The curse of 140 characters: evaluating the efficacy of {SMS} spam detection on android}, booktitle = {SPSM'13, Proceedings of the 2013 {ACM} Workshop on Security and Privacy in Smartphones and Mobile Devices, Co-located with {CCS} 2013, November 8, 2013, Berlin, Germany}, pages = {33--42}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2516760.2516772}, doi = {10.1145/2516760.2516772}, timestamp = {Mon, 23 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/NarayanS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/TopleSCS13, author = {Shruti Tople and Shweta Shinde and Zhaofeng Chen and Prateek Saxena}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {{AUTOCRYPT:} enabling homomorphic computation on servers to protect sensitive web content}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1297--1310}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516666}, doi = {10.1145/2508859.2516666}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/TopleSCS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DongCSTSL13, author = {Xinshu Dong and Zhaofeng Chen and Hossein Siadati and Shruti Tople and Prateek Saxena and Zhenkai Liang}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Protecting sensitive web content from client-side vulnerabilities with {CRYPTONS}}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1311--1324}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516743}, doi = {10.1145/2508859.2516743}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DongCSTSL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChenDSL13, author = {Zhaofeng Chen and Xinshu Dong and Prateek Saxena and Zhenkai Liang}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {{CRYPTSERVER:} strong data protection in commodity {LAMP} servers}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1457--1460}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2512525}, doi = {10.1145/2508859.2512525}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChenDSL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/DongHSL13, author = {Xinshu Dong and Hong Hu and Prateek Saxena and Zhenkai Liang}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {A Quantitative Evaluation of Privilege Separation in Web Browser Designs}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {75--93}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_5}, doi = {10.1007/978-3-642-40203-6\_5}, timestamp = {Thu, 15 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/DongHSL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/AkhaweLHSS13, author = {Devdatta Akhawe and Frank Li and Warren He and Prateek Saxena and Dawn Song}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {Data-Confined {HTML5} Applications}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {736--754}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_41}, doi = {10.1007/978-3-642-40203-6\_41}, timestamp = {Tue, 21 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/AkhaweLHSS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/BaiLMVS00D13, author = {Guangdong Bai and Jike Lei and Guozhu Meng and Sai Sathyanarayan Venkatraman and Prateek Saxena and Jun Sun and Yang Liu and Jin Song Dong}, title = {{AUTHSCAN:} Automatic Extraction of Web Authentication Protocols from Implementations}, booktitle = {20th Annual Network and Distributed System Security Symposium, {NDSS} 2013, San Diego, California, USA, February 24-27, 2013}, publisher = {The Internet Society}, year = {2013}, url = {https://www.ndss-symposium.org/ndss2013/authscan-automatic-extraction-web-authentication-protocols-implementations}, timestamp = {Mon, 01 Feb 2021 08:42:13 +0100}, biburl = {https://dblp.org/rec/conf/ndss/BaiLMVS00D13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/peccs/SaxenaKSNP13, author = {Prateek Saxena and Vinay B. Y. Kumar and Dilawar Singh and H. Narayanan and Sachin B. Patkar}, editor = {C{\'{e}}sar Benavente{-}Peces and Joaquim Filipe}, title = {Hardware-software Scalable Architectures for Gaussian Elimination over {GF(2)} and Higher Galois Fields}, booktitle = {{PECCS} 2013 - Proceedings of the 3rd International Conference on Pervasive Embedded Computing and Communication Systems, Barcelona, Spain, 19-21 February, 2013}, pages = {195--201}, publisher = {SciTePress}, year = {2013}, timestamp = {Sun, 14 Jul 2013 12:16:13 +0200}, biburl = {https://dblp.org/rec/conf/peccs/SaxenaKSNP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wocn/GaelCSG13, author = {Pankai Gael and Mahesh Chandra and Prateek Saxena and Vijay Kumar Gupta}, title = {Comparative analysis of speech enhancement methods}, booktitle = {Tenth International Conference on Wireless and Optical Communications Networks, {WOCN} 2013, Bhopal, India, July 26-28, 2013}, pages = {1--5}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/WOCN.2013.6616238}, doi = {10.1109/WOCN.2013.6616238}, timestamp = {Tue, 27 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wocn/GaelCSG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/basesearch/Saxena12, author = {Prateek Saxena}, title = {Systematic Techniques for Finding and Preventing Script Injection Vulnerabilities}, school = {University of California, Berkeley, {USA}}, year = {2012}, url = {http://www.escholarship.org/uc/item/89m7p9xw}, timestamp = {Mon, 24 Apr 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/basesearch/Saxena12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AkhaweSS12, author = {Devdatta Akhawe and Prateek Saxena and Dawn Song}, editor = {Tadayoshi Kohno}, title = {Privilege Separation in {HTML5} Applications}, booktitle = {Proceedings of the 21th {USENIX} Security Symposium, Bellevue, WA, USA, August 8-10, 2012}, pages = {429--444}, publisher = {{USENIX} Association}, year = {2012}, url = {https://www.usenix.org/conference/usenixsecurity12/technical-sessions/presentation/akhawe}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/AkhaweSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SamuelSS11, author = {Mike Samuel and Prateek Saxena and Dawn Song}, editor = {Yan Chen and George Danezis and Vitaly Shmatikov}, title = {Context-sensitive auto-sanitization in web templating languages using type qualifiers}, booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011}, pages = {587--600}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046707.2046775}, doi = {10.1145/2046707.2046775}, timestamp = {Tue, 10 Nov 2020 19:56:39 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SamuelSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SaxenaML11, author = {Prateek Saxena and David