default search action
David Molnar
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i10]Manish Bhatt, Sahana Chennabasappa, Yue Li, Cyrus Nikolaidis, Daniel Song, Shengye Wan, Faizan Ahmad, Cornelius Aschermann, Yaohui Chen, Dhaval Kapil, David Molnar, Spencer Whitman, Joshua Saxe:
CyberSecEval 2: A Wide-Ranging Cybersecurity Evaluation Suite for Large Language Models. CoRR abs/2404.13161 (2024) - [i9]Shengye Wan, Cyrus Nikolaidis, Daniel Song, David Molnar, James Crnkovich, Jayson Grace, Manish Bhatt, Sahana Chennabasappa, Spencer Whitman, Stephanie Ding, Vlad Ionescu, Yue Li, Joshua Saxe:
CYBERSECEVAL 3: Advancing the Evaluation of Cybersecurity Risks and Capabilities in Large Language Models. CoRR abs/2408.01605 (2024) - 2020
- [c44]Tanja Sarcevic, David Molnar, Rudolf Mayer:
An Analysis of Different Notions of Effectiveness in k-Anonymity. PSD 2020: 121-135
2010 – 2019
- 2018
- [c43]Thilo Sauter, Albert Treytl, Konrad Diwold, David Molnar, Daniel Lechner, Lukas Krammer, Bernhard Derler, Christian Seidl, Florian Wenig:
Getting Fit for the Future: Optimizing Energy Usage in Existing Buildings by Adding Non-Invasive Sensor Networks. ISIE 2018: 963-968 - 2017
- [j5]Lucas Silva Figueiredo, David Molnar, Margus Veanes, Benjamin Livshits:
Prepose: Privacy, Security, and Reliability for Gesture-Based Programming. IEEE Secur. Priv. 15(2): 14-23 (2017) - 2016
- [c42]Christina Söderman, Åse Johnsson, Jenny Vikgren, Rauni Rossi Norrlund, David Molnar, Maral Mirzai, Angelica Svalkvist, Lars Gunnar Månsson, Magnus Båth:
Detection of pulmonary nodule growth with dose reduced chest tomosynthesis: a human observer study using simulated nodules. Image Perception, Observer Performance, and Technology Assessment 2016: 97870P - [c41]Lucas Silva Figueiredo, Benjamin Livshits, David Molnar, Margus Veanes:
Prepose: Privacy, Security, and Reliability for Gesture-Based Programming. IEEE Symposium on Security and Privacy 2016: 122-137 - 2015
- [j4]Loris D'Antoni, Margus Veanes, Benjamin Livshits, David Molnar:
Fast: A Transducer-Based Language for Tree Manipulation. ACM Trans. Program. Lang. Syst. 38(1): 1:1-1:32 (2015) - [c40]Irene Rae, Gina Venolia, John C. Tang, David Molnar:
A Framework for Understanding and Designing Telepresence. CSCW 2015: 1552-1566 - [c39]Margus Veanes, Todd Mytkowicz, David Molnar, Benjamin Livshits:
Data-Parallel String-Manipulating Programs. POPL 2015: 139-152 - [c38]Robert A. Cochran, Loris D'Antoni, Benjamin Livshits, David Molnar, Margus Veanes:
Program Boosting: Program Synthesis via Crowd-Sourcing. POPL 2015: 677-688 - [c37]John Vilk, David Molnar, Benjamin Livshits, Eyal Ofek, Christopher J. Rossbach, Alexander Moshchuk, Helen J. Wang, Ran Gal:
SurroundWeb: Mitigating Privacy Concerns in a 3D Web Browser. IEEE Symposium on Security and Privacy 2015: 431-446 - [c36]Karl Koscher, Tadayoshi Kohno, David Molnar:
SURROGATES: Enabling Near-Real-Time Dynamic Analyses of Embedded Systems. WOOT 2015 - 2014
- [j3]Franziska Roesner, Tadayoshi Kohno, David Molnar:
Security and privacy for augmented reality systems. Commun. ACM 57(4): 88-96 (2014) - [c35]Franziska Roesner, David Molnar, Alexander Moshchuk, Tadayoshi Kohno, Helen J. Wang:
World-Driven Access Control for Continuous Sensing. CCS 2014: 1169-1181 - [c34]Andreas Weiß, Dimka Karastoyanova, David Molnar, Siegfried Schmauder:
Coupling of Existing Simulations using Bottom-up Modeling of Choreographies. GI-Jahrestagung 2014: 101-112 - [c33]Christopher Smowton, Jacob R. Lorch, David Molnar, Stefan Saroiu, Alec Wolman:
Zero-effort payments: design, deployment, and lessons. UbiComp 2014: 763-774 - [c32]Loris D'Antoni, Margus Veanes, Benjamin Livshits, David Molnar:
