J. Vilk, D. Molnar, E. Ofek, C. Rossbach, B. Livshits, A. Moshchuk, H. Wang, and R. Gal. "SurroundWeb:Mitigating Privacy Concerns in a 3D Web Browser." IEEE Symposium on Security and Privacy 2015.
M. Veanes, T. Mytkowicz, D. Molnar, and B. Livshits. "Data Parallel String Manipulating Programs." POPL 2015.
R. Cochran, L. D'Antoni, B. Livshits, D. Molnar, and M. Veanes. "Program Boosting: Program Synthesis via Crowd-Sourcing." POPL 2015.
I. Rae, G. Venolia, J. Tang, and D. Molnar. "A Framework for Understanding and Designing Telepresence." CSCW 2015.
F. Roesner, D. Molnar, A. Moshchuk, T. Kohno, and H.J. Wang. "World-Driven Access Control for Continuous Sensing." ACM CCS 2014.
Christopher Smowton, Jacob R. Lorch, David Molnar, Stefan Saroiu, and Alec Wolman. Zero-Effort Payments: Design, Deployment, and Lessons. Ubicomp 2014. PDF
Loris D'Antoni, Margus Veanes, Benjamin Livshits, and David Molnar. FAST: a Transducer-Based Language for Tree Manipulation, in PLDI 2014: Programming Language Design and Implementation, ACM, June 2014
F. Roesner, T. Kohno, D. Molnar. "Security and Privacy for Augmented Reality Systems." Communications of the ACM, April 2014 (cover story).
S. Jana, D. Molnar, A. Moshchuk, A. Dunn, B. Livshits, H.J. Wang, E. Ofek. "Enabling fine-grained permissions for augmented reality applications with recognizers." Usenix Security Symposium 2013.
L. D'Antoni, A. Dunn, S. Jana, T. Kohno, B. Livshits, D. Molnar A. Moshchuk, E. Ofek, F. Roesner, T. S. Saponas, M. Veanes, H. J. Wang. "Operating System Support for Augmented Reality Applications." Workshop on Hot Topics in Operating Systems (HotOS) 2013.
E. Bounimova, P. Godefroid, D. Molnar. "Billions and Billions of Constraints: Whitebox Fuzz Testing in Production" ICSE 2013.
P. Godefroid, M.Y. Levin, D. Molnar. "SAGE: Whitebox fuzzing for security testing." Communications of the ACM, pages 40-44 2012.
Margus Veanes, Pieter Hooimeijer, Benjamin Livshits, David Molnar, Nikolaj Bjorner "Symbolic Finite State Transducers: Algorithms and Applications" POPL 2012: 39th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL 2012) pp. 137-150, Philadelphia, Pennsylvania, January 2012
P. Saxena, D. Molnar, B. Livshits. "ScriptGard: Automatic Context-Sensitive Sanitization for Large-Scale Legacy Web Applications" ACM Computer and Communications Security 2011.
P. Hooimeijer, B. Livshits, D. Molnar, P. Saxena, M. Veanes. "Fast and Precise Sanitizer Analysis with BEK." Usenix Security 2011.
R. A. Popa, J. Lorch, D. Molnar, H. Wang, L. Zhuang. "Enabling Security in Cloud Storage SLAs with CloudProof." Usenix Technical Conference 2011.
D. Molnar, S. Egelman, and N. Christin. "This Is Your Data on Drugs:
Lessons Computer Security Can Learn From The Drug War."
New Security Paradigms Workshop 2010.
D. Molnar, S. Schechter. "Self Hosting vs. Cloud Hosting: Accounting for
the security impact of hosting in the cloud."
WEIS 2010.
S. Egelman, D. Molnar, N. Christin, A. Acquisti, C. Herley, and S.
Krishnamurthi. "Please Continue to Hold: An empirical study on
user tolerance of security delays."
WEIS 2010.
