Suman Jana
Suman Jana
Assistant Professor of Computer Science, Columbia University
Verifierad e-postadress på cs.columbia.edu - Startsida
Titel
Citeras av
Citeras av
År
The most dangerous code in the world: validating SSL certificates in non-browser software
M Georgiev, S Iyengar, S Jana, R Anubhai, D Boneh, V Shmatikov
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
4582012
On the effectiveness of secret key extraction from wireless signal strength in real environments
S Jana, SN Premnath, M Clark, SK Kasera, N Patwari, SV Krishnamurthy
Proceedings of the 15th annual international conference on Mobile computing …, 2009
4562009
DeepXplore: Automated Whitebox Testing of Deep Learning Systems
K Pei, Y Cao, J Yang, S Jana
Proceedings of the 26th ACM Symposium on Operating Systems Principles (SOSP …, 2017
3642017
High-rate uncorrelated bit extraction for shared secret key generation from channel measurements
N Patwari, J Croft, S Jana, SK Kasera
IEEE Transactions on Mobile Computing 9 (1), 17-30, 2009
3462009
DeepTest: Automated testing of deep-neural-network-driven autonomous cars
Y Tian, K Pei, S Jana, B Ray
40th International Conference on Software Engineering (ICSE), 2018
3382018
On fast and accurate detection of unauthorized wireless access points using clock skews
S Jana, SK Kasera
Proceedings of the 14th ACM international conference on Mobile computing and …, 2008
2742008
Secret key extraction from wireless signal strength in real environments
SN Premnath, S Jana, J Croft, PL Gowda, M Clark, SK Kasera, N Patwari, ...
IEEE Transactions on mobile Computing 12 (5), 917-930, 2012
2052012
Memento: Learning Secrets from Process Footprints
S Jana, V Shmatikov
IEEE Symposium on Security and Privacy 2012, 2012
1592012
Using Frankencerts for Automated Adversarial Testing of Certificate Validation in SSL/TLS Implementations
C Brubaker, S Jana, B Ray, S Khurshid, V Shmatikov
IEEE Symposium on Security and Privacy 2014, 2014
1242014
A Scanner Darkly: Protecting User Privacy From Perceptual Applications
S Jana, A Narayanan, V Shmatikov
IEEE Symposium on Security and Privacy 2013, 2013
1142013
Password Managers: Attacks and Defenses
D Silver, S Jana, E Chen, C Jackson, D Boneh
23rd USENIX Security Symposium (USENIX Security '14), 2014
1102014
Certified robustness to adversarial examples with differential privacy
M Lecuyer, V Atlidakis, R Geambasu, D Hsu, S Jana
2019 IEEE Symposium on Security and Privacy (SP), 656-672, 2019
1002019
Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks
M Georgiev, S Jana, V Shmatikov
Network and Distributed System Security (NDSS) Symposium 2014, 2014
942014
Formal Security Analysis of Neural Networks using Symbolic Intervals
S Wang, K Pei, J Whitehouse, J Yang, S Jana
27th USENIX Security Symposium (USENIX Security 18), 2018
852018
Enabling Fine-Grained Permissions for Augmented Reality Applications With Recognizers
S Jana, D Molnar, A Moshchuk, A Dunn, B Livshits, H Wang, E Ofek
22nd USENIX Security Symposium (USENIX Security '13), 2013
842013
Abusing File Processing in Malware Detectors for Fun and Profit
S Jana, V Shmatikov
IEEE Symposium on Security and Privacy 2012, 2012
832012
Eternal sunshine of the spotless machine: Protecting privacy with ephemeral channels
AM Dunn, MZ Lee, S Jana, S Kim, M Silberstein, Y Xu, V Shmatikov, ...
Presented as part of the 10th {USENIX} Symposium on Operating Systems Design …, 2012
682012
Efficient formal safety analysis of neural networks
S Wang, K Pei, J Whitehouse, J Yang, S Jana
Advances in Neural Information Processing Systems, 6367-6377, 2018
652018
SlowFuzz: Automated Domain-Independent Detection of Algorithmic Complexity Vulnerabilities
T Petsios, J Zhao, AD Keromytis, S Jana
Proceedings of the 2017 ACM conference on Computer and communications security, 2017
612017
Baishakhi Ray, Sarfraz Khurshid, and Vitaly Shmatikov. Using frankencerts for automated adversarial testing of certificate validation in SSL/TLS implementations
C Brubaker, S Jana
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 114-129, 2014
532014
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20