default search action
David A. Wagner 0001
Person information
- affiliation: University of California, Berkeley, CA, USA
Other persons with the same name
- David A. Wagner 0002 — California Institute of Technology, NASA Jet Propulsion Lab, Pasadena, CA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [c183]Julien Piet, Maha Alrashed, Chawin Sitawarin, Sizhe Chen, Zeming Wei, Elizabeth Sun, Basel Alomair, David A. Wagner:
Jatmo: Prompt Injection Defense by Task-Specific Finetuning. ESORICS (1) 2024: 105-124 - [c182]Chawin Sitawarin, Jaewon Chang, David Huang, Wesson Altoyan, David A. Wagner:
PubDef: Defending Against Transfer Attacks From Public Models. ICLR 2024 - [i50]Sizhe Chen, Julien Piet, Chawin Sitawarin, David A. Wagner:
StruQ: Defending Against Prompt Injection with Structured Queries. CoRR abs/2402.06363 (2024) - [i49]Chawin Sitawarin, Norman Mu, David A. Wagner, Alexandre Araujo:
PAL: Proxy-Guided Black-Box Attack on Large Language Models. CoRR abs/2402.09674 (2024) - [i48]Banghua Zhu, Norman Mu, Jiantao Jiao, David A. Wagner:
Generative AI Security: Challenges and Countermeasures. CoRR abs/2402.12617 (2024) - [i47]Yangruibo Ding, Yanjun Fu, Omniyyah Ibrahim, Chawin Sitawarin, Xinyun Chen, Basel Alomair, David A. Wagner, Baishakhi Ray, Yizheng Chen:
Vulnerability Detection with Code Language Models: How Far Are We? CoRR abs/2403.18624 (2024) - [i46]Yigitcan Kaya, Yizheng Chen, Shoumik Saha, Fabio Pierazzi, Lorenzo Cavallaro, David A. Wagner, Tudor Dumitras:
Demystifying Behavior-Based Malware Detection at Endpoints. CoRR abs/2405.06124 (2024) - [i45]Chong Xiang, Tong Wu, Zexuan Zhong, David A. Wagner, Danqi Chen, Prateek Mittal:
Certifiably Robust RAG against Retrieval Corruption. CoRR abs/2405.15556 (2024) - [i44]Zhanhao Hu, Julien Piet, Geng Zhao, Jiantao Jiao, David A. Wagner:
Toxicity Detection for Free. CoRR abs/2405.18822 (2024) - 2023
- [j22]Dhanya K. A., P. Vinod, Suleiman Y. Yerima, Abul Bashar, David A. Wagner, Abhiram T., Alan Antony, Ashil K. Shavanas, T. Gireesh Kumar:
Obfuscated Malware Detection in IoT Android Applications Using Markov Images and CNN. IEEE Syst. J. 17(2): 2756-2766 (2023) - [c181]Nabeel Hingun, Chawin Sitawarin, Jerry Li, David A. Wagner:
REAP: A Large-Scale Realistic Adversarial Patch Benchmark. ICCV 2023: 4617-4628 - [c180]Chawin Sitawarin, Kornrapat Pongmala, Yizheng Chen, Nicholas Carlini, David A. Wagner:
Part-Based Models Improve Adversarial Robustness. ICLR 2023 - [c179]Yizheng Chen, Zhoujie Ding, Lamya Alowain, Xinyun Chen, David A. Wagner:
DiverseVul: A New Vulnerable Source Code Dataset for Deep Learning Based Vulnerability Detection. RAID 2023: 654-668 - [c178]Yizheng Chen, Zhoujie Ding, David A. Wagner:
Continuous Learning for Android Malware Detection. USENIX Security Symposium 2023: 1127-1144 - [c177]Julien Piet, Aashish Sharma, Vern Paxson, David A. Wagner:
Network Detection of Interactive SSH Impostors Using Deep Learning. USENIX Security Symposium 2023: 4283-4300 - [i43]Yizheng Chen, Zhoujie Ding, David A. Wagner:
Continuous Learning for Android Malware Detection. CoRR abs/2302.04332 (2023) - [i42]Yizheng Chen, Zhoujie Ding, Xinyun Chen, David A. Wagner:
DiverseVul: A New Vulnerable Source Code Dataset for Deep Learning Based Vulnerability Detection. CoRR abs/2304.00409 (2023) - [i41]Chawin Sitawarin, Jaewon Chang, David Huang, Wesson Altoyan, David A. Wagner:
