Biblio

Export 22 results:
Filters: Author is Dan Boneh  [Clear All Filters]
2020
Tramèr F, Boneh D, Paterson K.  2020.  Remote Side-Channel Attacks on Anonymous Transactions. 29th USENIX Security Symposium (USENIX Security 20). :2739--2756.
Ozdemir A, Wahby R, Whitehat B, Boneh D.  2020.  Scaling Verifiable Computation Using Efficient Set Accumulators. 29th USENIX Security Symposium (USENIX Security 20). :2075--2092.
2017
Corrigan-Gibbs H, Boneh D.  2017.  Prio: Private, Robust, and Scalable Computation of Aggregate Statistics. 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17). :259--282.
2014
Michalevsky Y, Boneh D, Nakibly G.  2014.  Gyrophone: Recognizing Speech from Gyroscope Signals. 23rd USENIX Security Symposium (USENIX Security 14). :1053--1067.
Silver D, Jana S, Boneh D, Chen E, Jackson C.  2014.  Password Managers: Attacks and Defenses. 23rd USENIX Security Symposium (USENIX Security 14). :449--464.
Ho G, Boneh D, Ballard L, Provos N.  2014.  Tick Tock: Building Browser Red Pills from Timing Side Channels. 8th USENIX Workshop on Offensive Technologies (WOOT 14).
2010
Aggarwal G, Bursztein E, Jackson C, Boneh D.  2010.  An Analysis of Private Browsing Modes in Modern Browsers. 19th USENIX Security Symposium (USENIX Security 10).
Bittau A, Hamburg M, Handley M, Mazières D, Boneh D.  2010.  The Case for Ubiquitous Transport-Level Encryption. 19th USENIX Security Symposium (USENIX Security 10).
Bursztein E, Gourdin B, Fabry C, Bau J, Rydstedt G, Bojinov H, Boneh D, Mitchell JC.  2010.  Webseclab Security Education Workbench. 3rd Workshop on Cyber Security Experimentation and Test (CSET 10).
2007
Jackson C, Boneh D, Mitchell J.  2007.  Transaction Generators: Root Kits for Web . 2nd USENIX Workshop on Hot Topics in Security (HotSec 07).
2005
Ross B, Jackson C, Miyake N, Boneh D, Mitchell JC.  2005.  Stronger Password Authentication Using Browser Extensions. 14th USENIX Security Symposium (USENIX Security 05).
2003
Garfinkel T, Rosenblum M, Boneh D.  2003.  Flexible OS Support and Applications for Trusted Computing. 9th Workshop on Hot Topics in Operating Systems (HotOS IX).
Brumley D, Boneh D.  2003.  Remote Timing Attacks Are Practical. 12th USENIX Security Symposium (USENIX Security 03).
1999
Wu T, Malkin M, Boneh D.  1999.  Building Intrusion-Tolerant Applications. 8th USENIX Security Symposium (USENIX Security 99).
1996
Boneh D, Lipton RJ.  1996.  A Revocable Backup System. 6th USENIX Security Symposium (USENIX Security 96).