Publications

AutoCrypt: Enabling Homomorphic Computation on Servers To Protect Sensitive Web Content
Shruti Tople, Shweta Shinde, Zhaofeng Chen, and Prateek Saxena
To Appear at the 20th ACM Conference on Computer and Communications Security (CCS 2013)
Protecting Sensitive Web Content from Client-side Vulnerabilities with CRYPTONs
Xinshu Dong, Zhaofeng Chen, Hossein Siadati, Shruti Tople, Prateek Saxena, and Zhenkai Liang
To Appear at the 20th ACM Conference on Computer and Communications Security (CCS 2013)
A Quantitative Evaluation of Privilege Separation in Web Browser Designs
Xinshu Dong, Hong Hu, Prateek Saxena and Zhenkai Liang
In the 18th European Symposium on Research in Computer Security (ESORICS 2013)
Regression Tests to Expose Change Interaction Errors
Marcel Böhme, Bruno C.d.S. Oliveira, Abhik Roychoudhury
ESEC/FSE '13, Joint meeting of ACM SIGSOFT symposium and European conference on Foundations of software engineering, 2013 (ESEC/FSE '13)
AUTHSCAN: Automatic Extraction of Web Authentication Protocols from Implementations
Guangdong Bai, Jike Lei, Guozhu Meng, Sai Sathyanarayan Venkatraman, Prateek Saxena, Jun Sun, Yang Liu, and Jin Song Dong
In Proceedings of 20th Annual Network and Distributed System Security Symposium (NDSS 2013)
Partition-based Regression Verification
Marcel Bohme, Bruno C.d.S. Oliveira, Abhik Roychoudhury
ACM/IEEE International Conference on Software Engineering (ICSE 2013)
Weak Leakage-Resilient Client-side Deduplication of Encrypted Data in Cloud Storage
Jia Xu, Ee-Chien Chang and Jianying Zhou
ACM Symposium on Information, Computer and Communications Security (ASIACCS, 2013)
SemFix: Program Repair via Semantic Analysis
Hoang D.T. Nguyen, Dawei Qi, Abhik Roychoudhury, Satish Chandra
ACM/IEEE International Conference on Software Engineering (ICSE 2013)
Privilege Separation in HTML5 Applications
Devdatta Akhawe, Prateek Saxena, Dawn Song
In Proceedings of Usenix Security Symposium (Usenix Security 2012)
Path Exploration based on Symbolic Output
Dawei Qi, Hoang D.T. Nguyen, Abhik Roychoudhury
ACM Transactions on Software Engineering and Methodology (TOSEM, To appear)
Modeling Software Execution Environment
Dawei Qi, William Sumner, Feng Qin, Mai Zheng, Xiangyu Zhang, Abhik Roychoudhury
19th IEEE Working Conference on Reverse Engineering (WCRE 2012)
DARWIN: An Approach for Debugging Evolving Programs
Dawei Qi, Abhik Roychoudhury, Zhenkai Liang, Kapil Vaswani
ACM Transactions on Software Engineering and Methodology, 21(3), 2012
Quantum to classical randomness extractors
M. Berta, O. Fawzi and S. Wehner
Proceedings of Advances in Cryptology (CRYPTO 2012)
An Empirical Study of Dangerous Behaviors in Firefox Extensions
Jiangang Wang, Xiaohong Li, Xuhui Liu, Xinshu Dong, Junjie Wang, Zhenkai Liang, and Zhiyong Feng
In the 15th Information Security Conference (ISC), Passau, Germany, September 2012 (ISC 2012)
Codejail: Application-transparent Isolation of Libraries with Tight Program Interactions
Yongzheng Wu, Sai Sathyanarayan, Roland Yap, and Zhenkai Liang
In the 17th European Symposium on Research in Computer Security (ESORICS), Pisa, Italy, September 2012 (ESORICS 2012)
Tracking the Trackers: Fast and Scalable Dynamic Analysis of Web Content for Privacy Violations
Minh Tran, Xinshu Dong, Zhenkai Liang, and Xuxian Jiang
In the 10th International Conference on Applied Cryptography and Network Security (ACNS), Singapore, June 2012 (ACNS 2012)
A Framework to Eliminate Backdoors from Response Computable Authentication
Shuaifu Dai, Tao Wei, Chao Zhang, Tielei Wang, Yu Ding, Zhenkai Liang, and Wei Zou
In the IEEE Symposium on Security and Privacy, San Francisco, CA, May 2012.
Identifying and Analyzing Pointer Misuses for Sophisticated Memory-corruption Exploit Diagnosis
Mingwei Zhang, Aravind Prakash, Xiaolei Li, Zhenkai Liang, and Heng Yin
In the 19th Annual Network & Distributed System Security Symposium (NDSS), San Diego, CA, February 2012 (NDSS 2012)
Revisiting link privacy in social networks
Suhendry Effendy, Roland H. C. Yap, Felix Halim
Second ACM Conference on Data and Application Security and Privacy (CODASPY 2012)
Experiments with Malware Visualization
Yongzheng Wu, Roland H. C. Yap
Detection of Intrusions and Malware, and Vulnerability Assessment - 9th International Conference (DIMVA 2012)
Detecting and Preventing ActiveX API-Misuse Vulnerabilities in Internet Explorer
Ting Dai, Sai Sathyanarayan, Roland H. C. Yap, Zhenkai Liang
(ICICS 2012)
CloudProtect: Managing Data Privacy in Cloud Applications
Mamadou H. Diallo, Bijit Hore, Ee-Chien Chang, Sharad Mehrotra and Nalini Venkatasubramanian
(IEEE CLOUD 2012)
Indexing Encrypted Documents for Supporting Efficient Keyword Search
Bijit Hore, Ee-Chien Chang, Mamadou H. Diallo and Sharad Mehrotra
Secure Data Management Workshop (SDM 2012)
Secure Quasi-Realtime Collaborative Editing over Low-Cost Storage Services
Chunwang Zhang, Junjie Jin, Ee-Chien Chang and Sharad Mehrotra
Secure Data Management Workshop (SDM 2012)
Adaptive Differentially Private Histogram of Low-Dimensional Data
Chengfang Fang and Ee-Chien Chang
(PETS 2012)
Towards Efficient Proofs of Retrievability
Jia Xu and Ee-Chien Chang
(ASIACCS 2012)
Identity Leakage Mitigation in Asymmetric Secure Sketches
Chengfang Fang, Qiming Li and Ee-Chien Chang
International Joint Conference on Biometrics (IJCB 2011)
Timing Analysis of a Protected Operating System Kernel
Bernard Blackham, Yao Shi, Sudipta Chattopadhyay, Abhik Roychoudhury and Gernot Heiser
IEEE Real-time Systems Symposium (RTSS 2011)
Enhancing Host Security using External Environment Sensors
E-C. Chang, L. Lu, Y. Wu and R.H.C. Yap
International J. of Information Security, 10(5), 2011
Partial Social Network Disclosure and Crawlers
S. Effendy, F. Halim and R.H.C. Yap
SCA: Intl. Conf. on Social Computing and its Applications (SCA 2011)
Quantifying the Effects of More Timely Certificate Revocation on Lightweight Mobile Devices
Sufatrio and R.H.C. Yap
MetriSec: 3rd Intl. Workshop on Security Measurements and Metrics (MetriSec 2011)
Trusted Principal-Hosted Certificate Revocation
Sufatrio and R.H.C. Yap
IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2011)
Towards a Binary Integrity System for Windows
Y. Wu and R.H. C. Yap
ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011)