What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Prateek Saxena
Google Scholar
60
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/ndss
Translating C To Rust: Lessons from a User Study.
Ruishi Li
Bo Wang
Tianyu Li
Prateek Saxena
Ashish Kundu
2024
conf/sp
Attacking Byzantine Robust Aggregation in High Dimensions.
Sarthak Choudhary
Aashish Kolluri
Prateek Saxena
2023
conf/ccs
Unforgeability in Stochastic Gradient Descent.
Teodora Baluta
Ivica Nikolic
Racchit Jain
Divesh Aggarwal
Prateek Saxena
2023
conf/uss
Capstone: A Capability-based Foundation for Trustless Secure Memory Access.
Jason Zhijingcheng Yu
Conrad Watt
Aditya Badole
Trevor E. Carlson
Prateek Saxena
2022
conf/ccs
LPGNet: Link Private Graph Networks for Node Classification.
Aashish Kolluri
Teodora Baluta
Bryan Hooi
Prateek Saxena
2022
conf/ccs
Membership Inference Attacks and Generalization: A Causal Perspective.
Teodora Baluta
Shiqi Shen
S. Hitarth
Shruti Tople
Prateek Saxena
2022
conf/uss
Elasticlave: An Efficient Memory Model for Enclaves.
Jason Zhijingcheng Yu
Shweta Shinde
Trevor E. Carlson
Prateek Saxena
2022
conf/uss
FlowMatrix: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation.
Kaihang Ji
Jun Zeng
Yuancheng Jiang
Zhenkai Liang
Zheng Leong Chua
Prateek Saxena
Abhik Roychoudhury
2022
conf/sp
Using Throughput-Centric Byzantine Broadcast to Tolerate Malicious Majority in Blockchains.
Ruomu Hou
Haifeng Yu
Prateek Saxena
2021
conf/ccs
Private Hierarchical Clustering in Federated Networks.
Aashish Kolluri
Teodora Baluta
Prateek Saxena
2021
conf/ccs
SmashEx: Smashing SGX Enclaves Using Exceptions.
Jinhua Cui
Jason Zhijingcheng Yu
Shweta Shinde
Prateek Saxena
Zhiping Cai
2021
conf/asiaccs
Localizing Vulnerabilities Statistically From One Exploit.
Shiqi Shen
Aashish Kolluri
Zhen Dong
Prateek Saxena
Abhik Roychoudhury
2020
conf/uss
BesFS: A POSIX Filesystem for Enclaves with a Mechanized Safety Proof.
Shweta Shinde
Shengyi Wang
Pinghai Yuan
Aquinas Hobor
Abhik Roychoudhury
Prateek Saxena
2020
conf/sp
OHIE: Blockchain Scaling Made Simple.
Haifeng Yu
Ivica Nikolic
Ruomu Hou
Prateek Saxena
2019
conf/ccs
Quantitative Verification of Neural Networks and Its Security Applications.
Teodora Baluta
Shiqi Shen
Shweta Shinde
Kuldeep S. Meel
Prateek Saxena
2019
conf/ndss
Neuro-Symbolic Execution: Augmenting Symbolic Execution with Neural Constraints.
Shiqi Shen
Shweta Shinde
Soundarya Ramesh
Abhik Roychoudhury
Prateek Saxena
2019
conf/ndss
One Engine To Serve 'em All: Inferring Taint Rules Without Architectural Semantics.
Zheng Leong Chua
Yanhao Wang
Teodora Baluta
Prateek Saxena
Zhenkai Liang
Purui Su
2018
conf/acns
VeriCount: Verifiable Resource Accounting Using Hardware and Software Isolation.
Shruti Tople
Soyeon Park
Min Suk Kang
Prateek Saxena
2018
conf/iciss
(Invited Paper) on the Security of Blockchain Consensus Protocols.
Sourav Das
Aashish Kolluri
Prateek Saxena
Haifeng Yu
2018
conf/acsac
Finding The Greedy, Prodigal, and Suicidal Contracts at Scale.
Ivica Nikolic
Aashish Kolluri
Ilya Sergey
Prateek Saxena
Aquinas Hobor
2018
conf/acsac
Obscuro: A Bitcoin Mixer using Trusted Execution Environments.
