Making smart contracts smarter L Luu, DH Chu, H Olickel, P Saxena, A Hobor Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016 | 2436 | 2016 |
On Scaling Decentralized Blockchains: (A Position Paper) K Croman, C Decker, I Eyal, AE Gencer, A Juels, A Kosba, A Miller, ... International conference on financial cryptography and data security, 106-125, 2016 | 1625 | 2016 |
A secure sharding protocol for open blockchains L Luu, V Narayanan, C Zheng, K Baweja, S Gilbert, P Saxena Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016 | 1605 | 2016 |
BitBlaze: A new approach to computer security via binary analysis D Song, D Brumley, H Yin, J Caballero, I Jager, MG Kang, Z Liang, ... Information Systems Security: 4th International Conference, ICISS 2008 …, 2008 | 1079 | 2008 |
Finding the greedy, prodigal, and suicidal contracts at scale I Nikolić, A Kolluri, I Sergey, P Saxena, A Hobor Proceedings of the 34th annual computer security applications conference …, 2018 | 678 | 2018 |
A symbolic execution framework for javascript P Saxena, D Akhawe, S Hanna, F Mao, S McCamant, D Song 2010 IEEE Symposium on Security and Privacy, 513-528, 2010 | 612 | 2010 |
Data-oriented programming: On the expressiveness of non-control data attacks H Hu, S Shinde, S Adrian, ZL Chua, P Saxena, Z Liang 2016 IEEE Symposium on Security and Privacy (SP), 969-986, 2016 | 516 | 2016 |
Auror: defending against poisoning attacks in collaborative deep learning systems S Shen, S Tople, P Saxena Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016 | 360 | 2016 |
Preventing page faults from telling your secrets S Shinde, ZL Chua, V Narayanan, P Saxena Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016 | 307 | 2016 |
Demystifying incentives in the consensus computer L Luu, J Teutsch, R Kulkarni, P Saxena Proceedings of the 22Nd acm sigsac conference on computer and communications …, 2015 | 302 | 2015 |
PANOPLY: Low-TCB Linux Applications with SGX Enclaves S Shinde, D Le Tien, S Tople, P Saxena Network and Distributed Systems Security (NDSS), 2017 | 297 | 2017 |
Document Structure Integrity: A Robust Basis for Cross-site Scripting Defense. Y Nadji, P Saxena, D Song NDSS 20, 2009 | 281 | 2009 |
On the limits of information flow techniques for malware analysis and containment L Cavallaro, P Saxena, R Sekar International conference on Detection of Intrusions and Malware, and …, 2008 | 256* | 2008 |
Automatic Generation of {Data-Oriented} Exploits H Hu, ZL Chua, S Adrian, P Saxena, Z Liang 24th USENIX Security Symposium (USENIX Security 15), 177-192, 2015 | 248 | 2015 |
Loop-extended symbolic execution on binary programs P Saxena, P Poosankam, S McCamant, D Song Proceedings of the eighteenth international symposium on Software testing …, 2009 | 245 | 2009 |
Protecting Browsers from Extension Vulnerabilities. A Barth, AP Felt, P Saxena, A Boodman Ndss, 2010 | 244 | 2010 |
A traceability analysis of monero’s blockchain A Kumar, C Fischer, S Tople, P Saxena Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017 | 239 | 2017 |
SCRIPTGARD: automatic context-sensitive sanitization for large-scale legacy web applications P Saxena, D Molnar, B Livshits Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 227* | 2011 |
Fast and precise sanitizer analysis with BEK P Hooimeijer, B Livhsits, D Molnar, P Saxena, M Veanes Proceedings of the Usenix Security Symposium, 2011 | 221* | 2011 |
A systematic analysis of XSS sanitization in web application frameworks J Weinberger, P Saxena, D Akhawe, M Finifter, R Shin, D Song Computer Security–ESORICS 2011: 16th European Symposium on Research in …, 2011 | 216* | 2011 |