Rob Johnson
Rob Johnson
VMware Research
Verified email at vmware.com
TitleCited byYear
Homomorphic signature schemes
R Johnson, D Molnar, D Song, D Wagner
Topics in Cryptology - CT-RSA 2002, 204-245, 2002
4832002
Touching from a distance: Website fingerprinting attacks and defenses
X Cai, XC Zhang, B Joshi, R Johnson
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
2552012
Effective attacks and provable defenses for website fingerprinting
T Wang, X Cai, R Nithyanand, R Johnson, I Goldberg
23rd {USENIX} Security Symposium ({USENIX} Security 14), 143-157, 2014
2042014
Finding User/Kernel Pointer Bugs with Type Inference.
R Johnson, D Wagner
USENIX Security Symposium 2 (0), 0, 2004
1592004
RICH: Automatically protecting against integer-based vulnerabilities
D Brumley, T Chiueh, R Johnson, H Lin, D Song
Network and Distributed Systems Security (NDSS), 2007
1252007
A practical mimicry attack against powerful system-call monitors
C Parampalli, R Sekar, R Johnson
Proceedings of the 2008 ACM symposium on Information, computer and …, 2008
1172008
Don't Thrash: How to Cache your Hash on Flash
MA Bender, M Farach-Colton, R Johnson, BC Kuszmaul, D Medjedovic, ...
Proceedings of the 3rd USENIX conference on Hot topics in storage and file …, 2011
1072011
More content-less control: Access control in the web 2.0
M Hart, R Johnson, A Stent
IEEE Web 2.0 Security and Privacy Workshop 2, 2007
1062007
A systematic approach to developing and evaluating website fingerprinting defenses
X Cai, R Nithyanand, T Wang, R Johnson, I Goldberg
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
1052014
Cs-buflo: A congestion sensitive website fingerprinting defense
X Cai, R Nithyanand, R Johnson
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 121-130, 2014
752014
Text classification for data loss prevention
M Hart, P Manadhata, R Johnson
International Symposium on Privacy Enhancing Technologies Symposium, 18-37, 2011
722011
BetrFS: A right-optimized write-optimized file system
W Jannen, J Yuan, Y Zhan, A Akshintala, J Esmet, Y Jiao, A Mittal, ...
13th {USENIX} Conference on File and Storage Technologies ({FAST} 15), 301-315, 2015
702015
Flow-Insensitive Type Qualifiers
JS Foster, R Johnson, J Kodumal, A Aiken
Transactions on Programming Languages, 2008
702008
Exploiting unix file-system races via algorithmic complexity attacks
X Cai, Y Gui, R Johnson
2009 30th IEEE Symposium on Security and Privacy, 27-41, 2009
652009
A general-purpose counting filter: Making every bit count
P Pandey, MA Bender, R Johnson, R Patro
Proceedings of the 2017 ACM International Conference on Management of Data …, 2017
522017
Fixing races for fun and profit: how to abuse atime
N Borisov, R Johnson, N Sastry, D Wagner
USENIX Security, 2005
492005
Glove: A bespoke website fingerprinting defense
R Nithyanand, X Cai, R Johnson
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 131-134, 2014
472014
Language of vandalism: Improving Wikipedia vandalism detection via stylometric analysis
M Harpalani, M Hart, S Singh, R Johnson, Y Choi
Proceedings of the 49th Annual Meeting of the Association for Computational …, 2011
372011
Methods, apparatus, and program products for inferring service usage
JN Staddon, RT Johnson
US Patent 7,296,158, 2007
372007
Optimizing every operation in a write-optimized file system
J Yuan, Y Zhan, W Jannen, P Pandey, A Akshintala, K Chandnani, P Deo, ...
14th {USENIX} Conference on File and Storage Technologies ({FAST} 16), 1-14, 2016
342016
The system can't perform the operation now. Try again later.
Articles 1–20