Prateek Saxena

According to our database1, Prateek Saxena authored at least 82 papers between 2008 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Randomized View Reconciliation in Permissionless Distributed Systems.
IEEE/ACM Trans. Netw., 2020

Epione: Lightweight Contact Tracing with Strong Privacy.
IEEE Data Eng. Bull., 2020

Elasticlave: An Efficient Memory Model for Enclaves.
CoRR, 2020

Binary Compatibility For SGX Enclaves.
CoRR, 2020

Localizing Patch Points From One Exploit.
CoRR, 2020

Scalable Quantitative Verification For Deep Neural Networks.
CoRR, 2020

BesFS: A POSIX Filesystem for Enclaves with a Mechanized Safety Proof.
Proceedings of the 29th USENIX Security Symposium, 2020

EPIE Dataset: A Corpus for Possible Idiomatic Expressions.
Proceedings of the Text, Speech, and Dialogue, 2020

OHIE: Blockchain Scaling Made Simple.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

2019
PRO-ORAM: Practical Read-Only Oblivious RAM.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

Neuro-Symbolic Execution: Augmenting Symbolic Execution with Neural Constraints.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

One Engine To Serve 'em All: Inferring Taint Rules Without Architectural Semantics.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Exploiting the laws of order in smart contracts.
Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2019

Practical Verifiable In-network Filtering for DDoS Defense.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

Quantitative Verification of Neural Networks and Its Security Applications.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
PRO-ORAM: Constant Latency Read-Only Oblivious RAM.
IACR Cryptol. ePrint Arch., 2018

Neuro-Symbolic Execution: The Feasibility of an Inductive Approach to Symbolic Execution.
CoRR, 2018

BesFS: Mechanized Proof of an Iago-Safe Filesystem for Enclaves.
CoRR, 2018

(Invited Paper) on the Security of Blockchain Consensus Protocols.
Proceedings of the Information Systems Security - 14th International Conference, 2018

Finding The Greedy, Prodigal, and Suicidal Contracts at Scale.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

VeriCount: Verifiable Resource Accounting Using Hardware and Software Isolation.
Proceedings of the Applied Cryptography and Network Security, 2018

2017
Obscuro: A Bitcoin Mixer using Trusted Execution Environments.
IACR Cryptol. ePrint Arch., 2017

PermuteRam: Optimizing Oblivious Computation for Efficiency.
IACR Cryptol. ePrint Arch., 2017

SMART POOL : Practical Decentralized Pooled Mining.
IACR Cryptol. ePrint Arch., 2017

A Traceability Analysis of Monero's Blockchain.
IACR Cryptol. ePrint Arch., 2017

Robust Synchronous P2P Primitives Using SGX Enclaves.
IACR Cryptol. ePrint Arch., 2017

SmartPool: Practical Decentralized Pooled Mining.
Proceedings of the 26th USENIX Security Symposium, 2017

Neural Nets Can Learn Function Type Signatures From Binaries.
Proceedings of the 26th USENIX Security Symposium, 2017

Panoply: Low-TCB Linux Applications With SGX Enclaves.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

On the Trade-Offs in Oblivious Execution Techniques.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017

2016
Anonymity in Peer-assisted CDNs: Inference Attacks and Mitigation.
Proc. Priv. Enhancing Technol., 2016

Making Smart Contracts Smarter.
IACR Cryptol. ePrint Arch., 2016

How to verify computation with a rational network.
CoRR, 2016

OblivP2P: An Oblivious Peer-to-Peer Content Sharing System.
Proceedings of the 25th USENIX Security Symposium, 2016

Data-Oriented Programming: On the Expressiveness of Non-control Data Attacks.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

When Cryptocurrencies Mine Their Own Business.
Proceedings of the Financial Cryptography and Data Security, 2016

On Scaling Decentralized Blockchains - (A Position Paper).
Proceedings of the Financial Cryptography and Data Security, 2016

Preventing Page Faults from Telling Your Secrets.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

A Secure Sharding Protocol For Open Blockchains.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

"The Web/Local" Boundary Is Fuzzy: A Security Study of Chrome's Process-based Sandboxing.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Auror: defending against poisoning attacks in collaborative deep learning systems.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
I Know Where You've Been: Geo-Inference Attacks via the Browser Cache.
IEEE Internet Comput., 2015

Demystifying incentives in the consensus computer.
IACR Cryptol. ePrint Arch., 2015

