What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Samuel T. King
Google Scholar
15
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/asiaccs
FP-Rowhammer: DRAM-Based Device Fingerprinting.
Hari Venugopalan
Kaustav Goswami
Zainul ul Abi Din
Jason Lowe-Power
Samuel T. King
Zubair Shafiq
2021
conf/sp
Doing good by fighting fraud: Ethical anti-fraud systems for mobile payments.
Zain ul Abi Din
Hari Venugopalan
Henry Lin
Adam Wushensky
Steven Liu
Samuel T. King
2020
conf/uss
Boxer: Preventing fraud by scanning credit cards.
Zain ul Abi Din
Hari Venugopalan
Jaime Park
Andy Li
Weisu Yin
Haohui Mai
Yong Jae Lee
Steven Liu
Samuel T. King
2012
conf/ndss
Using replicated execution for a more secure and reliable web browser.
Hui Xue
Nathan Dautenhahn
Samuel T. King
2011
conf/ccs
Fortifying web-based applications automatically.
Shuo Tang
Nathan Dautenhahn
Samuel T. King
2011
conf/uss
Building Secure Robot Applications.
Murph Finnicum
Samuel T. King
2011
conf/sp
Defeating UCI: Building Stealthy and Malicious Hardware.
Cynthia Sturton
Matthew Hicks
David A. Wagner
Samuel T. King
2010
conf/uss
VEX: Vetting Browser Extensions for Security Vulnerabilities.
Sruthi Bandhakavi
Samuel T. King
P. Madhusudan
Marianne Winslett
2010
conf/sp
Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically.
Matthew Hicks
Murph Finnicum
Samuel T. King
Milo M. K. Martin
Jonathan M. Smith
2009
conf/uss
The Multi-Principal OS Construction of the Gazelle Web Browser.
Helen J. Wang
Chris Grier
Alexander Moshchuk
Samuel T. King
Piali Choudhury
Herman Venter
2009
conf/acsac
MAVMM: Lightweight and Purpose Built VMM for Malware Analysis.
Anh M. Nguyen
Nabil Schear
HeeDong Jung
Apeksha Godiyal
Samuel T. King
Hai D. Nguyen
2008
conf/sp
Secure Web Browsing with the OP Web Browser.
Chris Grier
Shuo Tang
Samuel T. King
2006
conf/sp
SubVirt: Implementing malware with virtual machines.
Samuel T. King
Peter M. Chen
Yi-Min Wang
Chad Verbowski
Helen J. Wang
Jacob R. Lorch
2006
conf/ndss
Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities.
Yi-Min Wang
Doug Beck
Xuxian Jiang
Roussi Roussev
Chad Verbowski
Shuo Chen
Samuel T. King
2005
conf/ndss
Enriching Intrusion Alerts Through Multi-Host Causality.
Samuel T. King
Zhuoqing Morley Mao
Dominic G. Lucchetti
Peter M. Chen
Coauthors
Adam Wushensky
(1)
Alexander Moshchuk
(1)
Andy Li
(1)
Anh M. Nguyen
(1)
Apeksha Godiyal
(1)
Chad Verbowski
(2)
Chris Grier
(2)
Cynthia Sturton
(1)
David A. Wagner
(1)
Dominic G. Lucchetti
(1)
Doug Beck
(1)
Hai D. Nguyen
(1)
Haohui Mai
(1)
Hari Venugopalan
(3)
HeeDong Jung
(1)
Helen J. Wang
(2)
Henry Lin
(1)
Herman Venter
(1)
Hui Xue
(1)
Jacob R. Lorch
(1)
Jaime Park
(1)
Jason Lowe-Power
(1)
Jonathan M. Smith
(1)
Kaustav Goswami
(1)
Marianne Winslett
(1)
Matthew Hicks
(2)
Milo M. K. Martin
(1)
Murph Finnicum
(2)
Nabil Schear
(1)
Nathan Dautenhahn
(2)
P. Madhusudan
(1)
Peter M. Chen
(2)
Piali Choudhury
(1)
Roussi Roussev
(1)
Samuel T. King
(15)
Shuo Chen
(1)
Shuo Tang
(2)
Sruthi Bandhakavi
(1)
Steven Liu
(2)
Weisu Yin
(1)
Xuxian Jiang
(1)
Yi-Min Wang
(2)
Yong Jae Lee
(1)
Zain ul Abi Din
(2)
Zainul ul Abi Din
(1)
Zhuoqing Morley Mao
(1)
Zubair Shafiq
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to