What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Helen J. Wang
Google Scholar
18
publications in security and cryptology related venues
Year
Venue
Title
2015
conf/sp
SurroundWeb: Mitigating Privacy Concerns in a 3D Web Browser.
John Vilk
David Molnar
Benjamin Livshits
Eyal Ofek
Christopher J. Rossbach
Alexander Moshchuk
Helen J. Wang
Ran Gal
2014
conf/ccs
World-Driven Access Control for Continuous Sensing.
Franziska Roesner
David Molnar
Alexander Moshchuk
Tadayoshi Kohno
Helen J. Wang
2013
conf/ccs
Content-based isolation: rethinking isolation policy design on client systems.
Alexander Moshchuk
Helen J. Wang
Yunxin Liu
2013
conf/uss
Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers.
Suman Jana
David Molnar
Alexander Moshchuk
Alan M. Dunn
Benjamin Livshits
Helen J. Wang
Eyal Ofek
2012
conf/uss
Clickjacking: Attacks and Defenses.
Lin-Shung Huang
Alexander Moshchuk
Helen J. Wang
Stuart Schecter
Collin Jackson
2012
conf/sp
User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems.
Franziska Roesner
Tadayoshi Kohno
Alexander Moshchuk
Bryan Parno
Helen J. Wang
Crispin Cowan
2012
conf/esorics
Scalable Telemetry Classification for Automated Malware Detection.
Jack W. Stokes
John C. Platt
Helen J. Wang
Joe Faulhaber
Jonathan Keller
Mady Marinescu
Anil Thomas
Marius Gheorghescu
2011
conf/uss
Permission Re-Delegation: Attacks and Defenses.
Adrienne Porter Felt
Helen J. Wang
Alexander Moshchuk
Steve Hanna
Erika Chin
2010
conf/sp
On the Incoherencies in Web Browser Access Control Policies.
Kapil Singh
Alexander Moshchuk
Helen J. Wang
Wenke Lee
2009
conf/uss
The Multi-Principal OS Construction of the Gazelle Web Browser.
Helen J. Wang
Chris Grier
Alexander Moshchuk
Samuel T. King
Piali Choudhury
Herman Venter
2008
conf/ccs
Tupni: automatic reverse engineering of input formats.
Weidong Cui
Marcus Peinado
Karl Chen
Helen J. Wang
Luis Irún-Briz
2007
conf/uss
Discoverer: Automatic Protocol Reverse Engineering from Network Traces.
Weidong Cui
Jayanthkumar Kannan
Helen J. Wang
2007
conf/sp
ShieldGen: Automatic Data Patch Generation for Unknown Vulnerabilities with Informed Probing.
Weidong Cui
Marcus Peinado
Helen J. Wang
Michael E. Locasto
2007
conf/sp
A Systematic Approach to Uncover Security Flaws in GUI Logic.
José Meseguer
Ralf Sasse
Helen J. Wang
Yi-Min Wang
2007
conf/ndss
Generic Application-Level Protocol Analyzer and its Language.
Nikita Borisov
David Brumley
Helen J. Wang
John Dunagan
Pallavi Joshi
Chuanxiong Guo
2006
conf/sp
SubVirt: Implementing malware with virtual machines.
Samuel T. King
Peter M. Chen
Yi-Min Wang
Chad Verbowski
Helen J. Wang
Jacob R. Lorch
2005
conf/ccs
Applications of secure electronic voting to automated privacy-preserving troubleshooting.
Qiang Huang
David Jao
Helen J. Wang
2005
conf/ndss
Privacy-Preserving Friends Troubleshooting Network.
Qiang Huang
Helen J. Wang
Nikita Borisov
Coauthors
Adrienne Porter Felt
(1)
Alan M. Dunn
(1)
Alexander Moshchuk
(9)
Anil Thomas
(1)
Benjamin Livshits
(2)
Bryan Parno
(1)
Chad Verbowski
(1)
Chris Grier
(1)
Christopher J. Rossbach
(1)
Chuanxiong Guo
(1)
Collin Jackson
(1)
Crispin Cowan
(1)
David Brumley
(1)
David Jao
(1)
David Molnar
(3)
Erika Chin
(1)
Eyal Ofek
(2)
Franziska Roesner
(2)
Helen J. Wang
(18)
Herman Venter
(1)
Jack W. Stokes
(1)
Jacob R. Lorch
(1)
Jayanthkumar Kannan
(1)
Joe Faulhaber
(1)
John C. Platt
(1)
John Dunagan
(1)
John Vilk
(1)
Jonathan Keller
(1)
José Meseguer
(1)
Kapil Singh
(1)
Karl Chen
(1)
Lin-Shung Huang
(1)
Luis Irún-Briz
(1)
Mady Marinescu
(1)
Marcus Peinado
(2)
Marius Gheorghescu
(1)
Michael E. Locasto
(1)
Nikita Borisov
(2)
Pallavi Joshi
(1)
Peter M. Chen
(1)
Piali Choudhury
(1)
Qiang Huang
(2)
Ralf Sasse
(1)
Ran Gal
(1)
Samuel T. King
(2)
Steve Hanna
(1)
Stuart Schecter
(1)
Suman Jana
(1)
Tadayoshi Kohno
(2)
Weidong Cui
(3)
Wenke Lee
(1)
Yi-Min Wang
(2)
Yunxin Liu
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to