Search results
- On the Interdependence of Reliability and Security in Networked Control Systems, Saurabh Amin, Galina A. Schwartz, Shankar Sastry, 50th IEEE Conference on Decision and Control and European Control Conference (CDC-ECC), IEEE, pp 4078-4083, 12, December, 2011
- Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms, Anupam Datta, Jeremiah Blocki, Nicolas Christin, Henry DeYoung, Deepak Garg, Limin Jia, Dilsun Kaynar, Arunesh Sinha, 7th International Conference on Information Systems Security, 1-27, December, 2011
- A Symbolic Logic with Exact Bounds for Cryptographic Protocols, John C. Mitchell, 6642, SpringerLink, 2011
- Privacy in the Age of Augmented Reality, Alessandro Acquisti, Ralph Gross, 3, November, 2011
- Network Design Game with Reliability & Security Failures, Saurabh Amin, Galina A. Schwartz, 3, November, 2011
- Broadening Participation in Cyber Security, William H. Robinson, Kristen Gates, Sigurd Meldal, 3, November, 2011
- ENGRI 1280: Security, Privacy, and Information Network Design: Wiretaps to Facebook, Stephen Wicker, 3, November, 2011
- A Little Too Smart: Location Privacy in the Cellular Age, Stephen Wicker, 3, November, 2011
- Do Not Track, or Musings of a Graduate Student, Jonathan Mayer, 3, November, 2011
- Privacy: Is There an App for That?, Jennifer King, 3, November, 2011
- Ultra Low Power Computation For Secure Embedded Systems, Rajit Manohar, 3, November, 2011
- Secure Detection in the Presence of Integrity Attacks, Yilin Mo, 3, November, 2011
- Integrated Modeling, Simulation and Emulation Environment for Security Assessment of Cyber-Physical Systems, Yuan Xue, 3, November, 2011
- Logical Attestation: An Authorization Architecture for Trustworthy Computing, Emin Gun Sirer, Willem de Bruijn, Patrick Reynolds, Alan Shieh, Kevin Walsh, Dan Williams, Fred Schneider, 3, November, 2011
- Incorporating Cybersecurity Education into the CS curriculum, Jonathan Mayer, Steve Cooper, 3, November, 2011
- Uncovering Anomalous Usage of Medical Records via Social Network Analysis, You Chen, Bradley Malin, Steve Nyemba, Wen Zhang, 2, November, 2011
- The Failure of Noise-Based Non- Continuous Audio Captchas, Hristo Paskov, Elie Bursztein, Romain Beauxis, Daniele Perito, Celine Fabry, John C. Mitchell, 2, November, 2011
- Securing Interaction for Sites, Apps and Extensions in the Browser, Brad Miller, Doug Tygar, 2, November, 2011
- SCION:Scalability, Control and Isolation On Next-Generation Networks, Xin Zhang, Hsu-Chun Hsiao, Geoffrey Hasker, Haowen Chan, Adrian Perrig, 2, November, 2011
- Mechanism Design for Network Decongestion: Rebates and Time-of-Day Pricing, Galina A. Schwartz, Saurabh Amin, Patrick Loiseau, 2, November, 2011
- Virtualization of R&D Driving New Health IT Requirements, Vijay Pillai, 2, November, 2011
- Regret Minimizing Audits: A Learning-Theoretic Basis for Privacy Protection, Jeremiah Blocki, Nicolas Christin, Anupam Datta, Arunesh Sinha, 2, November, 2011
- Declarative Privacy Policy: Finite Models and Attribute-Based Encryption, Ellick Chan, 2, November, 2011
- Context-aware Anomaly Detection for Electronic Medical Record Systems, Yuan Xue, Xiaowei Li, You Chen, Bradley Malin, 2, November, 2011
- Sensor Systems for Monitoring Congestive Heart Failure: Location-based Privacy Encodings, Edmund Seto , Posan Yu, Ruzena Bajcsy, 2, November, 2011
- SCRUB Intel Science and Technology Center: Secure Computing Research for Users' Benefit, Anthony Joseph, 2, November, 2011
- Federal Cyber Security Research & Development, Brad Martin, 2, November, 2011
- Realizing intrinsically cyber secure large systems, Massimo Scipioni, 2, November, 2011
- Trust in Anarchy? Problems in the Governance of Distributed Computing Systems, Ashwin Jacob Mathew, 2, November, 2011
- Game theoretic analysis of Advanced Metering Infrastructure adoption, Dipayan P. Ghosh, Stephen Wicker, Dawn Schrader, William Schulze, Lawrence Blume, 2, November, 2011