Defending Against Transfer Attacks From Public Models. CoRR abs/2310.17645 (2023) - [i40]Norman Mu, Sarah Chen, Zifan Wang, Sizhe Chen, David Karamardian, Lulwa Aljeraisy, Dan Hendrycks, David A. Wagner:
Can LLMs Follow Simple Rules? CoRR abs/2311.04235 (2023) - [i39]Julien Piet, Chawin Sitawarin, Vivian Fang, Norman Mu, David A. Wagner:
Mark My Words: Analyzing and Evaluating Language Model Watermarks. CoRR abs/2312.00273 (2023) - [i38]Julien Piet, Maha Alrashed, Chawin Sitawarin, Sizhe Chen, Zeming Wei, Elizabeth Sun, Basel Alomair, David A. Wagner:
Jatmo: Prompt Injection Defense by Task-Specific Finetuning. CoRR abs/2312.17673 (2023) - 2022
- [j21]Nathan Malkin, David A. Wagner, Serge Egelman:
Can Humans Detect Malicious Always-Listening Assistants? A Framework for Crowdsourcing Test Drives. Proc. ACM Hum. Comput. Interact. 6(CSCW2): 1-28 (2022) - [c176]Norman Mu, Alexander Kirillov, David A. Wagner, Saining Xie:
SLIP: Self-supervision Meets Language-Image Pre-training. ECCV (26) 2022: 529-544 - [c175]Chawin Sitawarin, Zachary J. Golan-Strieb, David A. Wagner:
Demystifying the Adversarial Robustness of Random Transformation Defenses. ICML 2022: 20232-20252 - [c174]Nathan Malkin, David A. Wagner, Serge Egelman:
Runtime Permissions for Privacy in Proactive Intelligent Assistants. SOUPS @ USENIX Security Symposium 2022: 633-651 - [i37]Chawin Sitawarin, Zachary J. Golan-Strieb, David A. Wagner:
Demystifying the Adversarial Robustness of Random Transformation Defenses. CoRR abs/2207.03574 (2022) - [i36]Chawin Sitawarin, Kornrapat Pongmala, Yizheng Chen, Nicholas Carlini, David A. Wagner:
Part-Based Models Improve Adversarial Robustness. CoRR abs/2209.09117 (2022) - [i35]Nabeel Hingun, Chawin Sitawarin, Jerry Li, David A. Wagner:
REAP: A Large-Scale Realistic Adversarial Patch Benchmark. CoRR abs/2212.05680 (2022) - 2021
- [c173]Chawin Sitawarin, Supriyo Chakraborty, David A. Wagner:
SAT: Improving Adversarial Training via Curriculum-Based Loss Smoothing. AISec@CCS 2021: 25-36 - [c172]Zhanyuan Zhang, Yizheng Chen, David A. Wagner:
SEAT: Similarity Encoder by Adversarial Training for Detecting Model Extraction Attack Queries. AISec@CCS 2021: 37-48 - [c171]Yizheng Chen, Shiqi Wang, Yue Qin, Xiaojing Liao, Suman Jana, David A. Wagner:
Learning Security Classifiers with Verified Global Robustness Properties. CCS 2021: 477-494 - [c170]Chawin Sitawarin, Evgenios M. Kornaropoulos, Dawn Song, David A. Wagner:
Adversarial Examples for k-Nearest Neighbor Classifiers Based on Higher-Order Voronoi Diagrams. NeurIPS 2021: 15486-15497 - [c169]Grant Ho, Mayank Dhiman, Devdatta Akhawe, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, David A. Wagner:
Hopper: Modeling and Detecting Lateral Movement. USENIX Security Symposium 2021: 3093-3110 - [i34]Henry Xu, An Ju, David A. Wagner:
Model-Agnostic Defense for Lane Detection against Adversarial Attack. CoRR abs/2103.00663 (2021) - [i33]Dequan Wang, An Ju, Evan Shelhamer, David A. Wagner, Trevor Darrell:
Fighting Gradients with Gradients: Dynamic Defenses against Adversarial Attacks. CoRR abs/2105.08714 (2021) - [i32]Yizheng Chen, Shiqi Wang, Yue Qin, Xiaojing Liao, Suman Jana, David A. Wagner:
Learning Security Classifiers with Verified Global Robustness Properties. CoRR abs/2105.11363 (2021) - [i31]Grant Ho, Mayank Dhiman, Devdatta Akhawe, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, David A. Wagner:
