Year | Title | Authors |
---|---|---|
2018 | DEEPSEC: Deciding Equivalence Properties in Security Protocols – Theory and Practice | Vincent Cheval, Inria Steve Kremer, Inria Itsaka Rakotonirina, Inria |
2018 | On Enforcing the Digital Immunity of a Large Humanitarian Organization | Stevens Le Blond, École Polytechnique Fédérale de Lausanne Alejandro Cuevas, École Polytechnique Fédérale de Lausanne Juan Ramón Troncoso-Pastoriza, École Polytechnique Fédérale de Lausanne Philipp Jovanovic, École Polytechnique Fédérale de Lausanne Bryan Ford, École Polytechnique Fédérale de Lausanne Jean-Pierre Hubaux, École Polytechnique Fédérale de Lausanne |
2017 | Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate | Karthikeyan Bhargavan, INRIA Bruno Blanchet, INRIA Nadim Kobeissi, INRIA |
2016 | A2: Analog Malicious Hardware | Kaiyuan Yang, University of Michigan Matthew Hicks, University of Michigan Qing Dong, University of Michigan Todd Austin, University of Michigan Dennis Sylvester, University of Michigan |
2015 | Riposte: An Anonymous Messaging System Handling Millions of Users | Henry Corrigan-Gibbs, Stanford University Dan Boneh, Stanford University David Mazières, Stanford University |
2015 | A Messy State of the Union: Taming the Composite State Machines of TLS | Benjamin Beurdouche, INRIA Karthikeyan Bhargavan, INRIA Antoine Delignat-Lavaud, INRIA Cédric Fournet, Microsoft Research Markulf Kohlweiss, Microsoft Research Alfredo Pironti, INRIA Pierre-Yves Strub, IMDEA Jean Karim Zinzindohoue, INRIA |
2014 | Secure Multiparty Computations on BitCoin | Marcin Andrychowicz, University of Warsaw Stefan Dziembowski, University of Warsaw Daniel Malinowski, University of Warsaw Łukasz Mazurek, University of Warsaw |
2014 | Bootstrapping Privacy Compliance in Big Data Systems | Shayak Sen, Carnegie Mellon University Saikat Guha, Microsoft Research Anupam Datta, Carnegie Mellon University Sriram K. Rajamani, Microsoft Research Janice Tsai, Microsoft Research Jeannette M. Wing, Microsoft Research |
2013 | Pinocchio: Nearly Practical Verifiable Computation | Bryan Parno, Microsoft Research Craig Gentry, IBM Research Jon Howell, Microsoft Research Mariana Raykova, IBM Research |
2012 | Don’t Trust Satellite Phones: A Security Analysis of Two Satphone Standards | Benedikt Driessen, Ruhr-Universität Bochum Ralf Hund, Ruhr-Universität Bochum Carsten Willems, Ruhr-Universität Bochum Christof Paar, Ruhr-Universität Bochum Thorsten Holz, Ruhr-Universität Bochum |
2011 | Phonotactic Reconstruction of Encrypted VoIP Conversations: Hookt on fon-iks | Andrew M. White, University of North Carolina at Chapel Hill Austin Matthews, University of North Carolina at Chapel Hill Kevin Snow, University of North Carolina at Chapel Hill Fabian Monrose, University of North Carolina at Chapel Hill |
2010 | SCiFI - A System for Secure Face Identification | Margarita Osadchy, University of Haifa Benny Pinkas, University of Haifa Ayman Jarrous, University of Haifa Boaz Moskovich, University of Haifa |
2009 | Native Client: A Sandbox for Portable, Untrusted x86 Native Code | Bennet Yee, Google David Sehr, Google Gregory Dardyk, Google Bradley Chen, Google Robert Muth, Google Tavis Ormandy, Google Shiki Okasaka, Google Neha Narula, Google Nicholas Fullagar, Google |
2008 | Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses | Daniel Halperin, University of Washington Thomas S. Heydt-Benjamin, University of Massachusetts Amherst Benjamin Ransford, University of Massachusetts Amherst Shane S. Clark, University of Massachusetts Amherst Benessa Defend, University of Massachusetts Amherst Will Morgan, University of Massachusetts Amherst Kevin Fu, University of Massachusetts Amherst Tadayoshi Kohno, University of Washington William H. Maisel, Harvard University |