Muoi Tran
Loi Luu
Min Suk Kang
Iddo Bentov
Prateek Saxena
2017
conf/uss
SmartPool: Practical Decentralized Pooled Mining.
Loi Luu
Yaron Velner
Jason Teutsch
Prateek Saxena
2017
conf/uss
Neural Nets Can Learn Function Type Signatures From Binaries.
Zheng Leong Chua
Shiqi Shen
Prateek Saxena
Zhenkai Liang
2017
conf/esorics
A Traceability Analysis of Monero's Blockchain.
Amrit Kumar
Clément Fischer
Shruti Tople
Prateek Saxena
2017
conf/ndss
Panoply: Low-TCB Linux Applications With SGX Enclaves.
Shweta Shinde
Dat Le Tien
Shruti Tople
Prateek Saxena
2016
journals/popets
Anonymity in Peer-assisted CDNs: Inference Attacks and Mitigation.
Yaoqi Jia
Guangdong Bai
Prateek Saxena
Zhenkai Liang
2016
conf/ccs
"The Web/Local" Boundary Is Fuzzy: A Security Study of Chrome's Process-based Sandboxing.
Yaoqi Jia
Zheng Leong Chua
Hong Hu
Shuo Chen
Prateek Saxena
Zhenkai Liang
2016
conf/ccs
Making Smart Contracts Smarter.
Loi Luu
Duc-Hiep Chu
Hrishi Olickel
Prateek Saxena
Aquinas Hobor
2016
conf/ccs
Preventing Page Faults from Telling Your Secrets.
Shweta Shinde
Zheng Leong Chua
Viswesh Narayanan
Prateek Saxena
2016
conf/ccs
A Secure Sharding Protocol For Open Blockchains.
Loi Luu
Viswesh Narayanan
Chaodong Zheng
Kunal Baweja
Seth Gilbert
Prateek Saxena
2016
conf/uss
OblivP2P: An Oblivious Peer-to-Peer Content Sharing System.
Yaoqi Jia
Tarik Moataz
Shruti Tople
Prateek Saxena
2016
conf/fc
On Scaling Decentralized Blockchains - (A Position Paper).
Kyle Croman
Christian Decker
Ittay Eyal
Adem Efe Gencer
Ari Juels
Ahmed E. Kosba
Andrew Miller
Prateek Saxena
Elaine Shi
Emin Gün Sirer
Dawn Song
Roger Wattenhofer
2016
conf/fc
When Cryptocurrencies Mine Their Own Business.
Jason Teutsch
Sanjay Jain
Prateek Saxena
2016
conf/sp
Data-Oriented Programming: On the Expressiveness of Non-control Data Attacks.
Hong Hu
Shweta Shinde
Sendroiu Adrian
Zheng Leong Chua
Prateek Saxena
Zhenkai Liang
2016
conf/acsac
Auror: defending against poisoning attacks in collaborative deep learning systems.
Shiqi Shen
Shruti Tople
Prateek Saxena
2015
journals/compsec
Man-in-the-browser-cache: Persisting HTTPS attacks via browser cache poisoning.
Yaoqi Jia
Yue Chen
Xinshu Dong
Prateek Saxena
Jian Mao
Zhenkai Liang
2015
conf/ccs
The SICILIAN Defense: Signature-based Whitelisting of Web JavaScript.
Pratik Soni
Enrico Budianto
Prateek Saxena
2015
conf/ccs
Demystifying Incentives in the Consensus Computer.
Loi Luu
Jason Teutsch
Raghav Kulkarni
Prateek Saxena
2015
conf/uss
M2R: Enabling Stronger Privacy in MapReduce Computation.
Tien Tuan Anh Dinh
Prateek Saxena
Ee-Chien Chang
Beng Chin Ooi
Chunwang Zhang
2015
conf/uss
Automatic Generation of Data-Oriented Exploits.
Hong Hu
Zheng Leong Chua
Sendroiu Adrian
Prateek Saxena
Zhenkai Liang
2015
conf/esorics
Identifying Arbitrary Memory Access Vulnerabilities in Privilege-Separated Software.
