2011
1. M. L. Patterson, and L. Sassaman, "Towards a Theory of Computer Insecurity: a Formal Language-Theoretic Approach," Dartmouth College Institute for Security, Technology, and Society Speaker Series, Hanover, NH, USA, 2011.
2010
1. L. Sassaman, "Minimizing Attack Surfaces with Language-Theoretic Security," EIDMA/DIAMANT Cryptography Working Group, Utrecht, NL, 2010.
2. J. C. Anderson, L. Sassaman, and E. You, "The rise of Distributed, Decentralized, Amateur/Citizen Science and Do It Yourself Biology: Safety and Security Concerns," Open Science Summit 2010, Berkeley, CA, USA, 2010.
3. M. L. Patterson, and L. Sassaman, "Exploiting the Forest with Trees," Black Hat Briefings, Las Vegas, NV, USA, 2010.
4. M. L. Patterson, and L. Sassaman, "Exploiting Computational Slack in Protocol Grammars," PH-Neutral, Berlin, DE, 2010.
5. L. Sassaman, "Language Theoretic Security Attacks: Exploiting Computational Slack in Protocol Grammars," COSIC Seminar, Leuven, BE, 2010.
6. L. Sassaman, "Ethical Guidelines for Computer Security Researchers: "Be Reasonable"," In Workshop on Ethics in Computer Security Research 2010, Lecture Notes in Computer Science, Springer-Verlag, 6 pages, 2010.
7. L. F. Cranor, E. Kenneally, and L. Sassaman, "Towards a Code of Ethics for Computer Security Research," Workshop on Ethics in Computer Security Research (WECSR 2010), Tenerife, ES, 2010.
8. D. Kaminsky, M. L. Patterson, and L. Sassaman, "PKI Layer Cake: New Collision Attacks Against the Global X.509 Infrastructure," In Financial Cryptography and Data Security - 14th International Conference, FC 2010, Lecture Notes in Computer Science 6052, R. Sion (ed.), Springer-Verlag, 16 pages, 2010.
2009
1. L. Sassaman, "Lessons in Vulnerability Disclosure: So You Broke The Internet -- What Now?," COSIC Seminar, Leuven, BE, 2009.
2. D. Kaminsky, and L. Sassaman, "Breaking Web Security: Practical Attacks on X.509," Black Hat Briefings, Las Vegas, NV, USA, 2009.
2008
1. G. Danezis, and L. Sassaman, "How to Bypass Two Anonymity Revocation Schemes," In Privacy Enhancing Technologies - 8th International Symposium, PETS 2008, Lecture Notes in Computer Science 5134, N. Borisov, and I. Goldberg (eds.), Springer-Verlag, pp. 187-201, 2008.
2. L. Sassaman, and B. Preneel, "The Byzantine Postman Problem," In Proceedings of the 29th Symposium on Information Theory in the Benelux, Werkgemeenschap voor Informatie- en Communicatietheorie, pp. 129-135, 2008.
3. L. Sassaman, "A Review of the OLPC XO Security Model," Stanford University Security Seminar, Stanford, CA, USA, 2008.
4. M. L. Patterson, L. Sassaman, and D. Chaum, "Freezing More Than Bits: Chilling Effects of the OLPC XO Security Model," In Usability, Psychology, and Security 2008, E. Churchill, and R. Dhamija (eds.), USENIX, pp. 5:1-5:5, 2008.
5. L. Sassaman, "Freezing More Than Bits: Chilling Effects of the OLPC XO Security Model," University of California, Berkeley Security Reading Group, Berkeley, CA, USA, 2008.
6. L. Sassaman, "Toward an Information-Theoretically Secure Anonymous Communication Service," Master thesis, Katholieke Universiteit Leuven, B. Preneel (promotor), 94 pages, 2008.
2007
1. L. Sassaman, "Anonymity for 2015," 24th Chaos Communication Congress, Berlin, DE, 2007.
2. L. Sassaman, "Anonymity and its Discontents," Black Hat Briefings, Las Vegas, NV, USA, 2007.
3. L. Sassaman, and B. Preneel, "Solving the Byzantine Postman Problem," Technical Report ESAT-COSIC 2007-004, 15 pages, 2007.
4. K. Kursawe, P. Palfrader, and L. Sassaman, "Echolot and Leuchtfeuer: Measuring the Reliability of Unreliable Mixes," Technical Report ESAT-COSIC 2007-005, 15 pages, 2007.
