David Evans

According to our database1, David Evans authored at least 76 papers between 1994 and 2019.

Collaborative distances:



In proceedings 
PhD thesis 



On csauthors.net:


Evaluating Differentially Private Machine Learning in Practice.
Proceedings of the 28th USENIX Security Symposium, 2019

Context-aware Monitoring in Robotic Surgery.
Proceedings of the International Symposium on Medical Robotics, 2019

Cost-Sensitive Robustness against Adversarial Examples.
Proceedings of the 7th International Conference on Learning Representations, 2019

Misery Digraphs: Delaying Intrusion Attacks in Obscure Clouds.
IEEE Trans. Information Forensics and Security, 2018

Efficient Dynamic Searchable Encryption with Forward Privacy.
PoPETs, 2018

Optimizing Trees for Static Searchable Encryption.
IACR Cryptology ePrint Archive, 2018

A Pragmatic Introduction to Secure Multi-Party Computation.
Foundations and Trends in Privacy and Security, 2018

Distributed Learning without Distress: Privacy-Preserving Empirical Risk Minimization.
Proceedings of the Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, 2018

Feature Squeezing: Detecting Adversarial Examples in Deep Neural Networks.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

DSML 2018 Introduction.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2018

Fidelius Charm: Isolating Unsafe Rust Code.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

Privacy-Preserving Distributed Linear Regression on High-Dimensional Data.
PoPETs, 2017

Secure Linear Regression on Vertically Partitioned Datasets.
IACR Cryptology ePrint Archive, 2016

Revisiting Square-Root ORAM: Efficient Random Access in Multi-party Computation.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Automatically Evading Classifiers: A Case Study on PDF Malware Classifiers.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Secure Stable Matching at Scale.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Obliv-C: A Language for Extensible Data-Oblivious Computation.
IACR Cryptology ePrint Archive, 2015

Understanding and Monitoring Embedded Web Scripts.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Two Halves Make a Whole - Reducing Data Transfer in Garbled Circuits Using Half Gates.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

Two Halves Make a Whole: Reducing Data Transfer in Garbled Circuits using Half Gates.
IACR Cryptology ePrint Archive, 2014

SSOScan: Automated Testing of Web Applications for Single Sign-On Vulnerabilities.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Explicating SDKs: Uncovering Assumptions Underlying Secure Authentication and Authorization.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Circuit Structures for Improving Efficiency of Security and Privacy Tools.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

Quid-Pro-Quo-tocols: Strengthening Semi-honest Protocols with Dual Execution.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

Private Set Intersection: Are Garbled Circuits Better than Custom Protocols?
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Effectiveness of Moving Target Defenses.
Proceedings of the Moving Target Defense, 2011

Measuring Security.
IEEE Security & Privacy, 2011

Guest Editors' Introduction: The Science of Security.
IEEE Security & Privacy, 2011

GuardRails: A Data-Centric Web Application Security Framework.
Proceedings of the 2nd USENIX Conference on Web Application Development, 2011

Faster Secure Two-Party Computation Using Garbled Circuits.
Proceedings of the 20th USENIX Security Symposium, 2011

Privacy-Preserving Applications on Smartphones.
Proceedings of the 6th USENIX Workshop on Hot Topics in Security, 2011

Auditing Information Leakage for Distance Metrics.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Efficient Privacy-Preserving Biometric Identification.
Proceedings of the Network and Distributed System Security Symposium, 2011

Efficient Secure Computation with Garbled Circuits.
Proceedings of the Information Systems Security - 7th International Conference, 2011

Private Editing Using Untrusted Cloud Services.
Proceedings of the 31st IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2011 Workshops), 2011

Protecting Private Web Content from Embedded Scripts.
Proceedings of the Computer Security - ESORICS 2011, 2011

Automated black-box detection of side-channel vulnerabilities in web applications.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Privacy through Noise: A Design Space for Private Identification.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

Reverse-Engineering a Cryptographic RFID Tag.
Proceedings of the 17th USENIX Security Symposium, 2008

