Automated whitebox fuzz testing. P Godefroid, MY Levin, DA Molnar NDSS 8, 151-166, 2008 | 1770 | 2008 |
Privacy and security in library RFID: Issues, practices, and architectures D Molnar, D Wagner Proceedings of the 11th ACM conference on Computer and communications …, 2004 | 1107 | 2004 |
SAGE: whitebox fuzzing for security testing P Godefroid, MY Levin, D Molnar Communications of the ACM 55 (3), 40-44, 2012 | 873 | 2012 |
The free haven project: Distributed anonymous storage service R Dingledine, MJ Freedman, D Molnar Designing Privacy Enhancing Technologies: International Workshop on Design …, 2001 | 774 | 2001 |
Homomorphic signature schemes R Johnson, D Molnar, D Song, D Wagner Cryptographers’ track at the RSA conference, 244-262, 2002 | 629 | 2002 |
Security and privacy issues in e-passports A Juels, D Molnar, D Wagner First International Conference on Security and Privacy for Emerging Areas in …, 2005 | 479 | 2005 |
A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags D Molnar, A Soppera, D Wagner Selected Areas in Cryptography: 12th International Workshop, SAC 2005 …, 2006 | 411 | 2006 |
Enabling security in cloud storage {SLAs} with {CloudProof} RA Popa, JR Lorch, D Molnar, HJ Wang, L Zhuang 2011 USENIX Annual Technical Conference (USENIX ATC 11), 2011 | 392 | 2011 |
Security and privacy for augmented reality systems F Roesner, T Kohno, D Molnar Communications of the ACM 57 (4), 88-96, 2014 | 355 | 2014 |
Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs. D Molnar, XC Li, DA Wagner USENIX Security Symposium 9, 67-82, 2009 | 317 | 2009 |
Short chosen-prefix collisions for MD5 and the creation of a rogue CA certificate M Stevens, A Sotirov, J Appelbaum, A Lenstra, D Molnar, DA Osvik, ... Advances in Cryptology-CRYPTO 2009: 29th Annual International Cryptology …, 2009 | 311 | 2009 |
The program counter security model: Automatic detection and removal of control-flow side channel attacks D Molnar, M Piotrowski, D Schultz, D Wagner Information Security and Cryptology-ICISC 2005: 8th International Conference …, 2006 | 307 | 2006 |
Active property checking P Godefroid, MY Levin, D Molnar US Patent 8,549,486, 2013 | 284 | 2013 |
Billions and billions of constraints: Whitebox fuzz testing in production E Bounimova, P Godefroid, D Molnar 2013 35th International Conference on Software Engineering (ICSE), 122-131, 2013 | 251 | 2013 |
Fast and precise sanitizer analysis with {BEK} P Hooimeijer, B Livshits, D Molnar, P Saxena, M Veanes 20th USENIX Security Symposium (USENIX Security 11), 2011 | 207 | 2011 |
MD5 considered harmful today, creating a rogue CA certificate A Sotirov, M Stevens, J Appelbaum, AK Lenstra, D Molnar, DA Osvik, ... 25th Annual Chaos Communication Congress, 2008 | 198 | 2008 |
Symbolic finite state transducers: Algorithms and applications M Veanes, P Hooimeijer, B Livshits, D Molnar, N Bjorner Proceedings of the 39th annual ACM SIGPLAN-SIGACT symposium on Principles of …, 2012 | 193 | 2012 |
SAGE: Whitebox Fuzzing for Security Testing: SAGE has had a remarkable impact at Microsoft. P Godefroid, MY Levin, D Molnar Queue 10 (1), 20-27, 2012 | 192 | 2012 |
SCRIPTGARD: automatic context-sensitive sanitization for large-scale legacy web applications P Saxena, D Molnar, B Livshits Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 168 | 2011 |
Enabling {Fine-Grained} permissions for augmented reality applications with recognizers S Jana, D Molnar, A Moshchuk, A Dunn, B Livshits, HJ Wang, E Ofek 22nd USENIX Security Symposium (USENIX Security 13), 415-430, 2013 | 153 | 2013 |