• Publications
  • Influence
Localization for mobile sensor networks
TLDR
We introduce the sequential Monte Carlo Localization method and argue that it can exploit mobility to improve the accuracy and precision of localization. Expand
  • 1,141
  • 102
  • PDF
Feature Squeezing: Detecting Adversarial Examples in Deep Neural Networks
TLDR
We propose a new strategy, \emph{feature squeezing}, that can be used to harden DNN models by detecting adversarial examples with high accuracy and few false positives. Expand
  • 632
  • 90
  • PDF
Faster Secure Two-Party Computation Using Garbled Circuits
TLDR
We demonstrate a generic approach to secure two-party computation for semi-honest participants that is significantly faster than any previously reported while also scaling to arbitrarily large circuits. Expand
  • 546
  • 58
  • PDF
Secure aggregation for wireless networks
TLDR
We present a protocol that provides a secure aggregation mechanism for wireless networks that is resilient to both intruder devices and single device key compromises. Expand
  • 499
  • 42
  • PDF
N-Variant Systems: A Secretless Framework for Security through Diversity
TLDR
We present an architectural framework for systematically using automated diversity to provide high assurance detection and disruption for large classes of attacks. Expand
  • 312
  • 41
  • PDF
Perracotta: mining temporal API rules from imperfect traces
TLDR
We identify reasons why scaling dynamic inference techniques has proven difficult, and introduce solutions that enable a dynamic inference technique to scale to large programs and work effectively with the imperfect traces typically available in industrial scenarios. Expand
  • 380
  • 37
  • PDF
Using Directional Antennas to Prevent Wormhole Attacks
TLDR
We present a cooperative protocol whereby nodes share directional information to prevent wormhole endpoints from masquerading as false neighbors. Expand
  • 659
  • 34
  • PDF
Improving Security Using Extensible Lightweight Static Analysis
TLDR
This article describes an extensible tool that uses lightweight static analysis to detect common security vulnerabilities (including buffer overflows and format string vulnerabilities). Expand
  • 493
  • 33
  • PDF
Private Set Intersection: Are Garbled Circuits Better than Custom Protocols?
TLDR
We show that a careful application of garbled circuits leads to solutions that can run on million-element sets on typical desktops, and that can be competitive with the fastest custom protocols. Expand
  • 252
  • 22
  • PDF
Two Halves Make a Whole - Reducing Data Transfer in Garbled Circuits Using Half Gates
TLDR
We show how to simultaneously garble AND gates using two ciphertexts and XOR gates using zero Ciphertexts, resulting in smaller garbled circuits than any prior scheme. Expand
  • 206
  • 20
  • PDF