Suman Jana
Suman Jana
Assistant Professor of Computer Science, Columbia University
Email verificata su cs.columbia.edu - Home page
Titolo
Citata da
Citata da
Anno
The most dangerous code in the world: validating SSL certificates in non-browser software
M Georgiev, S Iyengar, S Jana, R Anubhai, D Boneh, V Shmatikov
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
4872012
On the effectiveness of secret key extraction from wireless signal strength in real environments
S Jana, SN Premnath, M Clark, SK Kasera, N Patwari, SV Krishnamurthy
Proceedings of the 15th annual international conference on Mobile computing …, 2009
4762009
DeepXplore: Automated Whitebox Testing of Deep Learning Systems
K Pei, Y Cao, J Yang, S Jana
Proceedings of the 26th ACM Symposium on Operating Systems Principles (SOSP …, 2017
4542017
DeepTest: Automated testing of deep-neural-network-driven autonomous cars
Y Tian, K Pei, S Jana, B Ray
40th International Conference on Software Engineering (ICSE), 2018
4512018
High-rate uncorrelated bit extraction for shared secret key generation from channel measurements
N Patwari, J Croft, S Jana, SK Kasera
IEEE Transactions on Mobile Computing 9 (1), 17-30, 2009
3552009
On fast and accurate detection of unauthorized wireless access points using clock skews
S Jana, SK Kasera
Proceedings of the 14th ACM international conference on Mobile computing and …, 2008
3072008
Secret key extraction from wireless signal strength in real environments
SN Premnath, S Jana, J Croft, PL Gowda, M Clark, SK Kasera, N Patwari, ...
IEEE Transactions on mobile Computing 12 (5), 917-930, 2012
2132012
Certified robustness to adversarial examples with differential privacy
M Lecuyer, V Atlidakis, R Geambasu, D Hsu, S Jana
2019 IEEE Symposium on Security and Privacy (SP), 656-672, 2019
1922019
Memento: Learning Secrets from Process Footprints
S Jana, V Shmatikov
IEEE Symposium on Security and Privacy 2012, 2012
1612012
Using Frankencerts for Automated Adversarial Testing of Certificate Validation in SSL/TLS Implementations
C Brubaker, S Jana, B Ray, S Khurshid, V Shmatikov
IEEE Symposium on Security and Privacy 2014, 2014
1362014
Formal Security Analysis of Neural Networks using Symbolic Intervals
S Wang, K Pei, J Whitehouse, J Yang, S Jana
27th USENIX Security Symposium (USENIX Security 18), 2018
1322018
A Scanner Darkly: Protecting User Privacy From Perceptual Applications
S Jana, A Narayanan, V Shmatikov
IEEE Symposium on Security and Privacy 2013, 2013
1232013
Password Managers: Attacks and Defenses
D Silver, S Jana, E Chen, C Jackson, D Boneh
23rd USENIX Security Symposium (USENIX Security '14), 2014
1172014
Efficient formal safety analysis of neural networks
S Wang, K Pei, J Whitehouse, J Yang, S Jana
Advances in Neural Information Processing Systems, 6367-6377, 2018
1132018
Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks
M Georgiev, S Jana, V Shmatikov
Network and Distributed System Security (NDSS) Symposium 2014, 2014
992014
Abusing File Processing in Malware Detectors for Fun and Profit
S Jana, V Shmatikov
IEEE Symposium on Security and Privacy 2012, 2012
922012
Enabling Fine-Grained Permissions for Augmented Reality Applications With Recognizers
S Jana, D Molnar, A Moshchuk, A Dunn, B Livshits, H Wang, E Ofek
22nd USENIX Security Symposium (USENIX Security '13), 2013
872013
SlowFuzz: Automated Domain-Independent Detection of Algorithmic Complexity Vulnerabilities
T Petsios, J Zhao, AD Keromytis, S Jana
Proceedings of the 2017 ACM conference on Computer and communications security, 2017
742017
Eternal sunshine of the spotless machine: Protecting privacy with ephemeral channels
AM Dunn, MZ Lee, S Jana, S Kim, M Silberstein, Y Xu, V Shmatikov, ...
Presented as part of the 10th {USENIX} Symposium on Operating Systems Design …, 2012
712012
Baishakhi Ray, Sarfraz Khurshid, and Vitaly Shmatikov. Using frankencerts for automated adversarial testing of certificate validation in SSL/TLS implementations
C Brubaker, S Jana
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 114-129, 2014
552014
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20