Publication On Significance of the Least Significant Bits For Differential Privacy Ilya Mironov October 2012
Publication Short paper: Enhancing Mobile Application Permissions with Runtime Feedback and Constraints Jaeyeon Jung, Seungyeop Han, David Wetherall ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices | October 2012
Publication Using probabilistic generative models for ranking risks of Android apps Hao Peng, Chris Gates, Bhaskar Sarma, Ninghui Li, Yuan Qi, Rahul Potharaju, Cristina Nita-Rotuaru, Ian Molloy (CCS ’12) Proceedings of the 2012 ACM conference on Computer and communications security | October 2012
Publication Scalable Telemetry Classification for Automated Malware Detection Jack W. Stokes, John Platt, Helen Wang, Joe Faulhaber, Mady Marinescu, Anil Thomas, Marius Gheorghescu Proceedings of European Symposium on Research in Computer Security (ESORICS2012) | September 2012 Project
Publication Using File Relationships in Malware Classification Nikos Karampatziakis, Jack W. Stokes, Anil Thomas, Mady Marinescu Proceedings of Conference on Detection of Intrusions and Malware & Vulnerability Assessment | September 2012 Proceedings of Conference on Detection of Intrusions and Malware & Vulnerability Assessment Project
Publication A New Hash and Sign Approach and Structure-Preserving Signatures from DLIN Melissa Chase, Markulf Kohlweiss Security and Cryptography for Networks (SCN) 2012 | September 2012 Security and Cryptography for Networks (SCN)
Publication Investigating Receptiveness to Sensing and Inference in the Home Using Sensor Proxies Eun Kyoung Choe, Sunny Consolvo, Jaeyeon Jung, Beverly Harrison, Shwetak Patel, Julie Kientz September 2012 Best Paper Nominee
Publication STEALTHMEM: System-Level Protection Against Cache-Based Side Channel Attacks in the Cloud Taesoo Kim, Marcus Peinado, Gloria Mainar-Ruiz Proceedings of the 21st USENIX Security Symposium | August 2012 ISBN: 978-931971-95-9
Publication Progressive authentication: deciding when to authenticate on mobile phones Oriana Riva, Chuan Qin, Karin Strauss, Dimitrios Lymberopoulos 21st USENIX Security Symposium | August 2012
Publication FPGAs for Trusted Cloud Computing Ken Eguro, Ramarathnam Venkatesan International Conference on Field-Programmable Logic and Applications | August 2012