An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants.
In Proceedings of ACM Conference on Computer and Communications Security (CCS) 2007.
Don't Sweat Your Privacy: Using Humidity to Detect Human Presence.
In Proceedings of International Workshop on Privacy in UbiComp (UbiPriv) 2007.
Efficient Mechanisms to Provide Convoy Member and Vehicle Sequence Authentication in VANETs.
In Proceedings of International Conference on Security and Privacy in Communication Networks (SecureComm) 2007.
Portcullis: Protecting Connection Setup from Denial-of-Capability Attacks.
In Proceedings of ACM SIGCOMM 2007.
Turtles All The Way Down: Research Challenges in User-Based Attestation.
In Proceedings of Workshop on Hot Topics in Security (HotSec) 2007.
Minimal TCB Code Execution (Extended Abstract).
In Proceedings of IEEE Symposium on Security and Privacy 2007.
Multi-Dimensional Range Query over Encrypted Data.
In IEEE Symposium on Security and Privacy 2007.
MiniSec: A Secure Sensor Network Communication Architecture.
In Proceedings of IEEE International Conference on Information Processing in Sensor Networks (IPSN) 2007.
BASE: An Incrementally Deployable Mechanism for Viable IP Spoofing Prevention.
In Proceedings of ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS) 2007.
PRISM: Enabling Personal Verification of Code Integrity, Untampered Execution, and Trusted I/O on Legacy Systems or Human-Verifiable Code Execution.
Technical report, CyLab 2007.
Low-cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup.
In Usable Security (USEC) 2007.
Rapid Trust Establishment for Pervasive Personal Computing.
In IEEE Pervasive Computing 6 (4) 2007.
Pioneer: Verifying Code Integrity and Enforcing Untampered Code Execution on Legacy Systems.
Chapter in Malware Detection (Mihai Christodorescu, Somesh Jha, Douglas Maughan, Dawn Song, Cliff Wang, eds.) 2007.
SecVisor: A Tiny Hypervisor to Provide Lifetime Kernel Code Integrity for Commodity OSes.
In Proceedings of ACM Conference on Operating Systems Principles (SOSP) 2007.
Message-In-a-Bottle: User-Friendly and Secure Key Deployment for Sensor Nodes.
In Proceedings of ACM Conference on Embedded Networked Sensor System (SenSys) 2007.
SIA: Secure Information Aggregation in Sensor Networks.
In Journal of Computer Security (Special Issue on Security of Ad Hoc and Sensor Networks) 15 (1) 2007.