5. M. L. Patterson, and L. Sassaman, "Subliminal Channels in the Private Information Retrieval Protocols," In Proceedings of the 28th Symposium on Information Theory in the Benelux, Werkgemeenschap voor Informatie- en Communicatietheorie, 8 pages, 2007.
6. L. Sassaman, "The Faithless Endpoint: How Tor puts certain users at greater risk," Technical Report ESAT-COSIC 2007-003, pp. 1-4, 2007.
7. L. Sassaman, and B. Preneel, "The Byzantine Postman Problem: A Trivial Attack against PIR-based Nym Servers," Technical Report ESAT-COSIC 2007-001, pp. 1-7, 2007.
2005
1. L. Sassaman, B. Cohen, and N. Mathewson, "The Pynchon Gate: A Secure Method of Pseudonymous Mail Retrieval," In Proceedings of the 4th ACM Workshop on Privacy in the Electronic Society (WPES 2005), S. De Capitani di Vimercati, and R. Dingledine (eds.), ACM, pp. 1-9, 2005.
2. R. Dingledine, P. Palfrader, and L. Sassaman, "Panel: Future Anonymity Systems," What The Hack, Liempde, NL, 2005.
2004
1. L. Sassaman, "Privacy Issues in Identity Management," 13th CACR Information Security Workshop & 5th Annual Privacy and Security Workshop, Toronto, ON, CA, 2004.
2. L. Sassaman, "Making Privacy Enhancing Technology a Reality," TOORCON, San Diego, CA, USA, 2004.
3. C. Diaz, L. Sassaman, and E. Dewitte, "Comparison between two practical mix designs," In 9th European Symposium on Research in Computer Security (ESORICS 2004), Lecture Notes in Computer Science 3193, D. Gollmann, P. Ryan, and P. Samarati (eds.), Springer-Verlag, pp. 141-159, 2004.
4. L. Sassaman, "The Anonymity Toolkit," Black Hat Briefings, Las Vegas, NV, USA, 2004.
5. L. Sassaman, "Ten Years of Practical Anonymity," The Fifth HOPE Conference, New York, NY, USA, 2004.
2003
1. L. Sassaman, and C. Wysopal, "Panel: How can Independent Researchers be adequately compensated for the valuable service they provide to vendors and customers while encouraging responsible reporting?," CyberSecurity, Research & Disclosure, Stanford, CA, USA, 2003.
2. G. Danezis, and L. Sassaman, "Heartbeat Traffic to Counter $(n-1)$ Attacks: Red-Green-Black Mixes," In Proceedings of the 2nd ACM Workshop on Privacy in the Electronic Society (WPES 2003) ACM 101039, P. Samarati, and P. F. Syverson (eds.), ACM, pp. 89-93, 2003.
3. R. Lackey, P. Palfrader, and L. Sassaman, "Behind the Remailers: The Operators and Developers of Anonymity Services," DEFCON 11, Las Vegas, NV, USA, 2003.
4. R. Dingledine, and L. Sassaman, "Attacks on Anonymity Systems: Theory and Practice," Black Hat Briefings, Las Vegas, NV, USA, 2003.
5. L. Sassaman, "Designing Useful Privacy Applications," Black Hat Europe Briefings 2003, Amsterdam, NL, 2003.
6. L. Sassaman, "Anonymity in Practice," COSIC Seminar, Leuven, BE, 2003.
7. L. Sassaman, "Introduction to Anonymity Techniques," University of Cambridge Security Seminar, Cambridge, UK, 2003.
8. S. Kopsell, L. Sassaman, and A. Shostack, "Panel: Experiences Deploying Anonymous Communication Systems," Workshop on Privacy Enhancing Technologies 2003, Dresden, DE, 2003.
2002
1. L. Sassaman, "The Promise of Privacy," 16th Conference on Systems Administration (LISA 2002), Philadelphia, PA, USA, 2002.
2. L. Sassaman, "Anonymity Services and The Law," DEFCON 10, Las Vegas, NV, USA, 2002.
3. L. Sassaman, "Forensic Dead-Ends: Tracing Users Through Anonymous Remailers," Black Hat Briefings, Las Vegas, NV, USA, 2002.
4. L. Sassaman, "BOF: Future Directions for Anonymous Remailers," Computers, Freedom, and Privacy, San Francisco, CA, USA, 2002.
2001
1. L. Sassaman, "Fundamental Flaws in the SSL Certificate Authority Model," DEFCON 9, Las Vegas, NV, USA, 2001.
2000
1. L. Sassaman, "The State of the OpenPGP Keyserver Infrastructure," North American Network Operators Group, 20th Conference, Washington, DC, USA, 2000.

Go to COSIC Publication Search Engine.