What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Benjamin Livshits
Google Scholar
31
publications in security and cryptology related venues
Year
Venue
Title
2024
conf/uss
SoK: What don't we know? Understanding Security Vulnerabilities in SNARKs.
Stefanos Chaliasos
Jens Ernstberger
David Theodore
David Wong
Mohammad Jahanara
Benjamin Livshits
2023
conf/uss
Pool-Party: Exploiting Browser Resource Pools for Web Tracking.
Peter Snyder
Soroush Karami
Arthur Edelstein
Benjamin Livshits
Hamed Haddadi
2023
conf/uss
The Blockchain Imitation Game.
Kaihua Qin
Stefanos Chaliasos
Liyi Zhou
Benjamin Livshits
Dawn Song
Arthur Gervais
2022
journals/popets
Blocked or Broken? Automatically Detecting When Privacy Interventions Break Websites.
Michael Smith
Peter Snyder
Moritz Haller
Benjamin Livshits
Deian Stefan
Hamed Haddadi
2022
conf/ccs
STAR: Secret Sharing for Private Threshold Aggregation Reporting.
Alex Davidson
Peter Snyder
E. B. Quirk
Joseph Genereux
Benjamin Livshits
Hamed Haddadi
2021
journals/popets
ZKSENSE: A Friction-less Privacy-Preserving Human Attestation Mechanism for Mobile Devices.
Iñigo Querejeta-Azurmendi
Panagiotis Papadopoulos
Matteo Varvello
Antonio Nappa
Jiexin Zhang
Benjamin Livshits
2021
conf/ccs
SugarCoat: Programmatically Generating Privacy-Preserving, Web-Compatible Resource Replacements for Content Blocking.
Michael Smith
Peter Snyder
Benjamin Livshits
Deian Stefan
2021
conf/uss
Smart Contract Vulnerabilities: Vulnerable Does Not Imply Exploited.
Daniel Perez
Benjamin Livshits
2021
conf/fc
Liquidations: DeFi on a Knife-Edge.
Daniel Perez
Sam M. Werner
Jiahua Xu
Benjamin Livshits
2021
conf/fc
Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit.
Kaihua Qin
Liyi Zhou
Benjamin Livshits
Arthur Gervais
2021
conf/sp
On the Just-In-Time Discovery of Profit-Generating Transactions in DeFi Protocols.
Liyi Zhou
Kaihua Qin
Antoine Cully
Benjamin Livshits
Arthur Gervais
2020
conf/sp
AdGraph: A Graph-Based Approach to Ad and Tracker Blocking.
Umar Iqbal
Peter Snyder
Shitong Zhu
Benjamin Livshits
Zhiyun Qian
Zubair Shafiq
2020
conf/ndss
Broken Metre: Attacking Resource Metering in EVM.
Daniel Perez
Benjamin Livshits
2019
conf/uss
When the Signal is in the Noise: Exploiting Diffix's Sticky Noise.
Andrea Gadotti
Florimond Houssiau
Luc Rocher
Benjamin Livshits
Yves-Alexandre de Montjoye
2019
conf/uss
The Anatomy of a Cryptocurrency Pump-and-Dump Scheme.
Jiahua Xu
Benjamin Livshits
2018
conf/ndss
SYNODE: Understanding and Automatically Preventing Injection Attacks on NODE.JS.
Cristian-Alexandru Staicu
Michael Pradel
Benjamin Livshits
2017
conf/uss
BLENDER: Enabling Local Search with a Hybrid Differential Privacy Model.
Brendan Avent
Aleksandra Korolova
David Zeber
Torgeir Hovden
Benjamin Livshits
2016
conf/sp
Prepose: Privacy, Security, and Reliability for Gesture-Based Programming.
Lucas Silva Figueiredo
Benjamin Livshits
David Molnar
Margus Veanes
2016
conf/dsn
Kizzle: A Signature Compiler for Detecting Exploit Kits.
Ben Stock
Benjamin Livshits
Benjamin G. Zorn
2015
conf/sp
SurroundWeb: Mitigating Privacy Concerns in a 3D Web Browser.
