Follow
Rob Johnson
Rob Johnson
VMware Research
Verified email at vmware.com
Title
Cited by
Cited by
Year
Homomorphic signature schemes
R Johnson, D Molnar, D Song, D Wagner
Topics in Cryptology - CT-RSA 2002, 204-245, 2002
5592002
Touching from a distance: Website fingerprinting attacks and defenses
X Cai, XC Zhang, B Joshi, R Johnson
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
4282012
Effective attacks and provable defenses for website fingerprinting
T Wang, X Cai, R Nithyanand, R Johnson, I Goldberg
23rd USENIX Security Symposium (USENIX Security 14), 143-157, 2014
3862014
A systematic approach to developing and evaluating website fingerprinting defenses
X Cai, R Nithyanand, T Wang, R Johnson, I Goldberg
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
2142014
Don't Thrash: How to Cache your Hash on Flash
MA Bender, M Farach-Colton, R Johnson, BC Kuszmaul, D Medjedovic, ...
Proceedings of the 3rd USENIX conference on Hot topics in storage and file …, 2011
2062011
Finding user/kernel pointer bugs with type inference.
R Johnson, D Wagner
USENIX Security Symposium 2 (0), 0, 2004
1852004
Cs-buflo: A congestion sensitive website fingerprinting defense
X Cai, R Nithyanand, R Johnson
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 121-130, 2014
1582014
RICH: Automatically protecting against integer-based vulnerabilities
D Brumley, T Chiueh, R Johnson, H Lin, D Song
Network and Distributed Systems Security (NDSS), 2007
1472007
A general-purpose counting filter: Making every bit count
P Pandey, MA Bender, R Johnson, R Patro
Proceedings of the 2017 ACM international conference on Management of Data …, 2017
1382017
A practical mimicry attack against powerful system-call monitors
C Parampalli, R Sekar, R Johnson
Proceedings of the 2008 ACM symposium on Information, computer and …, 2008
1352008
{BetrFS}: A {Right-Optimized}{Write-Optimized} File System
W Jannen, J Yuan, Y Zhan, A Akshintala, J Esmet, Y Jiao, A Mittal, ...
13th USENIX Conference on File and Storage Technologies (FAST 15), 301-315, 2015
1242015
More content-less control: Access control in the web 2.0
M Hart, R Johnson, A Stent
IEEE Web 2.0 Security and Privacy Workshop 2, 2007
1212007
Text classification for data loss prevention
M Hart, P Manadhata, R Johnson
International Symposium on Privacy Enhancing Technologies Symposium, 18-37, 2011
1112011
Glove: A bespoke website fingerprinting defense
R Nithyanand, X Cai, R Johnson
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 131-134, 2014
862014
Mantis: a fast, small, and exact large-scale sequence-search index
P Pandey, F Almodaresi, MA Bender, M Ferdman, R Johnson, R Patro
Cell systems 7 (2), 201-207. e4, 2018
842018
Flow-Insensitive Type Qualifiers
JS Foster, R Johnson, J Kodumal, A Aiken
Transactions on Programming Languages, 2008
812008
Exploiting unix file-system races via algorithmic complexity attacks
X Cai, Y Gui, R Johnson
2009 30th IEEE Symposium on Security and Privacy, 27-41, 2009
782009
Squeakr: an exact and approximate k-mer counting system
P Pandey, MA Bender, R Johnson, R Patro
Bioinformatics 34 (4), 568-575, 2018
732018
File systems fated for senescence? nonsense, says science!
A Conway, A Bakshi, Y Jiao, W Jannen, Y Zhan, J Yuan, MA Bender, ...
15th USENIX Conference on File and Storage Technologies (FAST 17), 45-58, 2017
642017
Optimizing every operation in a write-optimized file system
J Yuan, Y Zhan, W Jannen, P Pandey, A Akshintala, K Chandnani, P Deo, ...
14th USENIX Conference on File and Storage Technologies (FAST 16), 1-14, 2016
592016
The system can't perform the operation now. Try again later.
Articles 1–20