An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants.
In Proceedings of the ACM Conference on Computer and Communications Security (CCS) 2007.
Don't Sweat Your Privacy: Using Humidity to Detect Human Presence.
In Proceedings of the International Workshop on Privacy in UbiComp (UbiPriv) 2007.
Efficient Mechanisms to Provide Convoy Member and Vehicle Sequence Authentication in VANETs.
In Proceedings of the International Conference on Security and Privacy in Communication Networks (SecureComm) 2007.
Turtles All The Way Down: Research Challenges in User-Based Attestation.
In Proceedings of the Workshop on Hot Topics in Security (HotSec) 2007.
Portcullis: Protecting Connection Setup from Denial-of-Capability Attacks.
In Proceedings of the ACM SIGCOMM 2007.
Multi-Dimensional Range Query over Encrypted Data.
In IEEE Symposium on Security and Privacy 2007.
Minimal TCB Code Execution (Extended Abstract).
In Proceedings of the IEEE Symposium on Security and Privacy 2007.
MiniSec: A Secure Sensor Network Communication Architecture.
In Proceedings of the IEEE International Conference on Information Processing in Sensor Networks (IPSN) 2007.
BASE: An Incrementally Deployable Mechanism for Viable IP Spoofing Prevention.
In Proceedings of the ACM Symposium on Information, Computer and Communications Security (ASIACCS) 2007.
PRISM: Enabling Personal Verification of Code Integrity, Untampered Execution, and Trusted I/O on Legacy Systems or Human-Verifiable Code Execution.
Technical report, CyLab 2007.
Low-cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup.
In Usable Security (USEC) 2007.
Rapid Trust Establishment for Pervasive Personal Computing.
In IEEE Pervasive Computing 6 (4) 2007.
Pioneer: Verifying Code Integrity and Enforcing Untampered Code Execution on Legacy Systems.
Chapter in Malware Detection (Mihai Christodorescu, Somesh Jha, Douglas Maughan, Dawn Song, Cliff Wang, eds.) 2007.
SecVisor: A Tiny Hypervisor to Provide Lifetime Kernel Code Integrity for Commodity OSes.
In Proceedings of the ACM Conference on Operating Systems Principles (SOSP) 2007.
Message-In-a-Bottle: User-Friendly and Secure Key Deployment for Sensor Nodes.
In Proceedings of the ACM Conference on Embedded Networked Sensor System (SenSys) 2007.
SIA: Secure Information Aggregation in Sensor Networks.
In Journal of Computer Security (Special Issue on Security of Ad Hoc and Sensor Networks) 15 (1) 2007.