R. Cochran, L. D'Antoni, B. Livshits, D. Molnar, and M. Veanes. "Program Boosting: Program Synthesis via Crowd-Sourcing." POPL 2015.
I. Rae, G. Venolia, J. Tang, and D. Molnar. "A Framework for Understanding and Designing Telepresence." CSCW 2015.
F. Roesner, D. Molnar, A. Moshchuk, T. Kohno, and H.J. Wang. "World-Driven Access Control for Continuous Sensing." ACM CCS 2014.
Christopher Smowton, Jacob R. Lorch, David Molnar, Stefan Saroiu, and Alec Wolman. Zero-Effort Payments: Design, Deployment, and Lessons. Ubicomp 2014. PDF
Loris D'Antoni, Margus Veanes, Benjamin Livshits, and David Molnar. FAST: a Transducer-Based Language for Tree Manipulation, in PLDI 2014: Programming Language Design and Implementation, ACM, June 2014
F. Roesner, T. Kohno, D. Molnar. "Security and Privacy for Augmented Reality Systems." Communications of the ACM, April 2014 (cover story).
S. Jana, D. Molnar, A. Moshchuk, A. Dunn, B. Livshits, H.J. Wang, E. Ofek. "Enabling fine-grained permissions for augmented reality applications with recognizers." Usenix Security Symposium 2013.
L. D'Antoni, A. Dunn, S. Jana, T. Kohno, B. Livshits, D. Molnar A. Moshchuk, E. Ofek, F. Roesner, T. S. Saponas, M. Veanes, H. J. Wang. "Operating System Support for Augmented Reality Applications." Workshop on Hot Topics in Operating Systems (HotOS) 2013.
E. Bounimova, P. Godefroid, D. Molnar. "Billions and Billions of Constraints: Whitebox Fuzz Testing in Production" ICSE 2013.
P. Godefroid, M.Y. Levin, D. Molnar. "SAGE: Whitebox fuzzing for security testing." Communications of the ACM, pages 40-44 2012.
Margus Veanes, Pieter Hooimeijer, Benjamin Livshits, David Molnar, Nikolaj Bjorner "Symbolic Finite State Transducers: Algorithms and Applications" POPL 2012: 39th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL 2012) pp. 137-150, Philadelphia, Pennsylvania, January 2012
P. Saxena, D. Molnar, B. Livshits. "ScriptGard: Automatic Context-Sensitive Sanitization for Large-Scale Legacy Web Applications" ACM Computer and Communications Security 2011.
P. Hooimeijer, B. Livshits, D. Molnar, P. Saxena, M. Veanes. "Fast and Precise Sanitizer Analysis with BEK." Usenix Security 2011.
R. A. Popa, J. Lorch, D. Molnar, H. Wang, L. Zhuang. "Enabling Security in Cloud Storage SLAs with CloudProof." Usenix Technical Conference 2011.
D. Molnar, S. Egelman, and N. Christin. "This Is Your Data on Drugs:
Lessons Computer Security Can Learn From The Drug War."
New Security Paradigms Workshop 2010.
D. Molnar, S. Schechter. "Self Hosting vs. Cloud Hosting: Accounting for
the security impact of hosting in the cloud."
S. Egelman, D. Molnar, N. Christin, A. Acquisti, C. Herley, and S.
Krishnamurthi. "Please Continue to Hold: An empirical study on
user tolerance of security delays."
M. Stevens, A. Sotirov, J. Appelbaum, A. Lenstra, D. Molnar, D. A. Osvik,
B. de Weger "Short chosen-prefix collisions for MD5 and the creation of a
rogue CA certificate."
D. Molnar, X. C. Li, and D. Wagner "Dynamic Test Generation To Find Integer Bugs in
x86 Binary Linux Programs."
USENIX Security 2009, to appear. See our draft paper. Comments welcomed!
P. Godefroid, M.Y. Levin, and D. Molnar "Active Property Checking."
EMSOFT 2008. See also Microsoft Technical Report MSR-TR-2007-91, July 2007
P. Godefroid, M.Y. Levin, and D. Molnar "Automated Whitebox Fuzz
Network Distributed Security Symposium (NDSS) 2008.
See also Microsoft Technical Report MSR-TR-2007-58, May 2007
N. Hopper, D. Molnar, and D. Wagner "From Weak to Strong Watermarking."
Theory of Cryptography Conference (TCC) 2007.
C. Crutchfield, D. Molnar, and D. Turner "Approximate Measurement of Voter
Privacy Loss in an Election With Precinct Reports." NIST/NSF Voting
Systems Rating Workshop. 2006.