Hong Hu
Zheng Leong Chua
Zhenkai Liang
Prateek Saxena
2015
conf/esorics
Web-to-Application Injection Attacks on Android: Characterization and Detection.
Behnaz Hassanshahi
Yaoqi Jia
Roland H. C. Yap
Prateek Saxena
Zhenkai Liang
2014
conf/uss
A Look at Targeted Attacks Through the Lense of an NGO.
Stevens Le Blond
Adina Uritesc
Cédric Gilbert
Zheng Leong Chua
Prateek Saxena
Engin Kirda
2013
conf/ccs
Protecting sensitive web content from client-side vulnerabilities with CRYPTONS.
Xinshu Dong
Zhaofeng Chen
Hossein Siadati
Shruti Tople
Prateek Saxena
Zhenkai Liang
2013
conf/ccs
The curse of 140 characters: evaluating the efficacy of SMS spam detection on android.
Akshay Narayan
Prateek Saxena
2013
conf/ccs
CRYPTSERVER: strong data protection in commodity LAMP servers.
Zhaofeng Chen
Xinshu Dong
Prateek Saxena
Zhenkai Liang
2013
conf/ccs
AUTOCRYPT: enabling homomorphic computation on servers to protect sensitive web content.
Shruti Tople
Shweta Shinde
Zhaofeng Chen
Prateek Saxena
2013
conf/esorics
Data-Confined HTML5 Applications.
Devdatta Akhawe
Frank Li
Warren He
Prateek Saxena
Dawn Song
2013
conf/esorics
A Quantitative Evaluation of Privilege Separation in Web Browser Designs.
Xinshu Dong
Hong Hu
Prateek Saxena
Zhenkai Liang
2013
conf/ndss
AUTHSCAN: Automatic Extraction of Web Authentication Protocols from Implementations.
Guangdong Bai
Jike Lei
Guozhu Meng
Sai Sathyanarayan Venkatraman
Prateek Saxena
Jun Sun
Yang Liu
Jin Song Dong
2012
conf/uss
Privilege Separation in HTML5 Applications.
Devdatta Akhawe
Prateek Saxena
Dawn Song
2011
conf/ccs
SCRIPTGARD: automatic context-sensitive sanitization for large-scale legacy web applications.
Prateek Saxena
David Molnar
Benjamin Livshits
2011
conf/ccs
Context-sensitive auto-sanitization in web templating languages using type qualifiers.
Mike Samuel
Prateek Saxena
Dawn Song
2011
conf/uss
Fast and Precise Sanitizer Analysis with BEK.
Pieter Hooimeijer
Benjamin Livshits
David Molnar
Prateek Saxena
Margus Veanes
2011
conf/esorics
A Systematic Analysis of XSS Sanitization in Web Application Frameworks.
Joel Weinberger
Prateek Saxena
Devdatta Akhawe
Matthew Finifter
Eui Chul Richard Shin
Dawn Song
2010
conf/sp
A Symbolic Execution Framework for JavaScript.
Prateek Saxena
Devdatta Akhawe
Steve Hanna
Feng Mao
Stephen McCamant
Dawn Song
2010
conf/ndss
FLAX: Systematic Discovery of Client-side Validation Vulnerabilities in Rich Web Applications.
Prateek Saxena
Steve Hanna
Pongsin Poosankam
Dawn Song
2010
conf/ndss
Protecting Browsers from Extension Vulnerabilities.
Adam Barth
Adrienne Porter Felt
Prateek Saxena
Aaron Boodman
2009
conf/ndss
Document Structure Integrity: A Robust Basis for Cross-site Scripting Defense.
Yacin Nadji
Prateek Saxena
Dawn Song
2008
conf/iciss
BitBlaze: A New Approach to Computer Security via Binary Analysis.
