Rob Johnson
Rob Johnson
VMware Research
Verified email at
TitleCited byYear
Homomorphic signature schemes
R Johnson, D Molnar, D Song, D Wagner
Topics in Cryptology - CT-RSA 2002, 204-245, 2002
Touching from a distance: Website fingerprinting attacks and defenses
X Cai, XC Zhang, B Joshi, R Johnson
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
Effective attacks and provable defenses for website fingerprinting
T Wang, X Cai, R Nithyanand, R Johnson, I Goldberg
23rd {USENIX} Security Symposium ({USENIX} Security 14), 143-157, 2014
Finding User/Kernel Pointer Bugs with Type Inference.
R Johnson, D Wagner
USENIX Security Symposium 2 (0), 0, 2004
RICH: Automatically protecting against integer-based vulnerabilities
D Brumley, T Chiueh, R Johnson, H Lin, D Song
Network and Distributed Systems Security (NDSS), 2007
A practical mimicry attack against powerful system-call monitors
C Parampalli, R Sekar, R Johnson
Proceedings of the 2008 ACM symposium on Information, computer and …, 2008
Don't Thrash: How to Cache your Hash on Flash
MA Bender, M Farach-Colton, R Johnson, BC Kuszmaul, D Medjedovic, ...
Proceedings of the 3rd USENIX conference on Hot topics in storage and file …, 2011
More content-less control: Access control in the web 2.0
M Hart, R Johnson, A Stent
IEEE Web 2.0 Security and Privacy Workshop 2, 2007
A systematic approach to developing and evaluating website fingerprinting defenses
X Cai, R Nithyanand, T Wang, R Johnson, I Goldberg
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
Cs-buflo: A congestion sensitive website fingerprinting defense
X Cai, R Nithyanand, R Johnson
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 121-130, 2014
Text classification for data loss prevention
M Hart, P Manadhata, R Johnson
International Symposium on Privacy Enhancing Technologies Symposium, 18-37, 2011
BetrFS: A right-optimized write-optimized file system
W Jannen, J Yuan, Y Zhan, A Akshintala, J Esmet, Y Jiao, A Mittal, ...
13th {USENIX} Conference on File and Storage Technologies ({FAST} 15), 301-315, 2015
Flow-Insensitive Type Qualifiers
JS Foster, R Johnson, J Kodumal, A Aiken
Transactions on Programming Languages, 2008
Exploiting unix file-system races via algorithmic complexity attacks
X Cai, Y Gui, R Johnson
2009 30th IEEE Symposium on Security and Privacy, 27-41, 2009
A general-purpose counting filter: Making every bit count
P Pandey, MA Bender, R Johnson, R Patro
Proceedings of the 2017 ACM International Conference on Management of Data …, 2017
Fixing races for fun and profit: how to abuse atime
N Borisov, R Johnson, N Sastry, D Wagner
USENIX Security, 2005
Glove: A bespoke website fingerprinting defense
R Nithyanand, X Cai, R Johnson
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 131-134, 2014
Language of vandalism: Improving Wikipedia vandalism detection via stylometric analysis
M Harpalani, M Hart, S Singh, R Johnson, Y Choi
Proceedings of the 49th Annual Meeting of the Association for Computational …, 2011
Methods, apparatus, and program products for inferring service usage
JN Staddon, RT Johnson
US Patent 7,296,158, 2007
Optimizing every operation in a write-optimized file system
J Yuan, Y Zhan, W Jannen, P Pandey, A Akshintala, K Chandnani, P Deo, ...
14th {USENIX} Conference on File and Storage Technologies ({FAST} 16), 1-14, 2016
The system can't perform the operation now. Try again later.
Articles 1–20