Molnar and Benjamin Livshits}, editor = {Yan Chen and George Danezis and Vitaly Shmatikov}, title = {{SCRIPTGARD:} automatic context-sensitive sanitization for large-scale legacy web applications}, booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011}, pages = {601--614}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046707.2046776}, doi = {10.1145/2046707.2046776}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SaxenaML11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/WeinbergerSAFSS11, author = {Joel Weinberger and Prateek Saxena and Devdatta Akhawe and Matthew Finifter and Eui Chul Richard Shin and Dawn Song}, editor = {Vijay Atluri and Claudia D{\'{\i}}az}, title = {A Systematic Analysis of {XSS} Sanitization in Web Application Frameworks}, booktitle = {Computer Security - {ESORICS} 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6879}, pages = {150--171}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23822-2\_9}, doi = {10.1007/978-3-642-23822-2\_9}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/WeinbergerSAFSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/HooimeijerLMSV11, author = {Pieter Hooimeijer and Benjamin Livshits and David Molnar and Prateek Saxena and Margus Veanes}, title = {Fast and Precise Sanitizer Analysis with {BEK}}, booktitle = {20th {USENIX} Security Symposium, San Francisco, CA, USA, August 8-12, 2011, Proceedings}, publisher = {{USENIX} Association}, year = {2011}, url = {http://static.usenix.org/events/sec11/tech/full\_papers/Hooimeijer.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/HooimeijerLMSV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/BarthFSB10, author = {Adam Barth and Adrienne Porter Felt and Prateek Saxena and Aaron Boodman}, title = {Protecting Browsers from Extension Vulnerabilities}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2010, San Diego, California, USA, 28th February - 3rd March 2010}, publisher = {The Internet Society}, year = {2010}, url = {https://www.ndss-symposium.org/ndss2010/protecting-browsers-extension-vulnerabilities}, timestamp = {Mon, 01 Feb 2021 08:42:17 +0100}, biburl = {https://dblp.org/rec/conf/ndss/BarthFSB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/SaxenaHPS10, author = {Prateek Saxena and Steve Hanna and Pongsin Poosankam and Dawn Song}, title = {{FLAX:} Systematic Discovery of Client-side Validation Vulnerabilities in Rich Web Applications}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2010, San Diego, California, USA, 28th February - 3rd March 2010}, publisher = {The Internet Society}, year = {2010}, url = {https://www.ndss-symposium.org/ndss2010/flax-systematic-discovery-client-side-validation-vulnerabilities-rich-web-applications}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/SaxenaHPS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/SaxenaAHMMS10, author = {Prateek Saxena and Devdatta Akhawe and Steve Hanna and Feng Mao and Stephen McCamant and Dawn Song}, title = {A Symbolic Execution Framework for JavaScript}, booktitle = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May 2010, Berleley/Oakland, California, {USA}}, pages = {513--528}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SP.2010.38}, doi = {10.1109/SP.2010.38}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/SaxenaAHMMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issta/SaxenaPMS09, author = {Prateek Saxena and Pongsin Poosankam and Stephen McCamant and Dawn Song}, editor = {Gregg Rothermel and Laura K. Dillon}, title = {Loop-extended symbolic execution on binary programs}, booktitle = {Proceedings of the Eighteenth International Symposium on Software Testing and Analysis, {ISSTA} 2009, Chicago, IL, USA, July 19-23, 2009}, pages = {225--236}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1572272.1572299}, doi = {10.1145/1572272.1572299}, timestamp = {Tue, 06 Nov 2018 16:57:30 +0100}, biburl = {https://dblp.org/rec/conf/issta/SaxenaPMS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/NadjiSS09, author = {Yacin Nadji and Prateek Saxena and Dawn Song}, title = {Document Structure Integrity: {A} Robust Basis for Cross-site Scripting Defense}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2009, San Diego, California, USA, 8th February - 11th February 2009}, publisher = {The Internet Society}, year = {2009}, url = {https://www.ndss-symposium.org/ndss2009/document-structure-integrity-a-robust-basis-for-cross-site-scripting-defense/}, timestamp = {Mon, 01 Feb 2021 08:42:14 +0100}, biburl = {https://dblp.org/rec/conf/ndss/NadjiSS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cgo/SaxenaSP08, author = {Prateek Saxena and R. Sekar and Varun Puranik}, editor = {Mary Lou Soffa and Evelyn Duesterwald}, title = {Efficient fine-grained binary instrumentationwith applications to taint-tracking}, booktitle = {Sixth International Symposium on Code Generation and Optimization {(CGO} 2008), April 5-9, 2008, Boston, MA, {USA}}, pages = {74--83}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1356058.1356069}, doi = {10.1145/1356058.1356069}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cgo/SaxenaSP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/CavallaroSS08, author = {Lorenzo Cavallaro and Prateek Saxena and R. Sekar}, editor = {Diego Zamboni}, title = {On the Limits of Information Flow Techniques for Malware Analysis and Containment}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment, 5th International Conference, {DIMVA} 2008, Paris, France, July 10-11, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5137}, pages = {143--163}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70542-0\_8}, doi = {10.1007/978-3-540-70542-0\_8}, timestamp = {Mon, 30 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/CavallaroSS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/SongBYCJKLNPS08, author = {Dawn Xiaodong Song and David Brumley and Heng Yin and Juan Caballero and Ivan Jager and Min Gyung Kang and Zhenkai Liang and James Newsome and Pongsin Poosankam and Prateek Saxena}, editor = {R. Sekar and Arun K. Pujari}, title = {BitBlaze: {A} New Approach to Computer Security via Binary Analysis}, booktitle = {Information Systems Security, 4th International Conference, {ICISS} 2008, Hyderabad, India, December 16-20, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5352}, pages = {1--25}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89862-7\_1}, doi = {10.1007/978-3-540-89862-7\_1}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iciss/SongBYCJKLNPS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.