What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
David Evans
Google Scholar
ORCID:
0000-0001-7988-8943
47
publications in security and cryptology related venues
Year
Venue
Title
2024
conf/sp
TrojanPuzzle: Covertly Poisoning Code-Suggestion Models.
Hojjat Aghakhani
Wei Dai
Andre Manoel
Xavier Fernandes
Anant Kharkar
Christopher Kruegel
Giovanni Vigna
David Evans
Ben Zorn
Robert Sim
2024
conf/sp
Combing for Credentials: Active Pattern Extraction from Smart Reply.
Bargav Jayaraman
Esha Ghosh
Melissa Chase
Sambuddha Roy
Wei Dai
David Evans
2023
conf/sp
SoK: Let the Privacy Games Begin! A Unified Treatment of Data Inference Privacy in Machine Learning.
Ahmed Salem
Giovanni Cherubin
David Evans
Boris Köpf
Andrew Paverd
Anshuman Suri
Shruti Tople
Santiago Zanella-Béguelin
2022
journals/tifs
Stealthy Backdoors as Compression Artifacts.
Yulong Tian
Fnu Suya
Fengyuan Xu
David Evans
2022
journals/popets
Formalizing and Estimating Distribution Inference Risks.
Anshuman Suri
David Evans
2022
conf/ccs
Are Attribute Inference Attacks Just Imputation?
Bargav Jayaraman
David Evans
2021
journals/popets
Revisiting Membership Inference Under Realistic Assumptions.
Bargav Jayaraman
Lingxiao Wang
Katherine Knipmeyer
Quanquan Gu
David Evans
2020
journals/tifs
Predictability of IP Address Allocations for Cloud Computing Platforms.
Hussain M. J. Almohri
Layne T. Watson
David Evans
2020
journals/tifs
An Attack-Resilient Architecture for the Internet of Things.
Hussain M. J. Almohri
Layne T. Watson
David Evans
2020
conf/uss
Hybrid Batch Attacks: Finding Black-box Adversarial Examples with Limited Queries.
Fnu Suya
Jianfeng Chi
David Evans
Yuan Tian
2019
conf/uss
Evaluating Differentially Private Machine Learning in Practice.
Bargav Jayaraman
David Evans
2018
journals/tifs
Misery Digraphs: Delaying Intrusion Attacks in Obscure Clouds.
Hussain M. J. Almohri
Layne T. Watson
David Evans
2018
journals/popets
Efficient Dynamic Searchable Encryption with Forward Privacy.
Mohammad Etemad
Alptekin Küpçü
Charalampos Papamanthou
David Evans
2018
conf/ndss
Feature Squeezing: Detecting Adversarial Examples in Deep Neural Networks.
Weilin Xu
David Evans
Yanjun Qi
2017
journals/popets
Privacy-Preserving Distributed Linear Regression on High-Dimensional Data.
Adrià Gascón
Phillipp Schoppmann
Borja Balle
Mariana Raykova
Jack Doerner
Samee Zahur
David Evans
2016
conf/ccs
Secure Stable Matching at Scale.
Jack Doerner
David Evans
Abhi Shelat
2016
conf/sp
Revisiting Square-Root ORAM: Efficient Random Access in Multi-party Computation.
Samee Zahur
Xiao Wang
Mariana Raykova
Adrià Gascón
Jack Doerner
David Evans
Jonathan Katz
2016
conf/ndss
Automatically Evading Classifiers: A Case Study on PDF Malware Classifiers.
Weilin Xu
Yanjun Qi
David Evans
2015
conf/sp
Understanding and Monitoring Embedded Web Scripts.
Yuchen Zhou
David Evans
2015
conf/eurocrypt
Two Halves Make a Whole - Reducing Data Transfer in Garbled Circuits Using Half Gates.
Samee Zahur
Mike Rosulek
David Evans
2014
conf/uss
SSOScan: Automated Testing of Web Applications for Single Sign-On Vulnerabilities.
Yuchen Zhou
David Evans
2013
conf/uss
Explicating SDKs: Uncovering Assumptions Underlying Secure Authentication and Authorization.
Rui Wang
Yuchen Zhou
Shuo Chen
Shaz Qadeer
David Evans
Yuri Gurevich
2013
conf/crypto
Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose.
Yan Huang
Jonathan Katz
David Evans
2013
conf/sp
Circuit Structures for Improving Efficiency of Security and Privacy Tools.
Samee Zahur
David Evans
2012
conf/sp
Quid-Pro-Quo-tocols: Strengthening Semi-honest Protocols with Dual Execution.
Yan Huang
Jonathan Katz
David Evans
2012
conf/ndss
Private Set Intersection: Are Garbled Circuits Better than Custom Protocols?
Yan Huang
David Evans
Jonathan Katz
2011
conf/ccs
Automated black-box detection of side-channel vulnerabilities in web applications.
Peter Chapman
David Evans
2011
conf/uss
Privacy-Preserving Applications on Smartphones.