D. Molnar, T. Kohno, N. Sastry, and D. Wagner "Tamper-Evident,
History-Independent, Subliminal-Free Data Structures on PROM Storage -or-
How to Store Ballots on a Voting Machine." Extended abstract (6 pages)
in IEEE Security and Privacy ("Oakland") 2006.
Short version: PS PDF Long version: eprint page
C. Crutchfield, D. Molnar, D. Turner, and D. Wagner
Threshold Signatures." Public Key Cryptography (PKC)
D. Molnar, M. Piotrowski, D. Schultz, and D. Wagner "The Program Counter
Security Model: Automatic Detection and Removal of Control-Flow Side
Channel Attacks." ICISC
Conference version: PDF Long version: eprint page Source code (NO SUPPORT OFFERED): .TGZ
D. Molnar, A. Soppera, and D. Wagner "RFID Privacy Through Trusted
Computing." (Short Paper) WPES
C. Gentry, D. Molnar, and Z. Ramzan
"Efficient Designated Confirmer Signatures Without
Random Oracles or General Zero-Knowledge Proofs."
Springer-Verlag online proceedings.
R. Jain, D. Molnar, and Z. Ramzan "Towards Understanding Algorithmic
Factors Affecting Energy Consumption: Switching Complexity,
Randomness, and Preliminary Experiments." DIAL M / POMC
D. Molnar, A. Soppera, and D. Wagner "A Scalable, Delegatable Pseudonym
Protocol Enabling Ownership Transfer of RFID Tags." Selected Areas in Cryptography
Conference version: PDF Long version: eprint page
A. Juels, D. Molnar, and D. Wagner "Security and Privacy Issues in
PDF eprint page
S. Draper, P. Ishwar, D. Molnar, V. Prabhakaran, K. Ramchandran, D.
Schonberg, and D. Wagner "An Analysis of PMF Based Tests for Detection of
Least Significant Bit Image Steganography." Information Hiding
Workshop 2005 (IH 2005).
R. Jain, D. Molnar, and Z. Ramzan "Towards A Model of Energy Complexity
for Algorithms." (Invited talk) in IEEE Wireless Communications and
Networking Conference (WCNC) 2005.
N. Good, J. Han, E. Miles, D. Molnar, D. Mulligan, L. Quilter, J.
Urban, and D. Wagner "Radio Frequency Id and Privacy with
Information Goods." (Short Paper) in WPES 2004.
D. Molnar and D. Wagner "Privacy and
Security in Library RFID : Issues, Practices, and Architectures." ACM CCS
T.Vila, R. Greenstadt, and D. Molnar "Why We Can't Be Bothered To Read
Privacy Policies: Models of Privacy Economics as a Lemons Market."
Appeared at the Second International
Workshop on Economics and Information Security. Also appears in a book
Economics and Information Security comprising selected papers from
the first and second Workshops.
R. Johnson, D. Molnar, D. Song, and D. Wagner "Homomorphic Signature
RSA2002 Conference, Cryptographer's Track. LNCS 2271.
R. Dingledine, M. Freedman, D. Hopwood, and D. Molnar "A Reputation Scheme
To Increase MIX-net Reliability."
2001 Information Hiding Workshop (IH 2001). LNCS 2137.
R. Dingledine, M. Freedman, and D. Molnar "Free Haven - A Distributed
Anonymous Storage System."
Berkeley Workshop on Design Issues in Anonymity and Unobservability. LNCS 2009.
D. Molnar and D. Wagner. Catchconv : Symbolic execution and run-time type
inference for integer conversion errors.
UCB EECS Technical Report 2007-23.
A. Soppera, T. Burbridge, and D. Molnar. "RFID Security and Privacy
-- Issues, Standards, and Solutions"
Chapter in Intelligent Spaces: The Application of Pervasive Information and Communication Technology, Alan Steventon and Steven Wright, eds., Springer-Verlag Publishers. February 2006.
Springer-Verlag book page
D. Molnar, R. Stapleton-Gray, and D. Wagner. "Killing, Recoding, and
Chapter in RFID Applications, Security and Privacy, Simson Garfinkel and Beth Rosenberg eds., Addison/Wesley Publishers. July 2005.
R. Dingledine, M. Freedman, and D. Molnar. "Accountability in Peer-to-Peer
Chapter in Peer-to-Peer: Harnessing The Benefits of a Disruptive Technology , Andy Oram ed., O'Reilly Publishers. March 2001.
My senior thesis on "Homomorphic Signature
Warning: it's remarkably buggy.
My master's report on "Security and Privacy in Two RFID Deployments, With New Methods For Private Authentication and RFID Pseudonyms."
My PhD thesis on "Dynamic Test Generation for Large Binary Programs."
Here's a list of my co-authors and links to their pages.
Michael J. Freedman
Michael Y. Levin