M. Stevens, A. Sotirov, J. Appelbaum, A. Lenstra, D. Molnar, D. A. Osvik,
B. de Weger "Short chosen-prefix collisions for MD5 and the creation of a
rogue CA certificate."
CRYPTO 2009.
D. Molnar, X. C. Li, and D. Wagner "Dynamic Test Generation To Find Integer Bugs in
x86 Binary Linux Programs."
USENIX Security 2009, to appear. See our draft paper.
Comments welcomed!
P. Godefroid, M.Y. Levin, and D. Molnar "Active Property Checking."
EMSOFT 2008.
See also
Microsoft
Technical Report MSR-TR-2007-91, July 2007
P. Godefroid, M.Y. Levin, and D. Molnar "Automated Whitebox Fuzz
Testing."
Network
Distributed Security Symposium (NDSS) 2008.
See also Microsoft
Technical Report MSR-TR-2007-58, May 2007
N. Hopper, D. Molnar, and D. Wagner "From Weak to Strong Watermarking."
Theory of Cryptography Conference (TCC) 2007.
eprint page
C. Crutchfield, D. Molnar, and D. Turner "Approximate Measurement of Voter
Privacy Loss in an Election With Precinct Reports." NIST/NSF Voting
Systems Rating Workshop. 2006.
Workshop
version.
D. Molnar, T. Kohno, N. Sastry, and D. Wagner "Tamper-Evident,
History-Independent, Subliminal-Free Data Structures on PROM Storage -or-
How to Store Ballots on a Voting Machine." Extended abstract (6 pages)
in IEEE Security and Privacy ("Oakland") 2006.
Short version: PS PDF Long
version: eprint page
C. Crutchfield, D. Molnar, D. Turner, and D. Wagner
"Generic On-line/Off-line
Threshold Signatures." Public Key Cryptography (PKC)
2006.
eprint page
D. Molnar, M. Piotrowski, D. Schultz, and D. Wagner "The Program Counter
Security Model: Automatic Detection and Removal of Control-Flow Side
Channel Attacks." ICISC
2005.
Conference version: PDF
Long version: eprint page
Source code (NO SUPPORT OFFERED): .TGZ
D. Molnar, A. Soppera, and D. Wagner "RFID Privacy Through Trusted
Computing." (Short Paper) WPES
2005.
PDF
C. Gentry, D. Molnar, and Z. Ramzan
"Efficient Designated Confirmer Signatures Without
Random Oracles or General Zero-Knowledge Proofs."
ASIACRYPT 2005.
Springer-Verlag online
proceedings.
R. Jain, D. Molnar, and Z. Ramzan "Towards Understanding Algorithmic
Factors Affecting Energy Consumption: Switching Complexity,
Randomness, and Preliminary Experiments." DIAL M / POMC
2005.
PS PDF
D. Molnar, A. Soppera, and D. Wagner "A Scalable, Delegatable Pseudonym
Protocol Enabling Ownership Transfer of RFID Tags." Selected Areas in Cryptography
2005.
Conference version: PDF
Long version: eprint page
A. Juels, D. Molnar, and D. Wagner "Security and Privacy Issues in
E-Passports." IEEE
SecureComm 2005.
PDF
eprint page
S. Draper, P. Ishwar, D. Molnar, V. Prabhakaran, K. Ramchandran, D.
Schonberg, and D. Wagner "An Analysis of PMF Based Tests for Detection of
Least Significant Bit Image Steganography." Information Hiding
Workshop 2005 (IH 2005).
PDF
R. Jain, D. Molnar, and Z. Ramzan "Towards A Model of Energy Complexity
for Algorithms." (Invited talk) in IEEE Wireless Communications and
Networking Conference (WCNC) 2005.
PDF
N. Good, J. Han, E. Miles, D. Molnar, D. Mulligan, L. Quilter, J.
Urban, and D. Wagner "Radio Frequency Id and Privacy with
Information Goods." (Short Paper) in WPES 2004.
DOC
D. Molnar and D. Wagner "Privacy and
Security in Library RFID : Issues, Practices, and Architectures." ACM CCS
2004.