Hopper: Modeling and Detecting Lateral Movement (Extended Report). CoRR abs/2105.13442 (2021) - [i30]Norman Mu, Alexander Kirillov, David A. Wagner, Saining Xie:
SLIP: Self-supervision meets Language-Image Pre-training. CoRR abs/2112.12750 (2021) - 2020
- [c168]Michael McCoyd, Won Park, Steven Chen, Neil Shah, Ryan Roggenkemper, Minjune Hwang, Jason Xinyu Liu, David A. Wagner:
Minority Reports Defense: Defending Against Adversarial Patches. ACNS Workshops 2020: 564-582 - [c167]An Ju, David A. Wagner:
E-ABS: Extending the Analysis-By-Synthesis Robust Classification Model to More Complex Image Domains. AISec@CCS 2020: 25-36 - [c166]Chawin Sitawarin, David A. Wagner:
Minimum-Norm Adversarial Examples on KNN and KNN based Models. SP (Workshops) 2020: 34-40 - [c165]Zhanyuan Zhang, Benson Yuan, Michael McCoyd, David A. Wagner:
Clipped BagNet: Defending Against Sticker Attacks with Clipped Bag-of-features. SP (Workshops) 2020: 55-61 - [i29]Chawin Sitawarin, David A. Wagner:
Minimum-Norm Adversarial Examples on KNN and KNN-Based Models. CoRR abs/2003.06559 (2020) - [i28]Chawin Sitawarin, Supriyo Chakraborty, David A. Wagner:
Improving Adversarial Robustness Through Progressive Hardening. CoRR abs/2003.09347 (2020) - [i27]Michael McCoyd, Won Park, Steven Chen, Neil Shah, Ryan Roggenkemper, Minjune Hwang, Jason Xinyu Liu, David A. Wagner:
Minority Reports Defense: Defending Against Adversarial Patches. CoRR abs/2004.13799 (2020) - [i26]Neil Shah, Grant Ho, Marco Schweighauser, M. H. Afifi, Asaf Cidon, David A. Wagner:
A Large-Scale Analysis of Attacker Activity in Compromised Enterprise Accounts. CoRR abs/2007.14030 (2020) - [i25]Chawin Sitawarin, Evgenios M. Kornaropoulos, Dawn Song, David A. Wagner:
Adversarial Examples for k-Nearest Neighbor Classifiers Based on Higher-Order Voronoi Diagrams. CoRR abs/2011.09719 (2020)
2010 – 2019
- 2019
- [j20]Nathan Malkin, Joe Deatrick, Allen Tong, Primal Wijesekera, Serge Egelman, David A. Wagner:
Privacy Attitudes of Smart Speaker Users. Proc. Priv. Enhancing Technol. 2019(4): 250-271 (2019) - [c164]Nathan Malkin, Serge Egelman, David A. Wagner:
Privacy controls for always-listening devices. NSPW 2019: 78-91 - [c163]Chawin Sitawarin, David A. Wagner:
On the Robustness of Deep K-Nearest Neighbors. IEEE Symposium on Security and Privacy Workshops 2019: 1-7 - [c162]Grant Ho, Asaf Cidon, Lior Gavish, Marco Schweighauser, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, David A. Wagner:
Detecting and Characterizing Lateral Phishing at Scale. USENIX Security Symposium 2019: 1273-1290 - [i24]Chawin Sitawarin, David A. Wagner:
On the Robustness of Deep K-Nearest Neighbors. CoRR abs/1903.08333 (2019) - [i23]Steven Chen, Nicholas Carlini, David A. Wagner:
Stateful Detection of Black-Box Adversarial Attacks. CoRR abs/1907.05587 (2019) - [i22]Grant Ho, Asaf Cidon, Lior Gavish, Marco Schweighauser, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, David A. Wagner:
Detecting and Characterizing Lateral Phishing at Scale. CoRR abs/1910.00790 (2019) - 2018
- [j19]Primal Wijesekera, Arjun Baokar, Lynn Tsai, Joel Reardon, Serge Egelman, David A. Wagner, Konstantin Beznosov:
Dynamically Regulating Mobile Application Permissions. IEEE Secur. Priv. 16(1): 64-71 (2018) - [c161]Primal Wijesekera, Joel Reardon, Irwin Reyes, Lynn Tsai, Jung-Wei Chen, Nathan Good, David A. Wagner, Konstantin Beznosov, Serge Egelman:
