Publication Leaky Pseudo-Entropy Functions Mark Braverman, Avinatan Hassidim, Yael Tauman Kalai In Proc. of the Innovations in Computer Science (ICS) | January 2011
Publication AutoLog: facing log redundancy and insufficiency Ming Wu, Longwen Lu, Yu Fan, Jianjun Zhao, Zheng Zhang, Cheng Zhang, Zhenyu Guo APSys | January 2011
Publication Balls and Bins: Smaller Hash Families and Faster Evaluation Elisa Celis, Omer Reingold, Gil Segev, Udi Wieder FOCS | January 2011 FOCS
Publication Computer-Aided Security Proofs for the Working Cryptographer Gilles Barthe, Benjamin Grégoire, Sylvain Heraud, Santiago Zanella-Béguelin Advances in Cryptology, CRYPTO 2011 | January 2011 ISBN: 978-3-642-22791-2 Best Paper Award
Publication Detecting Malicious Web Links and Identifying Their Attack Types Hyunsang Choi, Bin Benjamin Zhu, Heejo Lee USENIX Conference on Web Application Development 2011 | January 2011
Publication A Comprehensive Approach to Image Spam Detection: From Server to Client Solution Yan Gao, Alok Choudhary, Gang Hua IEEE Transactions on Information Forensics and Security | December 2010, pp. 826-836
Publication Probabilistic Inference and Differential Privacy Oliver Williams, Frank McSherry Neural Information Processing Systems (NIPS) | December 2010
Publication Structured Encryption and Controlled Disclosure Melissa Chase, Seny Kamara Advances in Cryptology – ASIACRYPT 2010 | December 2010
Publication Formal Certification of Game-Based Cryptographic Proofs Santiago Zanella-Béguelin December 2010 December 2010 EAPLS Best PhD Dissertation Award
Publication Zozzle: Low-overhead Mostly Static JavaScript Malware Detection Charles Curtsinger Benjamin Livshits, Ben Zorn, Christian Seifert USENIX Security Symposium | November 2010 Project