Search Results - "Parno, Bryan"
-
1
Permacoin: Repurposing Bitcoin Work for Data Preservation
Published in 2014 IEEE Symposium on Security and Privacy (01-05-2014)“…Bit coin is widely regarded as the first broadly successful e-cash system. An oft-cited concern, though, is that mining Bit coins wastes computational…”
Get full text
Conference Proceeding -
2
SoK: Computer-Aided Cryptography
Published in 2021 IEEE Symposium on Security and Privacy (SP) (01-05-2021)“…Computer-aided cryptography is an active area of research that develops and applies formal, machine-checkable approaches to the design, analysis, and…”
Get full text
Conference Proceeding -
3
Pinocchio: Nearly Practical Verifiable Computation
Published in 2013 IEEE Symposium on Security and Privacy (01-05-2013)“…To instill greater confidence in computations outsourced to the cloud, clients should be able to verify the correctness of the results returned. To this end,…”
Get full text
Conference Proceeding -
4
Owl: Compositional Verification of Security Protocols via an Information-Flow Type System
Published in 2023 IEEE Symposium on Security and Privacy (SP) (01-05-2023)“…Computationally sound protocol verification tools promise to deliver full-strength cryptographic proofs for security protocols. Unfortunately, current tools…”
Get full text
Conference Proceeding -
5
Message from the Program Chairs
Published in 2018 IEEE Symposium on Security and Privacy (SP) (01-05-2018)“…Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the…”
Get full text
Conference Proceeding -
6
Geppetto: Versatile Verifiable Computation
Published in 2015 IEEE Symposium on Security and Privacy (01-05-2015)“…Cloud computing sparked interest in Verifiable Computation protocols, which allow a weak client to securely outsource computations to remote parties. Recent…”
Get full text
Conference Proceeding -
7
Bootstrapping Trust in Commodity Computers
Published in 2010 IEEE Symposium on Security and Privacy (01-05-2010)“…Trusting a computer for a security-sensitive task (such as checking email or banking online) requires the user to know something about the computer's state. We…”
Get full text
Conference Proceeding -
8
User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems
Published in 2012 IEEE Symposium on Security and Privacy (01-05-2012)“…Modern client platforms, such as iOS, Android, Windows Phone, Windows 8, and web browsers, run each application in an isolated environment with limited…”
Get full text
Conference Proceeding -
9
Cinderella: Turning Shabby X.509 Certificates into Elegant Anonymous Credentials with the Magic of Verifiable Computation
Published in 2016 IEEE Symposium on Security and Privacy (SP) (01-05-2016)“…Despite advances in security engineering, authentication in applications such as email and the Web still primarily relies on the X.509 public key…”
Get full text
Conference Proceeding Journal Article -
10
EverCrypt: A Fast, Verified, Cross-Platform Cryptographic Provider
Published in 2020 IEEE Symposium on Security and Privacy (SP) (01-05-2020)“…We present EverCrypt: a comprehensive collection of verified, high-performance cryptographic functionalities available via a carefully designed API. The API…”
Get full text
Conference Proceeding -
11
A Security Model and Fully Verified Implementation for the IETF QUIC Record Layer
Published in 2021 IEEE Symposium on Security and Privacy (SP) (01-05-2021)“…Drawing on earlier protocol-verification work, we investigate the security of the QUIC record layer, as standardized by the IETF in draft version 30. This…”
Get full text
Conference Proceeding -
12
Distributed detection of node replication attacks in sensor networks
Published in 2005 IEEE Symposium on Security and Privacy (S&P'05) (2005)“…The low-cost, off-the-shelf hardware components in unshielded sensor-network nodes leave them vulnerable to compromise. With little effort, an adversary may…”
Get full text
Conference Proceeding -
13
WaveCert: Translation Validation for Asynchronous Dataflow Programs via Dynamic Fractional Permissions
Published 14-12-2023“…Coarse-grained reconfigurable arrays (CGRAs) have gained attention in recent years due to their promising power efficiency compared to traditional von Neumann…”
Get full text
Journal Article -
14
Memoir: Practical State Continuity for Protected Modules
Published in 2011 IEEE Symposium on Security and Privacy (01-05-2011)“…To protect computation, a security architecture must safeguard not only the software that performs it but also the state on which the software operates. This…”
Get full text
Conference Proceeding -
15
Leaf: Modularity for Temporary Sharing in Separation Logic (Extended Version)
Published 09-09-2023“…In concurrent verification, separation logic provides a strong story for handling both resources that are owned exclusively and resources that are shared…”
Get full text
Journal Article -
16
CLAMP: Practical Prevention of Large-Scale Data Leaks
Published in 2009 30th IEEE Symposium on Security and Privacy (01-05-2009)“…Providing online access to sensitive data makes Web servers lucrative targets for attackers. A compromise of any of the Web server's scripts, applications, or…”
Get full text
Conference Proceeding -
17
Mariposa: Measuring SMT Instability in Automated Program Verification
Published in 2023 Formal Methods in Computer-Aided Design (FMCAD) (24-10-2023)“…Program verification has been successfully applied to increasingly large and complex systems. Much of this recent success can be attributed to the automation…”
Get full text
Conference Proceeding -
18
Verus: Verifying Rust Programs using Linear Ghost Types (extended version)
Published 09-03-2023“…The Rust programming language provides a powerful type system that checks linearity and borrowing, allowing code to safely manipulate memory without garbage…”
Get full text
Journal Article -
19
Minimal TCB Code Execution
Published in 2007 IEEE Symposium on Security and Privacy (SP '07) (01-05-2007)“…We propose an architecture that allows code to execute in complete isolation from other software while trusting only a tiny software base that is orders of…”
Get full text
Conference Proceeding -
20
Fast Geometric Projections for Local Robustness Certification
Published 11-02-2020“…Local robustness ensures that a model classifies all inputs within an $\ell_2$-ball consistently, which precludes various forms of adversarial inputs. In this…”
Get full text
Journal Article