Contextualizing Privacy Decisions for Better Prediction (and Protection). CHI 2018: 268 - [c160]Inigo Incer, Michael Theodorides, Sadia Afroz, David A. Wagner:
Adversarially Robust Malware Detection Using Monotonic Classification. IWSPA@CODASPY 2018: 54-63 - [c159]Anish Athalye, Nicholas Carlini, David A. Wagner:
Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples. ICML 2018: 274-283 - [c158]Nicholas Carlini, David A. Wagner:
Audio Adversarial Examples: Targeted Attacks on Speech-to-Text. IEEE Symposium on Security and Privacy Workshops 2018: 1-7 - [c157]Michael McCoyd, David A. Wagner:
Background Class Defense Against Adversarial Examples. IEEE Symposium on Security and Privacy Workshops 2018: 96-102 - [c156]Steven Chen, Won Park, Joanna Yang, David A. Wagner:
Inferring Phone Location State. WiMob 2018: 42-47 - [i21]Nicholas Carlini, David A. Wagner:
Audio Adversarial Examples: Targeted Attacks on Speech-to-Text. CoRR abs/1801.01944 (2018) - [i20]Anish Athalye, Nicholas Carlini, David A. Wagner:
Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples. CoRR abs/1802.00420 (2018) - 2017
- [j18]Linda Naeun Lee, David Fifield, Nathan Malkin, Ganesh Iyer, Serge Egelman, David A. Wagner:
A Usability Evaluation of Tor Launcher. Proc. Priv. Enhancing Technol. 2017(3): 90 (2017) - [c155]David A. Wagner:
Security and Machine Learning. CCS 2017: 1 - [c154]Nicholas Carlini, David A. Wagner:
Adversarial Examples Are Not Easily Detected: Bypassing Ten Detection Methods. AISec@CCS 2017: 3-14 - [c153]Michael Theodorides, David A. Wagner:
Breaking active-set backward-edge CFI. HOST 2017: 85-89 - [c152]Christopher Thompson, David A. Wagner:
A Large-Scale Study of Modern Code Review and Security in Open Source Projects. PROMISE 2017: 83-92 - [c151]Lynn Tsai, Primal Wijesekera, Joel Reardon, Irwin Reyes, Serge Egelman, David A. Wagner, Nathan Good, Jung-Wei Chen:
Turtle Guard: Helping Android Users Apply Contextual Privacy Preferences. SOUPS 2017: 145-162 - [c150]Nicholas Carlini, David A. Wagner:
Towards Evaluating the Robustness of Neural Networks. IEEE Symposium on Security and Privacy 2017: 39-57 - [c149]Primal Wijesekera, Arjun Baokar, Lynn Tsai, Joel Reardon, Serge Egelman, David A. Wagner, Konstantin Beznosov:
The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences. IEEE Symposium on Security and Privacy 2017: 1077-1093 - [c148]Grant Ho, Aashish Sharma, Mobin Javed, Vern Paxson, David A. Wagner:
Detecting Credential Spearphishing in Enterprise Settings. USENIX Security Symposium 2017: 469-485 - [c147]Thurston H. Y. Dang, Petros Maniatis, David A. Wagner:
Oscar: A Practical Page-Permissions-Based Scheme for Thwarting Dangling Pointers. USENIX Security Symposium 2017: 815-832 - [i19]Primal Wijesekera, Arjun Baokar, Lynn Tsai, Joel Reardon, Serge Egelman, David A. Wagner, Konstantin Beznosov:
The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences. CoRR abs/1703.02090 (2017) - [i18]Nicholas Carlini, David A. Wagner:
Adversarial Examples Are Not Easily Detected: Bypassing Ten Detection Methods. CoRR abs/1705.07263 (2017) - [i17]Nicholas Carlini, David A. Wagner:
MagNet and "Efficient Defenses Against Adversarial Attacks" are Not Robust to Adversarial Examples. CoRR abs/1711.08478 (2017) - 2016
- [j17]David A. Wagner:
