Biblio

Export 32 results:
Filters: Author is David Wagner  [Clear All Filters]
2022
Malkin N, Wagner D, Egelman S.  2022.  Runtime Permissions for Privacy in Proactive Intelligent Assistants. Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022). :633--651.
2021
Ho G, Dhiman M, Akhawe D, Paxson V, Savage S, Voelker GM, Wagner D.  2021.  Hopper: Modeling and Detecting Lateral Movement. 30th USENIX Security Symposium (USENIX Security 21). :3093--3110.
2019
Ho G, Cidon A, Gavish L, Schweighauser M, Paxson V, Savage S, Voelker GM, Wagner D.  2019.  Detecting and Characterizing Lateral Phishing at Scale. 28th USENIX Security Symposium (USENIX Security 19). :1273--1290.
2017
Ho G, Sharma A, Javed M, Paxson V, Wagner D.  2017.  Detecting Credential Spearphishing in Enterprise Settings. 26th USENIX Security Symposium (USENIX Security 17). :469--485.
Dang THY, Maniatis P, Wagner D.  2017.  Oscar: A Practical Page-Permissions-Based Scheme for Thwarting Dangling Pointers. 26th USENIX Security Symposium (USENIX Security 17). :815--832.
Tsai L, Wijesekera P, Reardon J, Reyes I, Egelman S, Wagner D, Good N, Chen J-W.  2017.  Turtle Guard: Helping Android Users Apply Contextual Privacy Preferences. Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017). :145--162.
2016
Carlini N, Mishra P, Vaidya T, Zhang Y, Sherr M, Shields C, Wagner D, Zhou W.  2016.  Hidden Voice Commands. 25th USENIX Security Symposium (USENIX Security 16). :513--530.
Malkin N, Egelman S, Wagner D.  2016.  Recovering High-Value Secrets with SGX and Social Authentication. Twelfth Symposium on Usable Privacy and Security (SOUPS 2016).
2014
Carlini N, Wagner D.  2014.  ROP is Still Dangerous: Breaking Modern Defenses. 23rd USENIX Security Symposium (USENIX Security 14). :385--399.
2013
Finifter M, Akhawe D, Wagner D.  2013.  An Empirical Study of Vulnerability Rewards Programs. 22nd USENIX Security Symposium (USENIX Security 13). :273--288.
Kim E, Carlini N, Chang A, Yiu G, Wang K, Wagner D.  2013.  Improved Support for Machine-assisted Ballot-level Audits. 2013 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections (EVT/WOTE 13).
2012
Carlini N, Felt APorter, Wagner D.  2012.  An Evaluation of the Google Chrome Extension Security Architecture. 21st USENIX Security Symposium (USENIX Security 12). :97--111.
2011
Ji T, Kim E, Srikantan R, Tsai A, Cordero A, Wagner D.  2011.  An Analysis of Write-in Marks on Optical Scan Ballots. 2011 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections (EVT/WOTE 11).
Felt APorter, Greenwood K, Wagner D.  2011.  The Effectiveness of Application Permissions. 2nd USENIX Conference on Web Application Development (WebApps 11).
2010
Cordero A, Ji T, Tsai A, Mowery K, Wagner D.  2010.  Efficient User-Guided Ballot Image Verification. 2010 Electronic Voting Technology Workshop/ Workshop on Trustworthy Elections (EVT/WOTE 10).
2009
Sturton C, Wagner D.  2009.  Weight, Weight, Don't Tell Me: Using Scales to Select Ballots for Auditing. 2009 Electronic Voting Technology Workshop/ Workshop on Trustworthy Elections (EVT/WOTE 09).
2008
Tsafrir D, Hertz T, Wagner D, Da Silva D.  2008.  Portably Solving File TOCTTOU Races with Hardness Amplification. 6th USENIX Conference on File and Storage Technologies (FAST 08).
Cordero A, Wagner D.  2008.  Replayable Voting Machine Audit Logs. 2008 USENIX/ACCURATE Electronic Voting Technology Workshop (EVT 08).
Wagner D.  2008.  The State of Electronic Voting, 2008. 22nd Large Installation System Administration Conference (LISA 08).
Karlof C, Tygar J.D., Wagner D.  2008.  A User Study Design for Comparing the Security of Registration Protocols. Usability, Psychology, and Security 2008 (UPSEC 08).
2007
Wagner D.  2007.  Report of the California Voting Systems Review. 16th USENIX Security Symposium (USENIX Security 07).
2006
Yee K-P, Wagner D, Hearst M, Bellovin SM.  2006.  Prerendered User Interfaces for Higher-Assurance Electronic Voting. 2006 USENIX/ACCURATE Electronic Voting Technology Workshop (EVT 06).
2005
Karlof C, Sastry N, Wagner D.  2005.  Cryptographic Voting Protocols: A Systems Perspective. 14th USENIX Security Symposium (USENIX Security 05).

Pages