- Network Security Games: Combining Game Theory, Behavioral Economics, and Network Measurements, Nicolas Christin, Proceedings GameSec 2011, November, 2011
- Do Interruptions Pay Off? Effects of Interruptive Ads on Consumers' Willingness to Pay, Alessandro Acquisti, Sarah Spiekermann, Journal of Interactive Marketing, 25, 4, pp. 226-240, November, 2011
- A Survey of Mobile Malware in the Wild -, Adrienne Porter Felt, Mtthew Finifter, Erika Chin, David Wagner, ACM Workshop on Security and Privacy in Mobile Devices (SPSM), ACM, 17, October, 2011
- Congestion Pricing Using a Raffle-Based Scheme, Patrick Loiseau, Galina A. Schwartz, John Musacchio, Saurabh Amin, Shankar Sastry, Network Games, Control and Optimization (NetGCooP), 5th International Conference, IEEE, 1-8, 12, October, 2011
- Revisit Dynamic ARIMA Based Anomaly Detection, Bonnie Zhu, Shankar Sastry, SocialCom/PASSAT 2011, IEEE, pp.1263-1268, 9, October, 2011
- Policy Auditing over Incomplete Logs: Theory, Implementation and Applications, Deepak Garg, Limin Jia, Anupam Datta, ACM Conference on Computer and Communications Security, October, 2011
- Fashion Crimes: Trending-Term Exploitation on the Web, Tyler Moore, Nektarios Leontiadis, Nicolas Christin, Proceedings ACM CCS 2011, October, 2011
- Network design game with both reliability and security failures, G. A. Schwartz, S. Amin, A. Gueye, J. Walrand, 49th Annual Allerton Conference on Communication, Control, and Computing, IEEE, pp 675-681, 28, September, 2011
- Interference channel with binary fading: Effect of delayed network state information, A. Vahid, M.A. Maddah-Ali, A.S. Avestimehr, 49th Annual Allerton Converence on Communication, Control, and COmputing, pp.894-901, 28, September, 2011
- Incentive schemes for internet congestion management: Raffles versus time-of-day pricing, Patrick Loiseau, Galina A. Schwartz, John Musachhio, Saurabh Amin, 49th Annual Allerton Conference on Communication, Control and Computing, IEEE, 103-110, 28, September, 2011
- Enhancing context awareness with activity recognition and radio fingerprinting, Eladio Martin, Victor Shia, Posu Yan, Philip Kuryloski, Edmund Y.W. Seto, Venkatesan Ekambaram, Ruzena Bajcsy, 5th IEEE International Conference on Semantic Computing (ICSC), IEEE, pp.263-266, 18, September, 2011
- Linking Computer Vision with Off-the-Shelf Accelerometry through Kinetic Energy for Precise Localization, Eladio Martin, Victor Shia, Posu Yan, Philip Kuryloski, Edmund Y.W. Seto, Venkatesan Ekambaram, Ruzena Bajcsy, 5th IEEE International Conference on Semantic Computing (ICSC), IEEE, pp.239-242, 18, September, 2011
- Beyond Power Proportionality: Designing Power-Lean Cloud Storage, Lakshmi Ganesh, Hakim Weatherspoon, Ken Birman, IEEE 10th International Symposium on Network Computing and Applications, IEEE, 25, August, 2011
- Faces of Facebook: Privacy in the Age of Augmented Reality, Alessandro Acquisti, Ralph Gross, Fred Stutzman, 18, August, 2011
- Audit Mechanisms for Privacy Protection in Healthcare Environments (Position Paper), Jeremiah Blocki, Nicolas Christin, Anupam Datta, Arunesh Sinha, 2nd Usenix Workshop on Health Security and Privacy, August, 2011
- Audit Mechanisms for Privacy Protection in Healthcare Environments, Jeremiah Blocki, Nicolas Christin, Anupam Datta, Arunesh Sinha, Proceedings USENIX HealthSec 2011, August, 2011
- Netquery: A Knowledge Plane For Reasoning About Network Properties., Alan Shieh, Emin Gun Sirer, Fred Schneider, Proceedings of the SIGCOMM Conference, August, 2011
- Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade, Nektarios Leontiadis, Tyler Moore, Nicolas Christin, Proceedings USENIX Security 2011, August, 2011
- “I regretted the minute I pressed share”: A Qualitative Study of Regrets on Facebook, Yang Wang, Saranga Komanduri, Pedro Leon, Gregory Norcie, Alessandro Acquisti, Lorrie Faith Cranor, Proceedings of the Seventh Symposium on Usable Privacy and Security (SOUPS), ACM, July, 2011