Talking to strangers without taking their candy: isolating proxied content.
Proceedings of the 1st Workshop on Social Network Systems, 2008

Hiding in Groups: On the Expressiveness of Privacy Distributions.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

The user is not the enemy: fighting malware by tracking user intentions.
Proceedings of the 2008 Workshop on New Security Paradigms, 2008

Security through redundant data diversity.
Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2008

Comparing Java and .NET security: Lessons learned and missed.
Computers & Security, 2006

Secure and practical defense against code-injection attacks using software dynamic translation.
Proceedings of the 2nd International Conference on Virtual Execution Environments, 2006

N-Variant Systems: A Secretless Framework for Security through Diversity.
Proceedings of the 15th USENIX Security Symposium, Vancouver, BC, Canada, July 31, 2006

Perracotta: mining temporal API rules from imperfect traces.
Proceedings of the 28th International Conference on Software Engineering (ICSE 2006), 2006

Inculcating invariants in introductory courses.
Proceedings of the 28th International Conference on Software Engineering (ICSE 2006), 2006

Quantifying Information Leakage in Tree-Based Hash Protocols (Short Paper).
Proceedings of the Information and Communications Security, 8th International Conference, 2006

Support Vector Machine with External Recurrences for Modeling Dynamic Cerebral Autoregulation.
Proceedings of the Progress in Pattern Recognition, 2006

Toasters, Seat Belts, and Inferring Program Properties.
Proceedings of the Verified Software: Theories, 2005

Where's the FEEB? The Effectiveness of Instruction Set Randomization.
Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, July 31, 2005

Automatically Hardening Web Applications Using Precise Tainting.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

ICSE 2004 workshop summary second international workshop on dynamic analysis (WODA 2004).
ACM SIGSOFT Software Engineering Notes, 2004

Pancakes, puzzles, and polynomials: cracking the Cracker Barrel.
SIGACT News, 2004

Election Security: Perception and Reality.
IEEE Security & Privacy, 2004

What Biology Can (and Can't) Teach Us About Security.
Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, 2004

Dynamically inferring temporal properties.
Proceedings of the 2004 ACM SIGPLAN-SIGSOFT Workshop on Program Analysis For Software Tools and Engineering, 2004

Using Directional Antennas to Prevent Wormhole Attacks.
Proceedings of the Network and Distributed System Security Symposium, 2004

Localization for mobile sensor networks.
Proceedings of the 10th Annual International Conference on Mobile Computing and Networking, 2004

Automatically Inferring Temporal Properties for Program Evolution .
Proceedings of the 15th International Symposium on Software Reliability Engineering (ISSRE 2004), 2004

Second International Workshop on Dynamic Analysis (WODA 2004).
Proceedings of the 26th International Conference on Software Engineering (ICSE 2004), 2004

EnviroTrack: Towards an Environmental Computing Paradigm for Distributed Sensor Networks.
Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS 2004), 2004

.NET Security: Lessons Learned and Missed from Java.
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004

Secure Aggregation for Wireless Network.
Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT 2003), 27-31 January 2003, 2003

Improving Security Using Extensible Lightweight Static Analysis.
IEEE Software, 2002

A biologically inspired programming model for self-healing systems.
Proceedings of the First Workshop on Self-Healing Systems, 2002

Statically Detecting Likely Buffer Overflow Vulnerabilities.
Proceedings of the 10th USENIX Security Symposium, 2001

Behavior Combination and Swarm Programming.
Proceedings of the RoboCup 2001: Robot Soccer World Cup V, 2001

Policy-directed code safety.
PhD thesis, 2000

Dynamic term selection in learning a query from examples.
Proceedings of the Computer-Assisted Information Retrieval (Recherche d'Information et ses Applications), 2000

Flexible Policy-Directed Code Safety.
Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999

Computer assisted programming for systolic systems.
BIAA, 1996

Static Detection of Dynamic Memory Errors.
Proceedings of the ACM SIGPLAN'96 Conference on Programming Language Design and Implementation (PLDI), 1996

LCLint: A Tool for Using Specifications to Check Code.
Proceedings of the SIGSOFT '94, 1994