Follow
David Molnar
David Molnar
Unknown affiliation
Verified email at microsoft.com
Title
Cited by
Cited by
Year
Automated whitebox fuzz testing.
P Godefroid, MY Levin, DA Molnar
NDSS 8, 151-166, 2008
17702008
Privacy and security in library RFID: Issues, practices, and architectures
D Molnar, D Wagner
Proceedings of the 11th ACM conference on Computer and communications …, 2004
11072004
SAGE: whitebox fuzzing for security testing
P Godefroid, MY Levin, D Molnar
Communications of the ACM 55 (3), 40-44, 2012
8732012
The free haven project: Distributed anonymous storage service
R Dingledine, MJ Freedman, D Molnar
Designing Privacy Enhancing Technologies: International Workshop on Design …, 2001
7742001
Homomorphic signature schemes
R Johnson, D Molnar, D Song, D Wagner
Cryptographers’ track at the RSA conference, 244-262, 2002
6292002
Security and privacy issues in e-passports
A Juels, D Molnar, D Wagner
First International Conference on Security and Privacy for Emerging Areas in …, 2005
4792005
A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags
D Molnar, A Soppera, D Wagner
Selected Areas in Cryptography: 12th International Workshop, SAC 2005 …, 2006
4112006
Enabling security in cloud storage {SLAs} with {CloudProof}
RA Popa, JR Lorch, D Molnar, HJ Wang, L Zhuang
2011 USENIX Annual Technical Conference (USENIX ATC 11), 2011
3922011
Security and privacy for augmented reality systems
F Roesner, T Kohno, D Molnar
Communications of the ACM 57 (4), 88-96, 2014
3552014
Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs.
D Molnar, XC Li, DA Wagner
USENIX Security Symposium 9, 67-82, 2009
3172009
Short chosen-prefix collisions for MD5 and the creation of a rogue CA certificate
M Stevens, A Sotirov, J Appelbaum, A Lenstra, D Molnar, DA Osvik, ...
Advances in Cryptology-CRYPTO 2009: 29th Annual International Cryptology …, 2009
3112009
The program counter security model: Automatic detection and removal of control-flow side channel attacks
D Molnar, M Piotrowski, D Schultz, D Wagner
Information Security and Cryptology-ICISC 2005: 8th International Conference …, 2006
3072006
Active property checking
P Godefroid, MY Levin, D Molnar
US Patent 8,549,486, 2013
2842013
Billions and billions of constraints: Whitebox fuzz testing in production
E Bounimova, P Godefroid, D Molnar
2013 35th International Conference on Software Engineering (ICSE), 122-131, 2013
2512013
Fast and precise sanitizer analysis with {BEK}
P Hooimeijer, B Livshits, D Molnar, P Saxena, M Veanes
20th USENIX Security Symposium (USENIX Security 11), 2011
2072011
MD5 considered harmful today, creating a rogue CA certificate
A Sotirov, M Stevens, J Appelbaum, AK Lenstra, D Molnar, DA Osvik, ...
25th Annual Chaos Communication Congress, 2008
1982008
Symbolic finite state transducers: Algorithms and applications
M Veanes, P Hooimeijer, B Livshits, D Molnar, N Bjorner
Proceedings of the 39th annual ACM SIGPLAN-SIGACT symposium on Principles of …, 2012
1932012
SAGE: Whitebox Fuzzing for Security Testing: SAGE has had a remarkable impact at Microsoft.
P Godefroid, MY Levin, D Molnar
Queue 10 (1), 20-27, 2012
1922012
SCRIPTGARD: automatic context-sensitive sanitization for large-scale legacy web applications
P Saxena, D Molnar, B Livshits
Proceedings of the 18th ACM conference on Computer and communications …, 2011
1682011
Enabling {Fine-Grained} permissions for augmented reality applications with recognizers
S Jana, D Molnar, A Moshchuk, A Dunn, B Livshits, HJ Wang, E Ofek
22nd USENIX Security Symposium (USENIX Security 13), 415-430, 2013
1532013
The system can't perform the operation now. Try again later.
Articles 1–20