Fairness and the coin flip: technical perspective. Commun. ACM 59(4): 75 (2016) - [c146]Christopher Thompson, David A. Wagner:
Securing Recognizers for Rich Video Applications. SPSM@CCS 2016: 53-62 - [c145]Grant Ho, Derek Leung, Pratyush Mishra, Ashkan Hosseini, Dawn Song, David A. Wagner:
Smart Locks: Lessons for Securing Commodity Internet of Things Devices. AsiaCCS 2016: 461-472 - [c144]Jethro G. Beekman, John L. Manferdelli, David A. Wagner:
Attestation Transparency: Building secure Internet services for legacy clients. AsiaCCS 2016: 687-698 - [c143]Nathan Malkin, Serge Egelman, David A. Wagner:
Recovering High-Value Secrets with SGX and Social Authentication. WAY@SOUPS 2016 - [c142]Nicholas Carlini, Pratyush Mishra, Tavish Vaidya, Yuankai Zhang, Micah Sherr, Clay Shields, David A. Wagner, Wenchao Zhou:
Hidden Voice Commands. USENIX Security Symposium 2016: 513-530 - [i16]Nicholas Carlini, David A. Wagner:
Defensive Distillation is Not Robust to Adversarial Examples. CoRR abs/1607.04311 (2016) - [i15]Michael McCoyd, David A. Wagner:
Spoofing 2D Face Detection: Machines See People Who Aren't There. CoRR abs/1608.02128 (2016) - [i14]Nicholas Carlini, David A. Wagner:
Towards Evaluating the Robustness of Neural Networks. CoRR abs/1608.04644 (2016) - 2015
- [c141]Thurston H. Y. Dang, Petros Maniatis, David A. Wagner:
The Performance Cost of Shadow Stacks and Stack Canaries. AsiaCCS 2015: 555-566 - [c140]Rebecca S. Portnoff, Linda Naeun Lee, Serge Egelman, Pratyush Mishra, Derek Leung, David A. Wagner:
Somebody's Watching Me?: Assessing the Effectiveness of Webcam Indicator Lights. CHI 2015: 1649-1658 - [c139]Nicholas Carlini, Antonio Barresi, Mathias Payer, David A. Wagner, Thomas R. Gross:
Control-Flow Bending: On the Effectiveness of Control-Flow Integrity. USENIX Security Symposium 2015: 161-176 - [c138]Primal Wijesekera, Arjun Baokar, Ashkan Hosseini, Serge Egelman, David A. Wagner, Konstantin Beznosov:
Android Permissions Remystified: A Field Study on Contextual Integrity. USENIX Security Symposium 2015: 499-514 - [i13]Primal Wijesekera, Arjun Baokar, Ashkan Hosseini, Serge Egelman, David A. Wagner, Konstantin Beznosov:
Android Permissions Remystified: A Field Study on Contextual Integrity. CoRR abs/1504.03747 (2015) - [i12]Linda Naeun Lee, Serge Egelman, Joong Hwa Lee, David A. Wagner:
Risk Perceptions for Wearable Devices. CoRR abs/1504.05694 (2015) - 2014
- [c137]David A. Wagner:
Developing Social Capital in Online Communities: The Challenge of Fluidity. AMCIS 2014 - [c136]Serge Egelman, Sakshi Jain, Rebecca S. Portnoff, Kerwell Liao, Sunny Consolvo, David A. Wagner:
Are You Ready to Lock? CCS 2014: 750-761 - [c135]Joshua Tan, Khanh Nguyen, Michael Theodorides, Heidi Negrón-Arroyo, Christopher Thompson, Serge Egelman, David A. Wagner:
The effect of developer-specified explanations for permission requests on smartphone user behavior. CHI 2014: 91-100 - [c134]Nicholas Carlini, David A. Wagner:
ROP is Still Dangerous: Breaking Modern Defenses. USENIX Security Symposium 2014: 385-399 - 2013
- [c133]Elizabeth Ha, David A. Wagner:
Do Android users write about electric sheep? Examining consumer reviews in Google Play. CCNC 2013: 149-157 - [c132]Anne Edmundson, Brian Holtkamp, Emanuel Rivera, Matthew Finifter, Adrian Mettler, David A. Wagner:
