Vitaly Shmatikov, Ph.D.
Affiliations: | 2000 | Stanford University, Palo Alto, CA |
Google:
"Vitaly Shmatikov"Parents
Sign in to add mentorJohn Mitchell | grad student | 2000 | Stanford | |
(Finite -state analysis of security protocols.) |
Children
Sign in to add traineeSuman Jana | grad student | UT Austin | |
Arvind Narayanan | grad student | 2009 |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Shmatikov V. (2015) All your SSL are belong to us Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9092 |
Georgiev M, Jana S, Shmatikov V. (2014) Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks. Ndss Symposium. 2014: 1-15 |
Brubaker C, Jana S, Ray B, et al. (2014) Using Frankencerts for Automated Adversarial Testing of Certificate Validation in SSL/TLS Implementations. Ieee Security & Privacy. 2014: 114-129 |
Jana S, Narayanan A, Shmatikov V. (2013) A scanner darkly: Protecting user privacy from perceptual applications Proceedings - Ieee Symposium On Security and Privacy. 349-363 |
Dunn AM, Lee MZ, Jana S, et al. (2012) Eternal Sunshine of the Spotless Machine: Protecting Privacy with Ephemeral Channels. Proceedings of the -- Usenix Symposium On Operating Systems Design and Implementation (Osdi) / Usenix Association. Usenix Symposium On Operating Systems Design and Implementation. 61-75 |
Georgiev M, Iyengar S, Jana S, et al. (2012) The most dangerous code in the world: Validating SSL certificates in non-browser software Proceedings of the Acm Conference On Computer and Communications Security. 38-49 |
Son S, McKinley KS, Shmatikov V. (2011) Rolecast: Finding missing security checks when you do not know what checks are Proceedings of the Conference On Object-Oriented Programming Systems, Languages, and Applications, Oopsla. 1069-1083 |
Shmatikov V. (2011) Anonymity is not privacy Communications of the Acm. 54: 132 |
Srivastava V, Bond MD, McKinley KS, et al. (2011) A security policy oracle: Detecting security holes using multiple API implementations Proceedings of the Acm Sigplan Conference On Programming Language Design and Implementation (Pldi). 343-354 |
Calandrino JA, Kilzer A, Narayanan A, et al. (2011) "You might also like:" Privacy risks of collaborative filtering Proceedings - Ieee Symposium On Security and Privacy. 231-246 |