Homomorphic signature schemes R Johnson, D Molnar, D Song, D Wagner Topics in Cryptology - CT-RSA 2002, 204-245, 2002 | 619 | 2002 |
Touching from a distance: Website fingerprinting attacks and defenses X Cai, XC Zhang, B Joshi, R Johnson Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 530 | 2012 |
Effective attacks and provable defenses for website fingerprinting T Wang, X Cai, R Nithyanand, R Johnson, I Goldberg 23rd USENIX Security Symposium (USENIX Security 14), 143-157, 2014 | 525 | 2014 |
A systematic approach to developing and evaluating website fingerprinting defenses X Cai, R Nithyanand, T Wang, R Johnson, I Goldberg Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 300 | 2014 |
Don't Thrash: How to Cache your Hash on Flash MA Bender, M Farach-Colton, R Johnson, BC Kuszmaul, D Medjedovic, ... Proceedings of the 3rd USENIX conference on Hot topics in storage and file …, 2011 | 281 | 2011 |
Cs-buflo: A congestion sensitive website fingerprinting defense X Cai, R Nithyanand, R Johnson Proceedings of the 13th Workshop on Privacy in the Electronic Society, 121-130, 2014 | 228 | 2014 |
Finding user/kernel pointer bugs with type inference. R Johnson, D Wagner USENIX Security Symposium 2 (0), 0, 2004 | 197 | 2004 |
A general-purpose counting filter: Making every bit count P Pandey, MA Bender, R Johnson, R Patro Proceedings of the 2017 ACM international conference on Management of Data …, 2017 | 189 | 2017 |
{BetrFS}: A {Right-Optimized}{Write-Optimized} file system W Jannen, J Yuan, Y Zhan, A Akshintala, J Esmet, Y Jiao, A Mittal, ... 13th USENIX Conference on File and Storage Technologies (FAST 15), 301-315, 2015 | 160 | 2015 |
RICH: Automatically protecting against integer-based vulnerabilities D Brumley, T Chiueh, R Johnson, H Lin, D Song Network and Distributed Systems Security (NDSS), 2007 | 157 | 2007 |
A practical mimicry attack against powerful system-call monitors C Parampalli, R Sekar, R Johnson Proceedings of the 2008 ACM symposium on Information, computer and …, 2008 | 143 | 2008 |
Text classification for data loss prevention M Hart, P Manadhata, R Johnson International Symposium on Privacy Enhancing Technologies Symposium, 18-37, 2011 | 129 | 2011 |
More content-less control: Access control in the web 2.0 M Hart, R Johnson, A Stent IEEE Web 2.0 Security and Privacy Workshop 2, 2007 | 121 | 2007 |
Glove: A bespoke website fingerprinting defense R Nithyanand, X Cai, R Johnson Proceedings of the 13th Workshop on Privacy in the Electronic Society, 131-134, 2014 | 116 | 2014 |
Mantis: a fast, small, and exact large-scale sequence-search index P Pandey, F Almodaresi, MA Bender, M Ferdman, R Johnson, R Patro Cell systems 7 (2), 201-207. e4, 2018 | 115 | 2018 |
Squeakr: an exact and approximate k-mer counting system P Pandey, MA Bender, R Johnson, R Patro Bioinformatics 34 (4), 568-575, 2018 | 103 | 2018 |
Exploiting unix file-system races via algorithmic complexity attacks X Cai, Y Gui, R Johnson 2009 30th IEEE symposium on security and privacy, 27-41, 2009 | 87 | 2009 |
Flow-Insensitive Type Qualifiers JS Foster, R Johnson, J Kodumal, A Aiken Transactions on Programming Languages, 2008 | 87 | 2008 |
File systems fated for senescence? nonsense, says science! A Conway, A Bakshi, Y Jiao, W Jannen, Y Zhan, J Yuan, MA Bender, ... 15th USENIX Conference on File and Storage Technologies (FAST 17), 45-58, 2017 | 82 | 2017 |
Multiplicative differentials N Borisov, M Chew, R Johnson, D Wagner Fast Software Encryption: 9th International Workshop, FSE 2002 Leuven …, 2002 | 76 | 2002 |