Search Results - "Parno, Bryan"

Refine Results
  1. 1

    Permacoin: Repurposing Bitcoin Work for Data Preservation by Miller, Andrew, Juels, Ari, Shi, Elaine, Parno, Bryan, Katz, Jonathan

    “…Bit coin is widely regarded as the first broadly successful e-cash system. An oft-cited concern, though, is that mining Bit coins wastes computational…”
    Get full text
    Conference Proceeding
  2. 2

    SoK: Computer-Aided Cryptography by Barbosa, Manuel, Barthe, Gilles, Bhargavan, Karthik, Blanchet, Bruno, Cremers, Cas, Liao, Kevin, Parno, Bryan

    “…Computer-aided cryptography is an active area of research that develops and applies formal, machine-checkable approaches to the design, analysis, and…”
    Get full text
    Conference Proceeding
  3. 3

    Pinocchio: Nearly Practical Verifiable Computation by Parno, B., Howell, J., Gentry, C., Raykova, M.

    “…To instill greater confidence in computations outsourced to the cloud, clients should be able to verify the correctness of the results returned. To this end,…”
    Get full text
    Conference Proceeding
  4. 4

    Owl: Compositional Verification of Security Protocols via an Information-Flow Type System by Gancher, Joshua, Gibson, Sydney, Singh, Pratap, Dharanikota, Samvid, Parno, Bryan

    “…Computationally sound protocol verification tools promise to deliver full-strength cryptographic proofs for security protocols. Unfortunately, current tools…”
    Get full text
    Conference Proceeding
  5. 5

    Message from the Program Chairs

    “…Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the…”
    Get full text
    Conference Proceeding
  6. 6

    Geppetto: Versatile Verifiable Computation by Costello, Craig, Fournet, Cedric, Howell, Jon, Kohlweiss, Markulf, Kreuter, Benjamin, Naehrig, Michael, Parno, Bryan, Zahur, Samee

    “…Cloud computing sparked interest in Verifiable Computation protocols, which allow a weak client to securely outsource computations to remote parties. Recent…”
    Get full text
    Conference Proceeding
  7. 7

    Bootstrapping Trust in Commodity Computers by Parno, Bryan, McCune, Jonathan M, Perrig, Adrian

    “…Trusting a computer for a security-sensitive task (such as checking email or banking online) requires the user to know something about the computer's state. We…”
    Get full text
    Conference Proceeding
  8. 8

    User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems by Roesner, F., Kohno, T., Moshchuk, A., Parno, B., Wang, H. J., Cowan, C.

    “…Modern client platforms, such as iOS, Android, Windows Phone, Windows 8, and web browsers, run each application in an isolated environment with limited…”
    Get full text
    Conference Proceeding
  9. 9

    Cinderella: Turning Shabby X.509 Certificates into Elegant Anonymous Credentials with the Magic of Verifiable Computation by Delignat-Lavaud, Antoine, Fournet, Cedric, Kohlweiss, Markulf, Parno, Bryan

    “…Despite advances in security engineering, authentication in applications such as email and the Web still primarily relies on the X.509 public key…”
    Get full text
    Conference Proceeding Journal Article
  10. 10
  11. 11

    A Security Model and Fully Verified Implementation for the IETF QUIC Record Layer by Delignat-Lavaud, Antoine, Fournet, Cedric, Parno, Bryan, Protzenko, Jonathan, Ramananandro, Tahina, Bosamiya, Jay, Lallemand, Joseph, Rakotonirina, Itsaka, Zhou, Yi

    “…Drawing on earlier protocol-verification work, we investigate the security of the QUIC record layer, as standardized by the IETF in draft version 30. This…”
    Get full text
    Conference Proceeding
  12. 12

    Distributed detection of node replication attacks in sensor networks by Parno, B., Perrig, A., Gligor, V.

    “…The low-cost, off-the-shelf hardware components in unshielded sensor-network nodes leave them vulnerable to compromise. With little effort, an adversary may…”
    Get full text
    Conference Proceeding
  13. 13

    WaveCert: Translation Validation for Asynchronous Dataflow Programs via Dynamic Fractional Permissions by Lin, Zhengyao, Gancher, Joshua, Parno, Bryan

    Published 14-12-2023
    “…Coarse-grained reconfigurable arrays (CGRAs) have gained attention in recent years due to their promising power efficiency compared to traditional von Neumann…”
    Get full text
    Journal Article
  14. 14

    Memoir: Practical State Continuity for Protected Modules by Parno, B., Lorch, J. R., Douceur, J. R., Mickens, J., McCune, J. M.

    “…To protect computation, a security architecture must safeguard not only the software that performs it but also the state on which the software operates. This…”
    Get full text
    Conference Proceeding
  15. 15

    Leaf: Modularity for Temporary Sharing in Separation Logic (Extended Version) by Hance, Travis, Howell, Jon, Padon, Oded, Parno, Bryan

    Published 09-09-2023
    “…In concurrent verification, separation logic provides a strong story for handling both resources that are owned exclusively and resources that are shared…”
    Get full text
    Journal Article
  16. 16

    CLAMP: Practical Prevention of Large-Scale Data Leaks by Parno, B., McCune, J.M., Wendlandt, D., Andersen, D.G., Perrig, A.

    “…Providing online access to sensitive data makes Web servers lucrative targets for attackers. A compromise of any of the Web server's scripts, applications, or…”
    Get full text
    Conference Proceeding
  17. 17

    Mariposa: Measuring SMT Instability in Automated Program Verification by Zhou, Yi, Bosamiya, Jay, Takashima, Yoshiki, Li, Jessica, Heule, Marijn, Parno, Bryan

    “…Program verification has been successfully applied to increasingly large and complex systems. Much of this recent success can be attributed to the automation…”
    Get full text
    Conference Proceeding
  18. 18

    Verus: Verifying Rust Programs using Linear Ghost Types (extended version) by Lattuada, Andrea, Hance, Travis, Cho, Chanhee, Brun, Matthias, Subasinghe, Isitha, Zhou, Yi, Howell, Jon, Parno, Bryan, Hawblitzel, Chris

    Published 09-03-2023
    “…The Rust programming language provides a powerful type system that checks linearity and borrowing, allowing code to safely manipulate memory without garbage…”
    Get full text
    Journal Article
  19. 19

    Minimal TCB Code Execution by McCune, J.M., Parno, B., Perrig, A., Reiter, M.K., Seshadri, A.

    “…We propose an architecture that allows code to execute in complete isolation from other software while trusting only a tiny software base that is orders of…”
    Get full text
    Conference Proceeding
  20. 20

    Fast Geometric Projections for Local Robustness Certification by Fromherz, Aymeric, Leino, Klas, Fredrikson, Matt, Parno, Bryan, Păsăreanu, Corina

    Published 11-02-2020
    “…Local robustness ensures that a model classifies all inputs within an $\ell_2$-ball consistently, which precludes various forms of adversarial inputs. In this…”
    Get full text
    Journal Article