Yan Huang
Peter Chapman
David Evans
2011
conf/uss
Faster Secure Two-Party Computation Using Garbled Circuits.
Yan Huang
David Evans
Jonathan Katz
Lior Malka
2011
conf/iciss
Efficient Secure Computation with Garbled Circuits.
Yan Huang
Chih-Hao Shen
David Evans
Jonathan Katz
Abhi Shelat
2011
conf/esorics
Protecting Private Web Content from Embedded Scripts.
Yuchen Zhou
David Evans
2011
conf/ndss
Efficient Privacy-Preserving Biometric Identification.
Yan Huang
Lior Malka
David Evans
Jonathan Katz
2009
conf/acsac
Privacy through Noise: A Design Space for Private Identification.
Karsten Nohl
David Evans
2008
conf/uss
Reverse-Engineering a Cryptographic RFID Tag.
Karsten Nohl
David Evans
Starbug
Henryk Plötz
2008
conf/sec
Hiding in Groups: On the Expressiveness of Privacy Distributions.
Karsten Nohl
David Evans
2008
conf/nspw
The user is not the enemy: fighting malware by tracking user intentions.
Jeff Shirley
David Evans
2008
conf/dsn
Security through redundant data diversity.
Anh Nguyen-Tuong
David Evans
John C. Knight
Benjamin Cox
Jack W. Davidson
2006
journals/compsec
Comparing Java and .NET security: Lessons learned and missed.
Nathanael Paul
David Evans
2006
conf/uss
N-Variant Systems: A Secretless Framework for Security through Diversity.
Benjamin Cox
David Evans
2006
conf/icics
Quantifying Information Leakage in Tree-Based Hash Protocols (Short Paper).
Karsten Nohl
David Evans
2005
conf/uss
Where's the FEEB? The Effectiveness of Instruction Set Randomization.
Ana Nora Sovarel
David Evans
Nathanael Paul
2005
conf/sec
Automatically Hardening Web Applications Using Precise Tainting.
Anh Nguyen-Tuong
Salvatore Guarnieri
Doug Greene
Jeff Shirley
David Evans
2004
conf/uss
What Biology Can (and Can't) Teach Us About Security.
David Evans
2004
conf/ndss
Using Directional Antennas to Prevent Wormhole Attacks.
Lingxuan Hu
David Evans
2004
conf/acsac
.NET Security: Lessons Learned and Missed from Java.
Nathanael Paul
David Evans
2003
conf/ccs
A biological programming model for self-healing.
Selvin George
David Evans
Steven Marchette
2001
conf/uss
Statically Detecting Likely Buffer Overflow Vulnerabilities.
David Larochelle
David Evans
Coauthors
Abhi Shelat
(2)
Adrià Gascón
(2)
Ahmed Salem
(1)
Alptekin Küpçü
(1)
Ana Nora Sovarel
(1)
Anant Kharkar
(1)
Andre Manoel
(1)
Andrew Paverd
(1)
Anh Nguyen-Tuong
(2)
Anshuman Suri
(2)
Bargav Jayaraman
(4)
Ben Zorn
(1)
Benjamin Cox
(2)
Boris Köpf
(1)
Borja Balle
(1)
Charalampos Papamanthou
(1)
Chih-Hao Shen
(1)
Christopher Kruegel
(1)
David Evans
(47)
David Larochelle
(1)
Doug Greene
(1)
Esha Ghosh
(1)
Fengyuan Xu
(1)
Fnu Suya
(2)
Giovanni Cherubin
(1)
Giovanni Vigna
(1)
Henryk Plötz
(1)
Hojjat Aghakhani
(1)
Hussain M. J. Almohri
(3)
Jack Doerner
(3)
Jack W. Davidson
(1)
Jeff Shirley
(2)
Jianfeng Chi
(1)
John C. Knight
(1)
Jonathan Katz
(7)
Karsten Nohl
(4)
Katherine Knipmeyer
(1)
Layne T. Watson
(3)
Lingxiao Wang
(1)
Lingxuan Hu
(1)
Lior Malka
(2)
Mariana Raykova
(2)
Melissa Chase
(1)
Mike Rosulek
(1)
Mohammad Etemad
(1)
Nathanael Paul
(3)
Peter Chapman
(2)
Phillipp Schoppmann
(1)
Quanquan Gu
(1)
Robert Sim
(1)
Rui Wang
(1)
Salvatore Guarnieri
(1)
Sambuddha Roy
(1)
Samee Zahur
(4)
Santiago Zanella-Béguelin
(1)
Selvin George
(1)
Shaz Qadeer
(1)
Shruti Tople
(1)
Shuo Chen
(1)
Starbug
(1)
Steven Marchette
(1)
Wei Dai
(2)
Weilin Xu
(2)
Xavier Fernandes
(1)
Xiao Wang
(1)
Yan Huang
(7)
Yanjun Qi
(2)
Yuan Tian
(1)
Yuchen Zhou
(4)
Yulong Tian
(1)
Yuri Gurevich
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to