• Publications
  • Influence
Crowds: anonymity for Web transactions
In this paper we introduce a system called Crowds for protecting users' anonymity on the world-wide-web. Crowds, named for the notion of “blending into a crowd,” operates by grouping users into aExpand
  • 2,081
  • 251
  • PDF
False data injection attacks against state estimation in electric power grids
A power grid is a complex system connecting electric power generators to consumers through power transmission and distribution networks across a large geographical area. System monitoring isExpand
  • 1,073
  • 161
  • PDF
False data injection attacks against state estimation in electric power grids
A power grid is a complex system connecting electric power generators to consumers through power transmission and distribution networks across a large geographical area. System monitoring isExpand
  • 965
  • 112
  • PDF
Stealing Machine Learning Models via Prediction APIs
Machine learning (ML) models may be deemed confidential due to their sensitive training data, commercial value, or use in security applications. Increasingly often, confidential ML models are beingExpand
  • 657
  • 85
  • PDF
The Design and Analysis of Graphical Passwords
In this paper we propose and evaluate new graphical password schemes that exploit features of graphical input displays to achieve better security than text-based passwords. Graphical input devicesExpand
  • 915
  • 85
  • PDF
Byzantine quorum systems
Summary. Quorum systems are well-known tools for ensuring the consistency and availability of replicated data despite the benign failure of data repositories. In this paper we consider the arbitraryExpand
  • 661
  • 70
  • PDF
Byzantine quorum systems
Summary. Quorum systems are well-known tools for ensuring the consistency and availability of replicated data despite the benign failure of data repositories. In this paper we consider the arbitraryExpand
  • 665
  • 69
  • PDF
Flicker: an execution infrastructure for tcb minimization
We present Flicker, an infrastructure for executing security-sensitive code in complete isolation while trusting as few as 250 lines of additional code. Flicker can also provide meaningful,Expand
  • 709
  • 66
  • PDF
Cross-VM side channels and their use to extract private keys
This paper details the construction of an access-driven side-channel attack by which a malicious virtual machine (VM) extracts fine-grained information from a victim VM running on the same physicalExpand
  • 688
  • 52
  • PDF
Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition
Machine learning is enabling a myriad innovations, including new algorithms for cancer diagnosis and self-driving cars. The broad use of machine learning makes it important to understand the extentExpand
  • 684
  • 50
  • PDF