• Publications
  • Influence
Intercepting mobile communications: the insecurity of 802.11
TLDR
We have discovered several serious security flaws in the WEP protocol, stemming from mis-application of cryptographic primitives. Expand
  • 1,073
  • 71
  • PDF
The Tangled Web of Password Reuse
TLDR
We investigate for the first time how an attacker can leverage a known password from one site to more easily guess that user's password at other sites. Expand
  • 330
  • 29
  • PDF
Off-the-record communication, or, why not to use PGP
TLDR
We present a protocol for secure online communication, called "off-the-record messaging", which has properties better-suited for casual conversation than do systems like PGP or S/MIME. Expand
  • 283
  • 26
  • PDF
A Tune-up for Tor: Improving Security and Performance in the Tor Network
TLDR
The Tor anonymous communication network uses selfreported bandwidth values to select routers for building tunnels. Expand
  • 162
  • 18
  • PDF
DECENT: A decentralized architecture for enforcing privacy in online social networks
TLDR
We propose DECENT, an architecture for OSNs that uses a distributed hash table to store user data, and features cryptographic protections for confidentiality and integrity, as well as support for flexible attribute policies and fast revocation. Expand
  • 126
  • 17
  • PDF
EASiER: encryption-based access control in social networks with efficient revocation
TLDR
A promising approach to mitigate the privacy risks in Online Social Networks (OSNs) is to shift access control enforcement from the OSN provider to the user by means of encryption by using attribute-based encryption. Expand
  • 330
  • 16
  • PDF
Cirripede: circumvention infrastructure using router redirection with plausible deniability
TLDR
We propose Cirripede, a system that can be used for unobservable communication with Internet destinations. Expand
  • 132
  • 16
  • PDF
BotGrep: Finding P2P Bots with Structured Graph Analysis
TLDR
In this work, we devise techniques to localize botnet members based on the unique communication patterns arising from their overlay topologies used for command and control. Expand
  • 249
  • 15
  • PDF
Cachet: a decentralized architecture for privacy preserving social networking with caching
TLDR
We propose Cachet, an architecture that provides strong security and privacy guarantees while preserving the main functionality of online social networks. Expand
  • 116
  • 15
  • PDF
The Ninja architecture for robust Internet-scale systems and services
TLDR
We propose a distributed service architecture that simplifies scalable service construction and allows the emerging class of extremely heterogeneous devices to seamlessly access services. Expand
  • 386
  • 14
  • PDF
...
1
2
3
4
5
...