USENIX Security '13 - Confessions of a Recovering Data Broker
USENIX Security '13 - Building Securable Infrastructure: Open-Source Private Clouds
USENIX Security '13 - Tracking the Casino Computer Wars: Who's Winning—the Casino or the Cheat?
USENIX Security '13 - The White House's Priorities for Cybersecurity
USENIX Security '13 - Security Team 2.0
USENIX Security '13 - Windows 8 Security: Supporting User Confidence
USENIX Security '13 - Dr. Felten Goes To Washington: Lessons from 18 Months in Government
Capsicum: Practical Capabilities for UNIX
USENIX ATC '13 - Redundant State Detection for Dynamic Symbolic Execution
USENIX Security '22 - Targeted Deanonymization via the Cache Side Channel: Attacks and Defenses
USENIX Security '23 - VIPER: Spotting Syscall-Guard Variables for Data-Only Attacks
USENIX Security '22 - BrakTooth: Causing Havoc on Bluetooth Link Manager via Directed Fuzzing
HotCloud '13 - Jobber: Automating Inter-Tenant Trust in the Cloud
USENIX ATC '13 - DeepDive: Transparently Identifying and Managing Performance Interference
USENIX ATC '13 - MutantX-S: Scalable Malware Clustering Based on Static Features
USENIX Security '17 - Data Hemorrhage, Inequality, and You...
USENIX Security '19 - Tackling the Trust and Safety Crisis
USENIX Security '15 - Inherent Cyber Insecurity and Our National Security...
USENIX Security '18 - Discovering Flaws in Security-Focused Static Analysis Tools for Android...
FAST '13 - Horus: Fine-Grained Encryption-Based Security for Large-Scale Storage