- Privacy: Is There An App For That?, Jennifer King, Airi Lampinen, Alex Smolen, July, 2011
- Loci of competition for future internet architectures, John Chuang, Communications Magazine, 49, 7, pp. 38-43, July, 2011
- Tweakable Block Ciphers, Moses Liskov, Ronald L. Rivest, David Wagner, Journal of Cryptology, 24, 3, July, 2011
- Cellular Telephony and the Question of Privacy, Stephen Wicker, Communications of the ACM, 54, 7, July, 2011
- Regret Minimizing Audits: A Learning-Theoretic Basis for Privacy Protection, Jeremiah Blocki, Nicolas Christin, Anupam Datta, Arunesh Sinha, 24th IEEE Computer Security Foundations Symposium, June, 2011
- Regret Minimizing Audits: A Learning-theoretic Basis for Privacy Protection, Jeremiah Blocki, Nicolas Christin, Anupam Datta, Arunesh Sinha, Proceedings IEEE CSF 2011, June, 2011
- Unshackle the Cloud!, Dan Williams, Eslam Elnikety, Mohammed Edehiry, Hani Jamjoon, Hai Huang, Hakim Weatherspoon, Proceedings of the 3rd USENIX Workshop on Hot Topics in Cloud Computing (HotCloud),, June, 2011
- TRUST Annual Report 2010-2011, Faculty and Staff, June, 2011
- Towards a compelling new Internet platform, D. Hausheer, A. Parekh, J. Walrand, G. A. Schwartz, IFIP/IEEE International Symposium, IEEE, pp 1224-1227, 23, May, 2011
- Automated Analysis of Security-Critical JavaScript APIs, Ankur Taly, Ulfar Erlingsson, John C. Mitchell, Mark S. Miller, Jasvir Nagra, IEEE Symposium on Security and Privacy (SP), pp.363-378, 22, May, 2011
- The Failure of Noise-Based Non-continuous Audio Captchas, Elie Bursztein, Romain Beauxis, Hristo Peskov, Daniele Perito, Celine Fabry, IEEE Symposium on Security and Policy, pp.19-31, 22, May, 2011
- Differential Slicing: Identifying Causal Execution Differences for Security Applications, Noah Johnson, Juan Caballero, Kevin Zhijie Chen, Stephen McCamant, Pongsin Poosankam, Daniel Reynaud, Dawn Song, Proceedings of the 32nd IEEE Symposium on Security and Privacy, IEEE, pp. 347-362, May, 2011
- Blueprint for a Science of Cybersecurity, Fred Schneider, Cornell University, May, 2011
- Nexus Authorization Logic (NAL): Design Rationale and Applications, Fred Schneider, Kevin Walsh, Emin Gun Sirer, ACM Transactions on Information and System Security, 14, 1, 8:1-8:28, May, 2011
- Where’s the Beep? User Misunderstandings of RFID, Jennifer King, Aylin Selcugoku, Proceedings of 2011 IEEE International Conference on RFID, pp.192-199, 12, April, 2011
- Correlated failures of power systems: Analysis of the nordic grid, Martin Andreasson, Saurabh Amin, Galina A. Schwartz, Karl Henrik. Johansson, Henrik Sandberg, Shankar Sastry, 11, April, 2011
- Nash Equilibria for Weakest Target Security Games with Heterogeneous Agents, Benjamin Johnson, Jens Grossklags, Nicolas Christin, John Chuang, Proceedings GameNets 2011, April, 2011
- It's All About the Benjamins: An Empirical Study on Incentivizing Users to Ignore Security Advice, Nicolas Christin, Serge Egelman, Timothy Vidas, Jens Grossklags, Proceedings Financial Crypto 2011, February, 2011
- Managing Information Leakage, Steven Whang, Hector Garcia-Molina, Fifth Biennial Conference on Innovative Data Systems Research (CIDR 2011), pp.79-84, 9, January, 2011
- Defeating UCI: Building Stealthy and Malicious Hardware, Cynthia Sturton, Matthew Hicks, David Wagner, 2011 IEEE Symposium on Security and Privacy, IEEE, 22, 2011
- Analyzing inter-application communication in Android, Erika Chin, Adrienne Porter Felt, Kate Greenwood, David Wagner, Proceedings of the 9th international conference on Mobile systems, applications, and services (MobiSys '11), ACM, 2011
- BLOCK: a black-box approach for detection of state violation attacks towards web applications, Xiaowei Li, Yuan Xue, Proceedings of the 27th Annual Computer Security Applications Conference, 2011