Fast: a transducer-based language for tree manipulation. PLDI 2014: 384-394 - 2013
- [c31]Loris D'Antoni, Alan M. Dunn, Suman Jana, Tadayoshi Kohno, Benjamin Livshits, David Molnar, Alexander Moshchuk, Eyal Ofek, Franziska Roesner, T. Scott Saponas, Margus Veanes, Helen J. Wang:
Operating System Support for Augmented Reality Applications. HotOS 2013 - [c30]Suman Jana, David Molnar, Alexander Moshchuk, Alan M. Dunn, Benjamin Livshits, Helen J. Wang, Eyal Ofek:
Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers. USENIX Security Symposium 2013: 415-430 - 2012
- [c29]Margus Veanes, Pieter Hooimeijer, Benjamin Livshits, David Molnar, Nikolaj S. Bjørner:
Symbolic finite state transducers: algorithms and applications. POPL 2012: 137-150 - 2011
- [c28]Prateek Saxena, David Molnar, Benjamin Livshits:
SCRIPTGARD: automatic context-sensitive sanitization for large-scale legacy web applications. CCS 2011: 601-614 - [c27]Mirko Sonntag, Sven Hotta, Dimka Karastoyanova, David Molnar, Siegfried Schmauder:
Workflow-based Distributed Environment for Legacy Simulation Applications. ICSOFT (1) 2011: 91-94 - [c26]Mirko Sonntag, Sven Hotta, Dimka Karastoyanova, David Molnar, Siegfried Schmauder:
Using Services and Service Compositions to Enable the Distributed Execution of Legacy Simulation Applications. ServiceWave 2011: 242-253 - [c25]Raluca Ada Popa, Jacob R. Lorch, David Molnar, Helen J. Wang, Li Zhuang:
Enabling Security in Cloud Storage SLAs with CloudProof. USENIX ATC 2011 - [c24]Pieter Hooimeijer, Benjamin Livshits, David Molnar, Prateek Saxena, Margus Veanes:
Fast and Precise Sanitizer Analysis with BEK. USENIX Security Symposium 2011 - 2010
- [c23]David Molnar, Serge Egelman, Nicolas Christin:
This is your data on drugs: lessons computer security can learn from the drug war. NSPW 2010: 143-149 - [c22]Serge Egelman, David Molnar, Nicolas Christin, Alessandro Acquisti, Cormac Herley, Shriram Krishnamurthi:
Please Continue to Hold: An Empirical Study on User Tolerance of Security Delays. WEIS 2010 - [c21]David Molnar, Stuart E. Schechter:
Self Hosting vs. Cloud Hosting: Accounting for the Security Impact of Hosting in the Cloud. WEIS 2010
2000 – 2009
- 2009
- [c20]Marc Stevens, Alexander Sotirov, Jacob Appelbaum, Arjen K. Lenstra, David Molnar, Dag Arne Osvik, Benne de Weger:
Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate. CRYPTO 2009: 55-69 - [c19]David Molnar, Xue Cong Li, David A. Wagner:
Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs. USENIX Security Symposium 2009: 67-82 - [i8]Marc Stevens, Alexander Sotirov, Jacob Appelbaum, Arjen K. Lenstra, David Molnar, Dag Arne Osvik, Benne de Weger:
Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate. IACR Cryptol. ePrint Arch. 2009: 111 (2009) - 2008
- [c18]Gene Tsudik, Mike Burmester, Ari Juels, Alfred Kobsa, David Molnar, Roberto Di Pietro, Melanie R. Rieback:
RFID security and privacy: long-term research or short-term tinkering? WISEC 2008: 160 - 2007
- [c17]Nicholas Hopper, David Molnar, David A. Wagner:
From Weak to Strong Watermarking. TCC 2007: 362-382 - 2006
- [c16]Chris Crutchfield, David Molnar, David Turner, David A. Wagner:
Generic On-Line/Off-Line Threshold Signatures. Public Key Cryptography 2006: 58-74 - [c15]David Molnar, Tadayoshi Kohno, Naveen Sastry, David A. Wagner:
Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage-or-How to Store Ballots on a Voting Machine (Extended Abstract). S&P 2006: 365-370 - [i7]Lea Kissner, David Molnar:
Provably Secure Subsitution of Cryptographic Tools. IACR Cryptol. ePrint Arch. 2006: 4 (2006) - [i6]David Molnar, Tadayoshi Kohno, Naveen Sastry, David A. Wagner:
Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage -or- How to Store Ballots on a Voting Machine. IACR Cryptol. ePrint Arch. 2006: 81 (2006) - [i5]Nicholas Hopper, David Molnar, David A. Wagner:
From Weak to Strong Watermarking. IACR Cryptol. ePrint Arch. 2006: 430 (2006) - 2005
- [c14]Craig Gentry, David Molnar, Zulfikar Ramzan:
Efficient Designated Confirmer Signatures Without Random Oracles or General Zero-Knowledge Proofs. ASIACRYPT 2005: 662-681 - [c13]Ravi Jain, David Molnar, Zulfikar Ramzan:
Towards understanding algorithmic factors affecting energy consumption: switching complexity, randomness, and preliminary experiments. DIALM-POMC 2005: 70-79 - [c12]David Molnar, Matt Piotrowski, David Schultz, David A. Wagner:
The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks. ICISC 2005: 156-168 - [c11]Stark C. Draper, Prakash Ishwar, David Molnar, Vinod M. Prabhakaran, Kannan Ramchandran, Daniel Schonberg, David A. Wagner:
An Analysis of Empirical PMF Based Tests for Least Significant Bit Image Steganography. Information Hiding 2005: 327-341 - [c10]David Molnar, Andrea Soppera, David A. Wagner:
A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags. Selected Areas in Cryptography 2005: 276-290 - [c9]Ari Juels, David Molnar, David A. Wagner:
Security and Privacy Issues in E-passports. SecureComm 2005: 74-88 - [c8]Ravi Jain, David Molnar, Zulfikar Ramzan:
Towards a model of energy complexity for algorithms [mobile wireless applications]. WCNC 2005: 1884-1890 - [c7]David Molnar, Andrea Soppera, David A. Wagner:
Privacy for RFID through trusted computing. WPES 2005: 31-34 - [i4]Ari Juels, David Molnar, David A. Wagner:
Security and Privacy Issues in E-passports. IACR Cryptol. ePrint Arch. 2005: 95 (2005) - [i3]David Molnar, Andrea Soppera, David A. Wagner:
A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags. IACR Cryptol. ePrint Arch. 2005: 315 (2005) - [i2]David Molnar, Matt Piotrowski, David Schultz, David A. Wagner:
The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks. IACR Cryptol. ePrint Arch. 2005: 368 (2005) - [i1]Chris Crutchfield, David Molnar, David Turner, David A. Wagner:
Generic On-Line/Off-Line Threshold Signatures. IACR Cryptol. ePrint Arch. 2005: 418 (2005) - 2004
- [c6]David Molnar, David A. Wagner:
Privacy and security in library RFID: issues, practices, and architectures. CCS 2004: 210-219 - [c5]Nathan Good, David Molnar, Jennifer M. Urban, Deirdre K. Mulligan, Elizabeth Miles, Laura Quilter, David A. Wagner:
Radio frequency Id and privacy with information goods. WPES 2004: 41-42 - [p1]Tony Vila, Rachel Greenstadt, David Molnar:
Why We Can't Be Bothered to Read Privacy Policies - Models of Privacy Economics as a Lemons Market. Economics of Information Security 2004: 143-153 - 2003
- [c4]Tony Vila, Rachel Greenstadt, David Molnar:
Why we can't be bothered to read privacy policies models of privacy economics as a lemons market. ICEC 2003: 403-407 - 2002
- [c3]Robert Johnson, David Molnar, Dawn Xiaodong Song, David A. Wagner:
Homomorphic Signature Schemes. CT-RSA 2002: 244-262 - 2001
- [j2]David Molnar:
On patrol: resource allocation, proofs of work, and consequences. XRDS 7(3): 28-31 (2001) - [c2]Roger Dingledine, Michael J. Freedman, David Hopwood, David Molnar:
A Reputation System to Increase MIX-Net Reliability. Information Hiding 2001: 126-141 - 2000
- [j1]David Molnar:
Signing electronic contracts. XRDS 7(1) (2000) - [c1]Roger Dingledine, Michael J. Freedman, David Molnar:
The Free Haven Project: Distributed Anonymous Storage Service. Workshop on Design Issues in Anonymity and Unobservability 2000: 67-95
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-28 21:26 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint