Sotabase
Home
Researchers
Career
·
Professor
,
University of California, Berkeley
Publications
(229)
Towards Evaluating the Robustness of Neural Networks
IEEE Symposium on Security and Privacy · 2016
9,490
cited
Practical techniques for searches on encrypted data
Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000 · 2000
4,045
cited
Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples
International Conference on Machine Learning · 2018
3,393
cited
Adversarial Examples Are Not Easily Detected: Bypassing Ten Detection Methods
AISec@CCS · 2017
1,948
cited
TinySec: a link layer security architecture for wireless sensor networks
ACM International Conference on Embedded Networked Sensor Systems · 2004
1,896
cited
Android permissions demystified
Conference on Computer and Communications Security · 2011
1,545
cited
Android permissions: user attention, comprehension, and behavior
Symposium On Usable Privacy and Security · 2012
1,199
cited
Audio Adversarial Examples: Targeted Attacks on Speech-to-Text
2018 IEEE Security and Privacy Workshops (SPW) · 2018
1,150
cited
Intercepting mobile communications: the insecurity of 802.11
ACM/IEEE International Conference on Mobile Computing and Networking · 2001
1,139
cited
Private Circuits: Securing Hardware against Probing Attacks
Annual International Cryptology Conference · 2003
1,125
cited
Analyzing inter-application communication in Android
ACM SIGMOBILE International Conference on Mobile Systems, Applications, and Services · 2011
930
cited
A survey of mobile malware in the wild
Security and Privacy in Smartphones and Mobile Devices · 2011
878
cited
Time-lock Puzzles and Timed-release Crypto
1996
853
cited
Mimicry attacks on host-based intrusion detection systems
Conference on Computer and Communications Security · 2002
817
cited
Intrusion detection via static analysis
Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001 · 2001
789
cited
Privacy and security in library RFID: issues, practices, and architectures
Conference on Computer and Communications Security · 2004
785
cited
A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities
Network and Distributed System Security Symposium · 2000
733
cited
The Boomerang Attack
Fast Software Encryption Workshop · 1999
696
cited
A Generalized Birthday Problem
Annual International Cryptology Conference · 2002
689
cited
Timing Analysis of Keystrokes and Timing Attacks on SSH
USENIX Security Symposium · 2001
611
cited
Show all 229 papers →
Sotabase