Vitaly Shmatikov, Ph.D.

Affiliations: 
2000 Stanford University, Palo Alto, CA 
Google:
"Vitaly Shmatikov"

Parents

Sign in to add mentor
John Mitchell grad student 2000 Stanford
 (Finite -state analysis of security protocols.)

Children

Sign in to add trainee
Suman Jana grad student UT Austin
Arvind Narayanan grad student 2009
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Shmatikov V. (2015) All your SSL are belong to us Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9092
Georgiev M, Jana S, Shmatikov V. (2014) Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks. Ndss Symposium. 2014: 1-15
Brubaker C, Jana S, Ray B, et al. (2014) Using Frankencerts for Automated Adversarial Testing of Certificate Validation in SSL/TLS Implementations. Ieee Security & Privacy. 2014: 114-129
Jana S, Narayanan A, Shmatikov V. (2013) A scanner darkly: Protecting user privacy from perceptual applications Proceedings - Ieee Symposium On Security and Privacy. 349-363
Dunn AM, Lee MZ, Jana S, et al. (2012) Eternal Sunshine of the Spotless Machine: Protecting Privacy with Ephemeral Channels. Proceedings of the -- Usenix Symposium On Operating Systems Design and Implementation (Osdi) / Usenix Association. Usenix Symposium On Operating Systems Design and Implementation. 61-75
Georgiev M, Iyengar S, Jana S, et al. (2012) The most dangerous code in the world: Validating SSL certificates in non-browser software Proceedings of the Acm Conference On Computer and Communications Security. 38-49
Son S, McKinley KS, Shmatikov V. (2011) Rolecast: Finding missing security checks when you do not know what checks are Proceedings of the Conference On Object-Oriented Programming Systems, Languages, and Applications, Oopsla. 1069-1083
Shmatikov V. (2011) Anonymity is not privacy Communications of the Acm. 54: 132
Srivastava V, Bond MD, McKinley KS, et al. (2011) A security policy oracle: Detecting security holes using multiple API implementations Proceedings of the Acm Sigplan Conference On Programming Language Design and Implementation (Pldi). 343-354
Calandrino JA, Kilzer A, Narayanan A, et al. (2011) "You might also like:" Privacy risks of collaborative filtering Proceedings - Ieee Symposium On Security and Privacy. 231-246
See more...