PS PDF
T.Vila, R. Greenstadt, and D. Molnar "Why We Can't Be Bothered To Read
Privacy Policies: Models of Privacy Economics as a Lemons Market."
Appeared at the Second International
Workshop on Economics and Information Security. Also appears in a book
on
Economics and Information Security comprising selected papers from
the first and second Workshops.
PDF
R. Johnson, D. Molnar, D. Song, and D. Wagner "Homomorphic Signature
Schemes."
RSA2002 Conference, Cryptographer's
Track. LNCS 2271.
PDF.
R. Dingledine, M. Freedman, D. Hopwood, and D. Molnar "A Reputation Scheme
To Increase MIX-net Reliability."
2001
Information Hiding Workshop (IH 2001). LNCS 2137.
PS
R. Dingledine, M. Freedman, and D. Molnar "Free Haven - A Distributed
Anonymous Storage System."
Berkeley Workshop on
Design Issues in Anonymity and Unobservability. LNCS 2009.
PS
Manish Bhatt, Sahana Chennabasappa, Yue Li, Cyrus Nikolaidis, Daniel Song, Shengye Wan, Faizan Ahmad, Cornelius Aschermann, Yaohui Chen, Dhaval Kapil, David Molnar, Spencer Whitman, Joshua Saxe, "CyberSecEval 2: A Wide-Ranging Cybersecuity Evaluation Suite for Large Language Models"
D. Wilkerson, D. A. Molnar, M. Harren, and J. D. Kubiatowicz,
"Hard-Object: Enforcing Object Interfaces Using Code-Range Data
Protection,"
EECS Department, University of California, Berkeley,
Tech.
Rep. UCB/EECS-2009-97, July 2009.
D. Molnar and D. Wagner. Catchconv : Symbolic execution and run-time type
inference for integer conversion errors.
UCB
EECS Technical Report 2007-23.
Sourceforge project
A. Soppera, T. Burbridge, and D. Molnar. "RFID Security and Privacy
-- Issues, Standards, and Solutions"
Chapter in Intelligent Spaces: The Application of Pervasive Information
and Communication Technology, Alan Steventon and Steven Wright, eds.,
Springer-Verlag Publishers. February 2006.
Springer-Verlag
book page
D. Molnar, R. Stapleton-Gray, and D. Wagner. "Killing, Recoding, and
Beyond."
Chapter in RFID Applications, Security
and Privacy, Simson
Garfinkel and Beth
Rosenberg eds., Addison/Wesley Publishers. July 2005.
DOC
R. Dingledine, M. Freedman, and D. Molnar. "Accountability in Peer-to-Peer
Systems."
Chapter in Peer-to-Peer: Harnessing The Benefits of a
Disruptive
Technology , Andy Oram ed., O'Reilly Publishers. March 2001.
HTML
My senior thesis on "Homomorphic Signature
Schemes."
Warning: it's remarkably buggy.
My master's report on "Security and Privacy
in Two RFID Deployments, With New Methods For Private Authentication and
RFID Pseudonyms."
My PhD thesis on
"Dynamic Test Generation for Large Binary Programs."
Here's a list of my co-authors and links to their pages.
Trevor Burbridge
Chris Crutchfield
Roger
Dingledine
Stark Draper
Michael
J. Freedman
Craig Gentry
Patrice Godefroid
Nathan
Good
Rachel
Greenstadt
John Han
Nicholas Hopper
David Hopwood
Prakash Ishwar
Ravi Jain
Rob Johnson
Ari
Juels
Tadayoshi
Kohno
Michael Y. Levin
Elizabeth Miles
Deirdre Mulligan
Matt Piotrowski
Vinod Prabhakaran
Laura Quilter
Kannan Ramchandran
Zulfikar
Ramzan
Naveen Sastry
Dan Schonberg
David Schultz
Dawn Song
Andrea Soppera
Ross Stapleton-Gray
David Turner
Tony Vila
David Wagner