Conference Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures 2015 • Proceedings of the ACM Conference on Computer and Communications Security • 1322-1333 Fredrikson M, Jha S, Ristenpart T
Journal Article Revisiting Differentially Private Regression: Lessons From Learning Theory and their Consequences 2015 Wu X, Fredrikson M, Wu W, Jha S, Naughton JF
Preprint Revisiting Differentially Private Regression: Lessons From Learning Theory and their Consequences 2015 Wu X, Fredrikson M, Wu W, Jha S, Naughton JF
Preprint The Limitations of Deep Learning in Adversarial Settings 2015 Papernot N, McDaniel P, Jha S, Fredrikson M, Celik ZB, Swami A
Conference MoRePriv: Mobile OS support for application personalization and privacy 2014 • ACM International Conference Proceeding Series • 2014-December(December):236-245 Davidson D, Fredrikson M, Livshits B
Conference On the Practical Exploitability of Dual EC in TLS Implementations 2014 • PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM • 319-335 Checkoway S, Fredrikson M, Niederhagen R, Everspaugh A, Green M, Lange T, Ristenpart T, Bernstein DJ, Maskiewicz J, Shacham H
Conference Privacy in Pharmacogenetics: An End-to-End Case Study of Personalized Warfarin Dosing 2014 • PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM • 17-32 Fredrikson M, Lantz E, Jha S, Lin S, Page D, Ristenpart T
Conference Satisfiability Modulo Counting: A New Approach for Analyzing Privacy Properties 2014 • Proceedings - Symposium on Logic in Computer Science Fredrikson M, Jha S
Conference ZØ: An optimizing distributing zero-knowledge compiler 2014 • Proceedings of the 23rd USENIX Security Symposium • 909-924 Fredrikson M, Livshits B
Conference Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors 2013 • PROCEEDINGS OF THE 2013 8TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE: THE AMERICAS (MALWARE) • 41-50 Jha S, Fredrikson M, Christodoresu M, Sailer R, Yan X
Conference Efficient runtime policy enforcement using counterexample-guided abstraction refinement 2012 • Lecture Notes in Computer Science • 7358 LNCS:548-563 Fredrikson M, Joiner R, Jha S, Reps T, Porras P, Saïdi H, Yegneswaran V
Conference Dynamic Behavior Matching: A Complexity Analysis and New Approximation Algorithms 2011 • Lecture Notes in Computer Science • 6803:252-+ Fredrikson M, Christodorescu M, Jha S
Chapter End-to-End Software Diversification of Internet Services 2011 • Advances in Information Security • 54:117-130 Christodorescu M, Fredrikson M, Jha S, Giffin J
Conference REPRIV: Re-Imagining Content Personalization and In-Browser Privacy 2011 • IEEE Symposium on Security and Privacy: Proceedings • 131-146 Fredrikson M, Livshits B
Conference Verified Security for Browser Extensions 2011 • IEEE Symposium on Security and Privacy: Proceedings • 115-130 Guha A, Fredrikson M, Livshits B, Swamy N
Journal Article A Declarative Framework for Intrusion Analysis 2010 • Advances in Information Security • 46:179-200 Fredrikson M, Christodorescu M, Giffin J, Jha S
Conference Automatic generation of remediation procedures for malware infections 2010 • Proceedings of the 19th USENIX Security Symposium • 419-434 Paleari R, Martignoni L, Passerini E, Davidson D, Fredrikson M, Giffin J, Jha S
Journal Article Cyber SA: Situational Awareness for Cyber Defense 2010 • Advances in Information Security • 46:3-14 Barford P, Dacier M, Dietterich TG, Fredrikson M, Giffin J, Jajodia S, Jha S, Li J, Liu P, Ning P, Ou X, Song D, Strater L, Swarup V, Tadda G, Wang C, Yen J
Chapter Mining Large Information Networks by Graph Summarization 2010 • LINK MINING: MODELS, ALGORITHMS, AND APPLICATIONS • 475-501 Chen C, Lin CX, Fredrikson M, Christodorescu M, Yan X, Han J
Conference Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors 2010 • IEEE Symposium on Security and Privacy: Proceedings • 45-60 Fredrikson M, Jha S, Christodorescu M, Sailer R, Yan X
Journal Article Mining graph patterns efficiently via randomized summaries 2009 • Proceedings of the VLDB Endowment • 2(1):742-753 Chen C, Lin CX, Fredrikson M, Christodorescu M, Yan X, Han J
Conference A Layered Architecture for Detecting Malicious Behaviors 2008 • Lecture Notes in Computer Science • 5230:78-+ Martignoni L, Stinson E, Fredrikson M, Jha S, Mitchell JC