Best Paper Awards (S&P)

2008-2018

Posted by pxzhang on January 8, 2019
Year Title Authors
2018 DEEPSEC: Deciding Equivalence Properties in Security Protocols – Theory and Practice Vincent Cheval, Inria
Steve Kremer, Inria
Itsaka Rakotonirina, Inria
2018 On Enforcing the Digital Immunity of a Large Humanitarian Organization Stevens Le Blond, École Polytechnique Fédérale de Lausanne
Alejandro Cuevas, École Polytechnique Fédérale de Lausanne
Juan Ramón Troncoso-Pastoriza, École Polytechnique Fédérale de Lausanne
Philipp Jovanovic, École Polytechnique Fédérale de Lausanne
Bryan Ford, École Polytechnique Fédérale de Lausanne
Jean-Pierre Hubaux, École Polytechnique Fédérale de Lausanne
2017 Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate Karthikeyan Bhargavan, INRIA
Bruno Blanchet, INRIA
Nadim Kobeissi, INRIA
2016 A2: Analog Malicious Hardware Kaiyuan Yang, University of Michigan
Matthew Hicks, University of Michigan
Qing Dong, University of Michigan
Todd Austin, University of Michigan
Dennis Sylvester, University of Michigan
2015 Riposte: An Anonymous Messaging System Handling Millions of Users Henry Corrigan-Gibbs, Stanford University
Dan Boneh, Stanford University
David Mazières, Stanford University
2015 A Messy State of the Union: Taming the Composite State Machines of TLS Benjamin Beurdouche, INRIA
Karthikeyan Bhargavan, INRIA
Antoine Delignat-Lavaud, INRIA
Cédric Fournet, Microsoft Research
Markulf Kohlweiss, Microsoft Research
Alfredo Pironti, INRIA
Pierre-Yves Strub, IMDEA
Jean Karim Zinzindohoue, INRIA
2014 Secure Multiparty Computations on BitCoin Marcin Andrychowicz, University of Warsaw
Stefan Dziembowski, University of Warsaw
Daniel Malinowski, University of Warsaw
Łukasz Mazurek, University of Warsaw
2014 Bootstrapping Privacy Compliance in Big Data Systems Shayak Sen, Carnegie Mellon University
Saikat Guha, Microsoft Research
Anupam Datta, Carnegie Mellon University
Sriram K. Rajamani, Microsoft Research
Janice Tsai, Microsoft Research
Jeannette M. Wing, Microsoft Research
2013 Pinocchio: Nearly Practical Verifiable Computation Bryan Parno, Microsoft Research
Craig Gentry, IBM Research
Jon Howell, Microsoft Research
Mariana Raykova, IBM Research
2012 Don’t Trust Satellite Phones: A Security Analysis of Two Satphone Standards Benedikt Driessen, Ruhr-Universität Bochum
Ralf Hund, Ruhr-Universität Bochum
Carsten Willems, Ruhr-Universität Bochum
Christof Paar, Ruhr-Universität Bochum
Thorsten Holz, Ruhr-Universität Bochum
2011 Phonotactic Reconstruction of Encrypted VoIP Conversations: Hookt on fon-iks Andrew M. White, University of North Carolina at Chapel Hill
Austin Matthews, University of North Carolina at Chapel Hill
Kevin Snow, University of North Carolina at Chapel Hill
Fabian Monrose, University of North Carolina at Chapel Hill
2010 SCiFI - A System for Secure Face Identification Margarita Osadchy, University of Haifa
Benny Pinkas, University of Haifa
Ayman Jarrous, University of Haifa
Boaz Moskovich, University of Haifa
2009 Native Client: A Sandbox for Portable, Untrusted x86 Native Code Bennet Yee, Google
David Sehr, Google
Gregory Dardyk, Google
Bradley Chen, Google
Robert Muth, Google
Tavis Ormandy, Google
Shiki Okasaka, Google
Neha Narula, Google
Nicholas Fullagar, Google
2008 Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses Daniel Halperin, University of Washington
Thomas S. Heydt-Benjamin, University of Massachusetts Amherst
Benjamin Ransford, University of Massachusetts Amherst
Shane S. Clark, University of Massachusetts Amherst
Benessa Defend, University of Massachusetts Amherst
Will Morgan, University of Massachusetts Amherst
Kevin Fu, University of Massachusetts Amherst
Tadayoshi Kohno, University of Washington
William H. Maisel, Harvard University