Biblio

Export 22 results:
Filters: Author is Dan Boneh  [Clear All Filters]
2020
Tramèr F, Boneh D, Paterson K.  2020.  Remote Side-Channel Attacks on Anonymous Transactions. 29th USENIX Security Symposium (USENIX Security 20). :2739--2756.
Ozdemir A, Wahby R, Whitehat B, Boneh D.  2020.  Scaling Verifiable Computation Using Efficient Set Accumulators. 29th USENIX Security Symposium (USENIX Security 20). :2075--2092.
2017
Corrigan-Gibbs H, Boneh D.  2017.  Prio: Private, Robust, and Scalable Computation of Aggregate Statistics. 14th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 17). :259--282.
2014
Michalevsky Y, Boneh D, Nakibly G.  2014.  Gyrophone: Recognizing Speech from Gyroscope Signals. 23rd {USENIX} Security Symposium ({USENIX} Security 14). :1053--1067.
Silver D, Jana S, Boneh D, Chen E, Jackson C.  2014.  Password Managers: Attacks and Defenses. 23rd {USENIX} Security Symposium ({USENIX} Security 14). :449--464.
Ho G, Boneh D, Ballard L, Provos N.  2014.  Tick Tock: Building Browser Red Pills from Timing Side Channels. 8th {USENIX} Workshop on Offensive Technologies ({WOOT} 14).
2010
Aggarwal G, Bursztein E, Jackson C, Boneh D.  2010.  An Analysis of Private Browsing Modes in Modern Browsers. 19th {USENIX} Security Symposium ({USENIX} Security 10).
Bittau A, Hamburg M, Handley M, Mazières D, Boneh D.  2010.  The Case for Ubiquitous Transport-Level Encryption. 19th {USENIX} Security Symposium ({USENIX} Security 10).
Bursztein E, Gourdin B, Fabry C, Bau J, Rydstedt G, Bojinov H, Boneh D, Mitchell JC.  2010.  Webseclab Security Education Workbench. 3rd Workshop on Cyber Security Experimentation and Test ({CSET} 10).
2007
Jackson C, Boneh D, Mitchell J.  2007.  Transaction Generators: Root Kits for Web . 2nd {USENIX} Workshop on Hot Topics in Security (HotSec 07).
2006
Casado M, Garfinkel T, Akella A, Freedman MJ, Boneh D, McKeown N.  2006.  SANE: A Protection Architecture for Enterprise Networks. 15th {USENIX} Security Symposium ({USENIX} Security 06).
2005
Ross B, Jackson C, Miyake N, Boneh D, Mitchell JC.  2005.  Stronger Password Authentication Using Browser Extensions. 14th {USENIX} Security Symposium ({USENIX} Security 05).
2003
Garfinkel T, Rosenblum M, Boneh D.  2003.  Flexible OS Support and Applications for Trusted Computing. 9th Workshop on Hot Topics in Operating Systems (HotOS {IX}).
Brumley D, Boneh D.  2003.  Remote Timing Attacks Are Practical. 12th {USENIX} Security Symposium ({USENIX} Security 03).
1999
Wu T, Malkin M, Boneh D.  1999.  Building Intrusion-Tolerant Applications. 8th {USENIX} Security Symposium ({USENIX} Security 99).
1996
Boneh D, Lipton RJ.  1996.  A Revocable Backup System. 6th {USENIX} Security Symposium ({USENIX} Security 96).