David Molnar
David Molnar
Affiliazione sconosciuta
Email verificata su microsoft.com
TitoloCitata daAnno
Automated Whitebox Fuzz Testing.
P Godefroid, MY Levin, DA Molnar
NDSS 8, 151-166, 2008
11952008
Privacy and security in library RFID: Issues, practices, and architectures
D Molnar, D Wagner
Proceedings of the 11th ACM conference on Computer and communications …, 2004
9892004
The free haven project: Distributed anonymous storage service
R Dingledine, MJ Freedman, D Molnar
Designing Privacy Enhancing Technologies, 67-95, 2001
5762001
SAGE: whitebox fuzzing for security testing
P Godefroid, MY Levin, D Molnar
Communications of the ACM 55 (3), 40-44, 2012
5192012
Homomorphic signature schemes
R Johnson, D Molnar, D Song, D Wagner
Cryptographers’ Track at the RSA Conference, 244-262, 2002
4722002
Security and Privacy Issues in E-passports
A Juels, D Molnar, D Wagner
First International Conference on Security and Privacy for Emerging Areas in …, 2005
4232005
A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags
D Molnar, A Soppera, D Wagner
International workshop on selected areas in cryptography, 276-290, 2005
3672005
Enabling Security in Cloud Storage SLAs with CloudProof.
RA Popa, JR Lorch, D Molnar, HJ Wang, L Zhuang
USENIX Annual Technical Conference 242, 355-368, 2011
2862011
Short chosen-prefix collisions for MD5 and the creation of a rogue CA certificate
M Stevens, A Sotirov, J Appelbaum, A Lenstra, D Molnar, DA Osvik, ...
Annual International Cryptology Conference, 55-69, 2009
2382009
Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs.
D Molnar, XC Li, DA Wagner
USENIX Security Symposium 9, 67-82, 2009
2242009
Active property checking
P Godefroid, MY Levin, D Molnar
US Patent 8,549,486, 2013
1862013
The program counter security model: Automatic detection and removal of control-flow side channel attacks
D Molnar, M Piotrowski, D Schultz, D Wagner
International Conference on Information Security and Cryptology, 156-168, 2005
1672005
Fast and Precise Sanitizer Analysis with BEK.
P Hooimeijer, B Livshits, D Molnar, P Saxena, M Veanes
USENIX Security Symposium 58, 2011
1562011
Billions and billions of constraints: Whitebox fuzz testing in production
E Bounimova, P Godefroid, D Molnar
Proceedings of the 2013 International Conference on Software Engineering …, 2013
1442013
MD5 considered harmful today, creating a rogue CA certificate
A Sotirov, M Stevens, J Appelbaum, AK Lenstra, D Molnar, DA Osvik, ...
25th Annual Chaos Communication Congress, 2008
1342008
Security and privacy for augmented reality systems.
F Roesner, T Kohno, D Molnar
Commun. ACM 57 (4), 88-96, 2014
1292014
Symbolic finite state transducers: Algorithms and applications
M Veanes, P Hooimeijer, B Livshits, D Molnar, N Bjorner
ACM SIGPLAN Notices 47 (1), 137-150, 2012
1282012
SCRIPTGARD: automatic context-sensitive sanitization for large-scale legacy web applications
P Saxena, D Molnar, B Livshits
Proceedings of the 18th ACM conference on Computer and communications …, 2011
1262011
A reputation system to increase MIX-net reliability
R Dingledine, MJ Freedman, D Hopwood, D Molnar
International Workshop on Information Hiding, 126-141, 2001
1122001
Why we can't be bothered to read privacy policies models of privacy economics as a lemons market
T Vila, R Greenstadt, D Molnar
Proceedings of the 5th international conference on Electronic commerce, 403-407, 2003
902003
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20