Preprint Use Privacy in Data-Driven Systems: Theory and Experiments with Machine Learnt Programs 2017 Datta A, Fredrikson M, Ko G, Mardziel P, Sen S
Conference Verifying and Synthesizing Constant-Resource Implementations with Types 2017 • IEEE Symposium on Security and Privacy: Proceedings • 710-728 Van CN, Dehesa-Azuara M, Fredrikson M, Hoffmann J
Conference A Methodology for Formalizing Model-Inversion Attacks 2016 • Proceedings of the Computer Security Foundations Workshop • 355-370 Wu X, Fredrikson M, Jha S, Naughton JF
Conference The Limitations of Deep Learning in Adversarial Settings 2016 • 1ST IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY • 372-387 Papernot N, McDaniel P, Jha S, Fredrikson M, Celik ZB, Swami A
Conference Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures 2015 • Proceedings of the ACM Conference on Computer and Communications Security • 1322-1333 Fredrikson M, Jha S, Ristenpart T
Journal Article Revisiting Differentially Private Regression: Lessons From Learning Theory and their Consequences 2015 Wu X, Fredrikson M, Wu W, Jha S, Naughton JF
Preprint Revisiting Differentially Private Regression: Lessons From Learning Theory and their Consequences 2015 Wu X, Fredrikson M, Wu W, Jha S, Naughton JF
Preprint The Limitations of Deep Learning in Adversarial Settings 2015 Papernot N, McDaniel P, Jha S, Fredrikson M, Celik ZB, Swami A
Conference On the Practical Exploitability of Dual EC in TLS Implementations 2014 • PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM • 319-335 Checkoway S, Fredrikson M, Niederhagen R, Everspaugh A, Green M, Lange T, Ristenpart T, Bernstein DJ, Maskiewicz J, Shacham H
Conference Privacy in Pharmacogenetics: An End-to-End Case Study of Personalized Warfarin Dosing 2014 • PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM • 17-32 Fredrikson M, Lantz E, Jha S, Lin S, Page D, Ristenpart T
Conference Satisfiability Modulo Counting: A New Approach for Analyzing Privacy Properties 2014 • Proceedings - Symposium on Logic in Computer Science Fredrikson M, Jha S
Conference ZØ: An optimizing distributing zero-knowledge compiler 2014 • Proceedings of the 23rd USENIX Security Symposium • 909-924 Fredrikson M, Livshits B
Conference Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors 2013 • PROCEEDINGS OF THE 2013 8TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE: THE AMERICAS (MALWARE) • 41-50 Jha S, Fredrikson M, Christodoresu M, Sailer R, Yan X
Conference Efficient Runtime Policy Enforcement Using Counterexample-Guided Abstraction Refinement 2012 • Lecture Notes in Computer Science • 7358:548-563 Fredrikson M, Joiner R, Jha S, Reps T, Porras P, Saïdi H, Yegneswaran V
Conference Dynamic Behavior Matching: A Complexity Analysis and New Approximation Algorithms 2011 • Lecture Notes in Computer Science • 6803:252-+ Fredrikson M, Christodorescu M, Jha S
Chapter End-to-End Software Diversification of Internet Services 2011 • Advances in Information Security • 54:117-130 Christodorescu M, Fredrikson M, Jha S, Giffin J
Conference REPRIV: Re-Imagining Content Personalization and In-Browser Privacy 2011 • IEEE Symposium on Security and Privacy: Proceedings • 131-146 Fredrikson M, Livshits B
Conference Verified Security for Browser Extensions 2011 • IEEE Symposium on Security and Privacy: Proceedings • 115-130 Guha A, Fredrikson M, Livshits B, Swamy N
Journal Article A Declarative Framework for Intrusion Analysis 2010 • Advances in Information Security • 46:179-200 Fredrikson M, Christodorescu M, Giffin J, Jha S
Conference Automatic generation of remediation procedures for malware infections 2010 • Proceedings of the 19th USENIX Security Symposium • 419-434 Paleari R, Martignoni L, Passerini E, Davidson D, Fredrikson M, Giffin J, Jha S
Journal Article Cyber SA: Situational Awareness for Cyber Defense 2010 • Advances in Information Security • 46:3-14 Barford P, Dacier M, Dietterich TG, Fredrikson M, Giffin J, Jajodia S, Jha S, Li J, Liu P, Ning P, Ou X, Song D, Strater L, Swarup V, Tadda G, Wang C, Yen J
Chapter Mining Large Information Networks by Graph Summarization 2010 • LINK MINING: MODELS, ALGORITHMS, AND APPLICATIONS • 475-501 Chen C, Lin CX, Fredrikson M, Christodorescu M, Yan X, Han J
Conference Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors 2010 • IEEE Symposium on Security and Privacy: Proceedings • 45-60 Fredrikson M, Jha S, Christodorescu M, Sailer R, Yan X