Eric Pauley
Efficient Storage Integrity in Adversarial Settings
Secure IP Address Allocation at Cloud Scale
ParTEETor: A System for Partial Deployments of TEEs within Tor
Characterizing the Modification Space of Signature IDS Rules
The CVE Wayback Machine: Measuring Coordinated Disclosure from Exploits Against 2 Years of Zero-Days
Systematic Evaluation of Geolocation Privacy Mechanisms
DScope: A Cloud-Native Internet Telescope
The Space of Adversarial Strategies
Securing Cloud File Systems using Shielded Execution
Farewell to the Era of Cheap EC2 Spot Instances
Understanding the Ethical Frameworks of Internet Measurement Studies
The Need for Standardized Secret Scanning
Leveraging Mispriced AWS Spot Instances for Fun and Savings
Saving 90% vs. GitHub Codespaces with EC2 Spot Instances
Performant Binary Fuzzing without Source Code using Static Instrumentation
Privacy-Preserving Protocols for Smart Cameras and Other IoT Devices
Measuring and Mitigating the Risk of IP Reuse on Public Clouds
Measuring and Mitigating the Risk of IP Reuse on Public Clouds
Securing Cloud Services against Squatting Attacks
Cloud Squatting: The Risk of IP Reuse on Public Clouds
Building a Privacy-Preserving Smart Camera System
On the Robustness of Domain Constraints
Static Instrumentation for Performant Binary Fuzzing
Program Analysis of Commodity IoT Applications for Security and Privacy: Opportunities and Challenges
Broadcast Channels in Go
Single-Implementation Interfaces in Go