An Empirical Study on the Effectiveness of Security Code Review. ESSoS 2013: 197-212 - [c131]Cynthia Sturton, Rohit Sinha, Thurston H. Y. Dang, Sakshi Jain, Michael McCoyd, Wei Yang Tan, Petros Maniatis, Sanjit A. Seshia, David A. Wagner:
Symbolic software model validation. MEMOCODE 2013: 97-108 - [c130]Christopher Thompson, Maritza L. Johnson, Serge Egelman, David A. Wagner, Jennifer King:
When it's better to ask forgiveness than get permission: attribution mechanisms for smartphone resources. SOUPS 2013: 1:1-1:14 - [c129]Matthew Finifter, Devdatta Akhawe, David A. Wagner:
An Empirical Study of Vulnerability Rewards Programs. USENIX Security Symposium 2013: 273-288 - [c128]Eric Kim, Nicholas Carlini, Andrew Chang, George Yiu, Kai Wang, David A. Wagner:
Improved Support for Machine-assisted Ballot-level Audits. EVT/WOTE 2013 - [c127]Erika Chin, David A. Wagner:
Bifocals: Analyzing WebView Vulnerabilities in Android Applications. WISA 2013: 138-159 - [p1]Serge Egelman, Adrienne Porter Felt, David A. Wagner:
Choice Architecture and Smartphone Privacy: There's a Price for That. The Economics of Information Security and Privacy 2013: 211-236 - 2012
- [j16]Philip B. Stark, David A. Wagner:
Evidence-Based Elections. IEEE Secur. Priv. 10(5): 33-41 (2012) - [c126]Adrienne Porter Felt, Serge Egelman, David A. Wagner:
I've got 99 problems, but vibration ain't one: a survey of smartphone users' concerns. SPSM@CCS 2012: 33-44 - [c125]Drew Fisher, Leah Dorner, David A. Wagner:
Short paper: location privacy: user behavior in the field. SPSM@CCS 2012: 51-56 - [c124]David Kantola, Erika Chin, Warren He, David A. Wagner:
Reducing attack surfaces for intra-application communication in android. SPSM@CCS 2012: 69-80 - [c123]Paul Pearce, Adrienne Porter Felt, Gabriel Nunez, David A. Wagner:
AdDroid: privilege separation for applications and advertisers in Android. AsiaCCS 2012: 71-72 - [c122]Rohit Sinha, Cynthia Sturton, Petros Maniatis, Sanjit A. Seshia, David A. Wagner:
Verification with small and short worlds. FMCAD 2012: 68-77 - [c121]Erika Chin, Adrienne Porter Felt, Vyas Sekar, David A. Wagner:
Measuring user confidence in smartphone security and privacy. SOUPS 2012: 1 - [c120]Adrienne Porter Felt, Elizabeth Ha, Serge Egelman, Ariel Haney, Erika Chin, David A. Wagner:
Android permissions: user attention, comprehension, and behavior. SOUPS 2012: 3 - [c119]Patrick Baxter, Anne Edmundson, Keishla Ortiz, Ana Maria Quevedo, Samuel Rodríguez, Cynthia Sturton, David A. Wagner:
Automated Analysis of Election Audit Logs. EVT/WOTE 2012 - [c118]Nicholas Carlini, Adrienne Porter Felt, David A. Wagner:
An Evaluation of the Google Chrome Extension Security Architecture. USENIX Security Symposium 2012: 97-111 - [c117]Adrienne Porter Felt, Serge Egelman, Matthew Finifter, Devdatta Akhawe, David A. Wagner:
How to Ask for Permission. HotSec 2012 - [c116]Kai Wang, Nicholas Carlini, Eric Kim, Ivan Motyashov, Daniel Nguyen, David A. Wagner:
Operator-Assisted Tabulation of Optical Scan Ballots. EVT/WOTE 2012 - [c115]Serge Egelman, Adrienne Porter Felt, David A. Wagner:
Choice Architecture and Smartphone Privacy: There's a Price for That. WEIS 2012 - 2011
- [j15]Moses D. Liskov, Ronald L. Rivest, David A. Wagner:
Tweakable Block Ciphers. J. Cryptol. 24(3): 588-613 (2011) - [c114]Adrienne Porter Felt, Matthew Finifter, Erika Chin, Steve Hanna, David A. Wagner:
A survey of mobile malware in the wild. SPSM@CCS 2011: 3-14 - [c113]