- Detection of anomalous insiders in collaborative environments via relational analysis of access logs, You Chen, Bradley Malin, Proceedings of the first ACM conference on Data and application security and privacy, pp. 63-74, 2011
- Flexible dynamic information flow control in Haskell, Delan Stefan, Alejandro Russo, John C. Mitchell, David Mazières, Proceedings of the 4th ACM symposium on Haskell, 2011
- Text-based CAPTCHA strengths and weaknesses, Elie Bursztein, Matthieu Martin, John C. Mitchell, Proceedings of the 18th ACM conference on Computer and communications security, 2011
- Reclaiming the Blogosphere, TalkBack: A Secure LinkBack Protocol for Weblogs, Elie Bursztein, Baptiste Gourdin, John C. Mitchell, Proceedings of the 16th European conference on Research in computer security, pp.133-149, 2011
- App Isolation: Get the Security of Multiple Browsers with Just One, Eric Chen, Jason Bau, Charles Reis, Adam Barth, Proc. of the 18th ACM Conference on Computer and Communications Security (CCS 2011), ACM, 2011
- A Systematic Analysis of XSS Sanitization in Web Application Frameworks, Joel Weinberger, Prateek Saxena, Devdatta Akhawe, Matthew Finifter, Richard Shin, Dawn Song, Proceedings of the 16th European conference on Research in computer security (ESORICS '11), 2011
- Logical attestation: an authorization architecture for trustworthy computing, Emin Gun Sirer, Willem de Bruijn, Patrick Reynolds, Alan Shieh, Kevin Walsh, Dan Williams, Fred Schneider, Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, 2011
- Talking to Yourself for Fun and Profit, Lin-Shung Huang, Eric Chen, Adam Barth, Eric Rescoria, Collin Jackson, Web 2.0 Security and Privacy (W2SP 2011), 2011
- Exploring the Relationship Between Web Application Development Tools and Security, Matthew Finifter, David Wagner, Proceedings of the 2nd USENIX conference on Web application, Usenix, 2011
- MACE: Model-inference-Assisted Concolic Exploration for Protocol and Vulnerability Discovery, Chia Yuan Cho, Domagoj Babic, Pongsin Poosankam, Kevin Zhijie Chen, Edward Xuejun Wu, Dawn Song, Proceedings of the 20th USENIX conference on Security (SEC 11), Usenix, 2011
- Towards Client-side HTML Security Policies, Joel Weinberger, Adam Barth, Dawn Song, Proceedings of the 6th USENIX conference on Hot topics in security (HotSec11), Usenix, 2011
- Malware Analysis with Tree Automata Inference, Domagoj Babic, Daniel Reynaud, Dawn Song, Proceedings of the 23rd international conference on Computer aided verification, ACM, 2011
- Statically-Directed Dynamic Automated Test Generation, Domagoj Babic, Lorenzo Martignoni, Stephen McCamant, Dawn Song, Proceedings of the 2011 International Symposium on Software Testing and Analysis (ISSTA11), 2011
- Attacks against process control systems: risk assessment, detection, and response, Alvaro Cardenas, Saurabh Amin, Zong-Syun Lin, Chi-Yen Huang, Shankar Sastry, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS11), 2011
- Do Data Breach Disclosure Laws Reduce Identity Theft? (Updated), Sasha Romanosky, Rahul Telang, Alessandro Acquisti, Journal of Policy Analysis and Management, 30, 2, pp.256-286, 2011
- Doctrine for Cybersecurity, Deirdre Mulligan, Fred Schneider, Dædalus, the Journal of the American Academy of Arts & Sciences, 140, 4, 2011
- A Survey on Web Application Security, Xiaowei Li, Yuan Xue, Vanderbilt University, 2011
- Next-Generation Internet: Architectures and Protocols, John Musacchio, Galina Schwartz, Jean Walrand, Byrav Ramamurthy, George Rouskas, and Krishna M. Svialingam, pp 378-402, Cambridge University Press, 2011
- Design Principles for Isolation Kernels, Age Kvalnes, Dag Johansen, Robbert van Renesse, Fred Schneider, Steffen Viken Valvag, University of Troms, Cornell University, Technical Report 2011-70, 2011
Found 90 publications.
Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.