On Power Splitting Games in Distributed Computation: The Case of Bitcoin Pooled Mining.
IACR Cryptol. ePrint Arch., 2015

Preventing Your Faults From Telling Your Secrets: Defenses Against Pigeonhole Attacks.
CoRR, 2015

Man-in-the-browser-cache: Persisting HTTPS attacks via browser cache poisoning.
Comput. Secur., 2015

Automatic Generation of Data-Oriented Exploits.
Proceedings of the 24th USENIX Security Symposium, 2015

M2R: Enabling Stronger Privacy in MapReduce Computation.
Proceedings of the 24th USENIX Security Symposium, 2015

DexterJS: robust testing platform for DOM-based XSS vulnerabilities.
Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, 2015

Auto-patching DOM-based XSS at scale.
Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, 2015

AutoCSP: Automatically Retrofitting CSP to Web Applications.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

Identifying Arbitrary Memory Access Vulnerabilities in Privilege-Separated Software.
Proceedings of the Computer Security - ESORICS 2015, 2015

Web-to-Application Injection Attacks on Android: Characterization and Detection.
Proceedings of the Computer Security - ESORICS 2015, 2015

The SICILIAN Defense: Signature-based Whitelisting of Web JavaScript.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Faster Secure Arithmetic Computation Using Switchable Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2014

A Look at Targeted Attacks Through the Lense of an NGO.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

You Can't Be Me: Enabling Trusted Paths and User Sub-origins in Web Browsers.
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014

A model counter for constraints over unbounded strings.
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, 2014

DroidVault: A Trusted Data Vault for Android Devices.
Proceedings of the 2014 19th International Conference on Engineering of Complex Computer Systems, 2014

2013
Comparative analysis of speech enhancement methods.
Proceedings of the Tenth International Conference on Wireless and Optical Communications Networks, 2013

Hardware-software Scalable Architectures for Gaussian Elimination over GF(2) and Higher Galois Fields.
Proceedings of the PECCS 2013, 2013

AUTHSCAN: Automatic Extraction of Web Authentication Protocols from Implementations.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

A Quantitative Evaluation of Privilege Separation in Web Browser Designs.
Proceedings of the Computer Security - ESORICS 2013, 2013

Data-Confined HTML5 Applications.
Proceedings of the Computer Security - ESORICS 2013, 2013

AUTOCRYPT: enabling homomorphic computation on servers to protect sensitive web content.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

The curse of 140 characters: evaluating the efficacy of SMS spam detection on android.
Proceedings of the SPSM'13, 2013

Protecting sensitive web content from client-side vulnerabilities with CRYPTONS.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

CRYPTSERVER: strong data protection in commodity LAMP servers.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Systematic Techniques for Finding and Preventing Script Injection Vulnerabilities.
PhD thesis, 2012

Privilege Separation in HTML5 Applications.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

2011
Fast and Precise Sanitizer Analysis with BEK.
Proceedings of the 20th USENIX Security Symposium, 2011

A Systematic Analysis of XSS Sanitization in Web Application Frameworks.
Proceedings of the Computer Security - ESORICS 2011, 2011

SCRIPTGARD: automatic context-sensitive sanitization for large-scale legacy web applications.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Context-sensitive auto-sanitization in web templating languages using type qualifiers.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
A Symbolic Execution Framework for JavaScript.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

FLAX: Systematic Discovery of Client-side Validation Vulnerabilities in Rich Web Applications.
Proceedings of the Network and Distributed System Security Symposium, 2010

Protecting Browsers from Extension Vulnerabilities.
Proceedings of the Network and Distributed System Security Symposium, 2010

2009
Document Structure Integrity: A Robust Basis for Cross-site Scripting Defense.
Proceedings of the Network and Distributed System Security Symposium, 2009

Loop-extended symbolic execution on binary programs.
Proceedings of the Eighteenth International Symposium on Software Testing and Analysis, 2009

2008
BitBlaze: A New Approach to Computer Security via Binary Analysis.
Proceedings of the Information Systems Security, 4th International Conference, 2008

On the Limits of Information Flow Techniques for Malware Analysis and Containment.
Proceedings of the Detection of Intrusions and Malware, 2008

Efficient fine-grained binary instrumentationwith applications to taint-tracking.
Proceedings of the Sixth International Symposium on Code Generation and Optimization (CGO 2008), 2008


  Loading...