John Vilk
David Molnar
Benjamin Livshits
Eyal Ofek
Christopher J. Rossbach
Alexander Moshchuk
Helen J. Wang
Ran Gal
2014
conf/uss
ZØ: An Optimizing Distributing Zero-Knowledge Compiler.
Matthew Fredrikson
Benjamin Livshits
2014
conf/acsac
MoRePriv: mobile OS support for application personalization and privacy.
Drew Davidson
Matt Fredrikson
Benjamin Livshits
2013
conf/uss
Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers.
Suman Jana
David Molnar
Alexander Moshchuk
Alan M. Dunn
Benjamin Livshits
Helen J. Wang
Eyal Ofek
2013
conf/uss
Automatic Mediation of Privacy-Sensitive Resource Access in Smartphone Applications.
Benjamin Livshits
Jaeyeon Jung
2012
conf/sp
Rozzle: De-cloaking Internet Malware.
Clemens Kolbitsch
Benjamin Livshits
Benjamin G. Zorn
Christian Seifert
2011
conf/ccs
SCRIPTGARD: automatic context-sensitive sanitization for large-scale legacy web applications.
Prateek Saxena
David Molnar
Benjamin Livshits
2011
conf/ccs
Towards ensuring client-side computational integrity.
George Danezis
Benjamin Livshits
2011
conf/uss
Fast and Precise Sanitizer Analysis with BEK.
Pieter Hooimeijer
Benjamin Livshits
David Molnar
Prateek Saxena
Margus Veanes
2011
conf/uss
ZOZZLE: Fast and Precise In-Browser JavaScript Malware Detection.
Charlie Curtsinger
Benjamin Livshits
Benjamin G. Zorn
Christian Seifert
2011
conf/sp
Verified Security for Browser Extensions.
Arjun Guha
Matthew Fredrikson
Benjamin Livshits
Nikhil Swamy
2011
conf/sp
RePriv: Re-imagining Content Personalization and In-browser Privacy.
Matthew Fredrikson
Benjamin Livshits
Coauthors
Alan M. Dunn
(1)
Aleksandra Korolova
(1)
Alex Davidson
(1)
Alexander Moshchuk
(2)
Andrea Gadotti
(1)
Antoine Cully
(1)
Antonio Nappa
(1)
Arjun Guha
(1)
Arthur Edelstein
(1)
Arthur Gervais
(3)
Ben Stock
(1)
Benjamin G. Zorn
(3)
Benjamin Livshits
(31)
Brendan Avent
(1)
Charlie Curtsinger
(1)
Christian Seifert
(2)
Christopher J. Rossbach
(1)
Clemens Kolbitsch
(1)
Cristian-Alexandru Staicu
(1)
Daniel Perez
(3)
David Molnar
(5)
David Theodore
(1)
David Wong
(1)
David Zeber
(1)
Dawn Song
(1)
Deian Stefan
(2)
Drew Davidson
(1)
E. B. Quirk
(1)
Eyal Ofek
(2)
Florimond Houssiau
(1)
George Danezis
(1)
Hamed Haddadi
(3)
Helen J. Wang
(2)
Iñigo Querejeta-Azurmendi
(1)
Jaeyeon Jung
(1)
Jens Ernstberger
(1)
Jiahua Xu
(2)
Jiexin Zhang
(1)
John Vilk
(1)
Joseph Genereux
(1)
Kaihua Qin
(3)
Liyi Zhou
(3)
Luc Rocher
(1)
Lucas Silva Figueiredo
(1)
Margus Veanes
(2)
Matt Fredrikson
(1)
Matteo Varvello
(1)
Matthew Fredrikson
(3)
Michael Pradel
(1)
Michael Smith
(2)
Mohammad Jahanara
(1)
Moritz Haller
(1)
Nikhil Swamy
(1)
Panagiotis Papadopoulos
(1)
Peter Snyder
(5)
Pieter Hooimeijer
(1)
Prateek Saxena
(2)
Ran Gal
(1)
Sam M. Werner
(1)
Shitong Zhu
(1)
Soroush Karami
(1)
Stefanos Chaliasos
(2)
Suman Jana
(1)
Torgeir Hovden
(1)
Umar Iqbal
(1)
Yves-Alexandre de Montjoye
(1)
Zhiyun Qian
(1)
Zubair Shafiq
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to