Dawn Xiaodong Song
David Brumley
Heng Yin
Juan Caballero
Ivan Jager
Min Gyung Kang
Zhenkai Liang
James Newsome
Pongsin Poosankam
Prateek Saxena
Coauthors
Aaron Boodman
(1)
Aashish Kolluri
(6)
Abhik Roychoudhury
(4)
Adam Barth
(1)
Adem Efe Gencer
(1)
Adina Uritesc
(1)
Aditya Badole
(1)
Adrienne Porter Felt
(1)
Ahmed E. Kosba
(1)
Akshay Narayan
(1)
Amrit Kumar
(1)
Andrew Miller
(1)
Aquinas Hobor
(3)
Ari Juels
(1)
Ashish Kundu
(1)
Behnaz Hassanshahi
(1)
Beng Chin Ooi
(1)
Benjamin Livshits
(2)
Bo Wang
(1)
Bryan Hooi
(1)
Cédric Gilbert
(1)
Chaodong Zheng
(1)
Christian Decker
(1)
Chunwang Zhang
(1)
Clément Fischer
(1)
Conrad Watt
(1)
Dat Le Tien
(1)
David Brumley
(1)
David Molnar
(2)
Dawn Song
(8)
Dawn Xiaodong Song
(1)
Devdatta Akhawe
(4)
Divesh Aggarwal
(1)
Duc-Hiep Chu
(1)
Ee-Chien Chang
(1)
Elaine Shi
(1)
Emin Gün Sirer
(1)
Engin Kirda
(1)
Enrico Budianto
(1)
Eui Chul Richard Shin
(1)
Feng Mao
(1)
Frank Li
(1)
Guangdong Bai
(2)
Guozhu Meng
(1)
Haifeng Yu
(3)
Heng Yin
(1)
Hong Hu
(5)
Hossein Siadati
(1)
Hrishi Olickel
(1)
Iddo Bentov
(1)
Ilya Sergey
(1)
Ittay Eyal
(1)
Ivan Jager
(1)
Ivica Nikolic
(3)
James Newsome
(1)
Jason Teutsch
(3)
Jason Zhijingcheng Yu
(3)
Jian Mao
(1)
Jike Lei
(1)
Jin Song Dong
(1)
Jinhua Cui
(1)
Joel Weinberger
(1)
Juan Caballero
(1)
Jun Sun
(1)
Jun Zeng
(1)
Kaihang Ji
(1)
Kuldeep S. Meel
(1)
Kunal Baweja
(1)
Kyle Croman
(1)
Loi Luu
(5)
Margus Veanes
(1)
Matthew Finifter
(1)
Mike Samuel
(1)
Min Gyung Kang
(1)
Min Suk Kang
(2)
Muoi Tran
(1)
Pieter Hooimeijer
(1)
Pinghai Yuan
(1)
Pongsin Poosankam
(2)
Prateek Saxena
(60)
Pratik Soni
(1)
Purui Su
(1)
Racchit Jain
(1)
Raghav Kulkarni
(1)
Roger Wattenhofer
(1)
Roland H. C. Yap
(1)
Ruishi Li
(1)
Ruomu Hou
(2)
S. Hitarth
(1)
Sai Sathyanarayan Venkatraman
(1)
Sanjay Jain
(1)
Sarthak Choudhary
(1)
Sendroiu Adrian
(2)
Seth Gilbert
(1)
Shengyi Wang
(1)
Shiqi Shen
(6)
Shruti Tople
(8)
Shuo Chen
(1)
Shweta Shinde
(9)
Soundarya Ramesh
(1)
Sourav Das
(1)
Soyeon Park
(1)
Stephen McCamant
(1)
Steve Hanna
(2)
Stevens Le Blond
(1)
Tarik Moataz
(1)
Teodora Baluta
(6)
Tianyu Li
(1)
Tien Tuan Anh Dinh
(1)
Trevor E. Carlson
(2)
Viswesh Narayanan
(2)
Warren He
(1)
Xinshu Dong
(4)
Yacin Nadji
(1)
Yang Liu
(1)
Yanhao Wang
(1)
Yaoqi Jia
(5)
Yaron Velner
(1)
Yuancheng Jiang
(1)
Yue Chen
(1)
Zhaofeng Chen
(3)
Zhen Dong
(1)
Zheng Leong Chua
(9)
Zhenkai Liang
(14)
Zhiping Cai
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to