Biblio

Export 30 results:
Filters: Author is David Wagner  [Clear All Filters]
2019
Ho G, Cidon A, Gavish L, Schweighauser M, Paxson V, Savage S, Voelker GM, Wagner D.  2019.  Detecting and Characterizing Lateral Phishing at Scale. 28th {USENIX} Security Symposium ({USENIX} Security 19). :1273--1290.
2017
Ho G, Sharma A, Javed M, Paxson V, Wagner D.  2017.  Detecting Credential Spearphishing in Enterprise Settings. 26th {USENIX} Security Symposium ({USENIX} Security 17). :469--485.
Dang THY, Maniatis P, Wagner D.  2017.  Oscar: A Practical Page-Permissions-Based Scheme for Thwarting Dangling Pointers. 26th {USENIX} Security Symposium ({USENIX} Security 17). :815--832.
Tsai L, Wijesekera P, Reardon J, Reyes I, Egelman S, Wagner D, Good N, Chen J-W.  2017.  Turtle Guard: Helping Android Users Apply Contextual Privacy Preferences. Thirteenth Symposium on Usable Privacy and Security ({SOUPS} 2017). :145--162.
2016
Carlini N, Mishra P, Vaidya T, Zhang Y, Sherr M, Shields C, Wagner D, Zhou W.  2016.  Hidden Voice Commands. 25th {USENIX} Security Symposium ({USENIX} Security 16). :513--530.
Malkin N, Egelman S, Wagner D.  2016.  Recovering High-Value Secrets with SGX and Social Authentication. Twelfth Symposium on Usable Privacy and Security ({SOUPS} 2016).
2015
Wijesekera P, Baokar A, Hosseini A, Egelman S, Wagner D, Beznosov K.  2015.  Android Permissions Remystified: A Field Study on Contextual Integrity. 24th {USENIX} Security Symposium ({USENIX} Security 15). :499--514.
Carlini N, Barresi A, Payer M, Wagner D, Gross TR.  2015.  Control-Flow Bending: On the Effectiveness of Control-Flow Integrity. 24th {USENIX} Security Symposium ({USENIX} Security 15). :161--176.
2014
Carlini N, Wagner D.  2014.  ROP is Still Dangerous: Breaking Modern Defenses. 23rd {USENIX} Security Symposium ({USENIX} Security 14). :385--399.
2013
Finifter M, Akhawe D, Wagner D.  2013.  An Empirical Study of Vulnerability Rewards Programs. 22nd {USENIX} Security Symposium ({USENIX} Security 13). :273--288.
Kim E, Carlini N, Chang A, Yiu G, Wang K, Wagner D.  2013.  Improved Support for Machine-assisted Ballot-level Audits. 2013 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections (EVT/WOTE 13).
2012
Carlini N, Felt APorter, Wagner D.  2012.  An Evaluation of the Google Chrome Extension Security Architecture. 21st {USENIX} Security Symposium ({USENIX} Security 12). :97--111.
2011
Ji T, Kim E, Srikantan R, Tsai A, Cordero A, Wagner D.  2011.  An Analysis of Write-in Marks on Optical Scan Ballots. 2011 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections (EVT/WOTE 11).
Felt APorter, Greenwood K, Wagner D.  2011.  The Effectiveness of Application Permissions. 2nd {USENIX} Conference on Web Application Development (WebApps 11).
2010
Cordero A, Ji T, Tsai A, Mowery K, Wagner D.  2010.  Efficient User-Guided Ballot Image Verification. 2010 Electronic Voting Technology Workshop/ Workshop on Trustworthy Elections (EVT/WOTE 10).
2009
Sturton C, Wagner D.  2009.  Weight, Weight, Don't Tell Me: Using Scales to Select Ballots for Auditing. 2009 Electronic Voting Technology Workshop/ Workshop on Trustworthy Elections (EVT/WOTE 09).
2008
Tsafrir D, Hertz T, Wagner D, Da Silva D.  2008.  Portably Solving File TOCTTOU Races with Hardness Amplification. 6th {USENIX} Conference on File and Storage Technologies ({FAST} 08).
Cordero A, Wagner D.  2008.  Replayable Voting Machine Audit Logs. 2008 USENIX/ACCURATE Electronic Voting Technology Workshop ({EVT} 08).
Wagner D.  2008.  The State of Electronic Voting, 2008. 22nd Large Installation System Administration Conference ({LISA} 08).
Karlof C, Tygar J.D., Wagner D.  2008.  A User Study Design for Comparing the Security of Registration Protocols. Usability, Psychology, and Security 2008 ({UPSEC} 08).
2007
Wagner D.  2007.  Report of the California Voting Systems Review. 16th {USENIX} Security Symposium ({USENIX} Security 07).
2006
Yee K-P, Wagner D, Hearst M, Bellovin SM.  2006.  Prerendered User Interfaces for Higher-Assurance Electronic Voting. 2006 USENIX/ACCURATE Electronic Voting Technology Workshop ({EVT} 06).
2005
Karlof C, Sastry N, Wagner D.  2005.  Cryptographic Voting Protocols: A Systems Perspective. 14th {USENIX} Security Symposium ({USENIX} Security 05).
2004
Johnson R, Wagner D.  2004.  Finding User/Kernel Pointer Bugs with Type Inference. 13th {USENIX} Security Symposium ({USENIX} Security 04).
2002
Chen H, Wagner D, Dean D.  2002.  Setuid Demystified. 11th {USENIX} Security Symposium ({USENIX} Security 02).

Pages