TRRespass: Exploiting the Many Sides of Target Row Refresh Pietro Frigo (Vrije Universiteit Amsterdam), Emanuele Vannacci (Vrije Universiteit Amsterdam), Hasan Hassan (ETH Zürich), Victor van der Veen (Qualcomm Technologies, Inc.), Onur Mutlu (ETH Zürich), Cristiano Giuffrida (Vrije Universiteit Amsterdam), Herbert Bos (Vrije Universiteit Amsterdam), Kaveh Razavi (Vrije Universiteit Amsterdam)
An Analysis of Pre-installed Android Software Julien Gamba (IMDEA Networks Institute / Universidad Carlos III de Madrid), Mohammed Rashed (Universidad Carlos III de Madrid), Abbas Razaghpanah (Stony Brook University), Juan Tapiador (Universidad Carlos III de Madrid), Narseo Vallina-Rodriguez (IMDEA Networks Institute / ICSI)
Can Voters Detect Malicious Manipulation of Ballot Marking Devices? Matthew Bernhard (University of Michigan), Allison McDonald (University of Michigan), Henry Meng (University of Michigan), Jensen Hwa (University of Michigan), Nakul Bajaj (The Harker School), Kevin Chang (University of Michigan), J. Alex Halderman (University of Michigan)
Research Director
Office of Technology Research and Investigation
Federal Trade Commission
A Sense of Self for Unix Processes Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaji, Thomas A. Longstaff, 1996
Cryptovirology: Extortion-Based Security Threats and Countermeasures Adam L. Young, Moti Yung, 1996
Decentralized Trust Management Matt Blaze, Joan Feigenbaum, Jack Lacy, 1996
Analysis of a Denial of Service Attack on TCP Christoph L. Schuba, Ivan Krsul, Markus G. Kuhn, Eugene H. Spafford, Aurobindo Sundaram, Diego Zamboni, 1997
Anonymous Connections and Onion Routing Paul F. Syverson, David M. Goldschlag, Michael G. Reed, 1997
Efficient Authentication and Signing of Multicast Streams Over Lossy Channels Adrian Perrig, Ran Canetti, J. Doug Tygar, Dawn Xiaodong Song, 2000
Practical Techniques for Searches on Encrypted Data Dawn Xiaodong Song, David A. Wagner, Adrian Perrig, 2000
Random Key Predistribution Schemes for Sensor Networks Haowen Chan, Adrian Perrig, Dawn Xiaodong Song, 2003
Distributed Detection of Node Replication Attacks in Sensor Networks Bryan Parno, Adrian Perrig, Virgil D. Gligor, 2005
Experimental Security Analysis of a Modern Automobile Karl Koscher, Alexei Czeskis, Franziska Roesner, Shwetak Patel, Tadayoshi Kohno, Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage (2010)
Outside the Closed World: On Using Machine Learning for Network Intrusion Detection Robin Sommer, Vern Paxson (2010)