Publication Self-Verifying Execution (Position Paper) Matt McCutchen, Daniel Song, Shuo Chen, Shaz Qadeer Proceedings of the IEEE Cybersecurity Development Conference (SecDev) | November 2016 Proceedings of the IEEE Cybersecurity Development Conference (SecDev)
Publication Unobservable communication over fully untrusted infrastructure Sebastian Angel, Srinath Setty Operating Systems Design and Implementation (OSDI) | November 2016 Project
Publication Big Data Analytics over Encrypted Datasets with Seabed Antonis Papadimitriou, Ranjita Bhagwan, Nishanth Chandran, Ramachandran Ramjee, Andreas Haeberlen, Harmeet Singh , Abhishek Modi, Saikrishna Badrinarayanan 2016 USENIX OSDI | November 2016 Project
Publication Toward an Evidence-based Design for Reactive Security Policies and Mechanisms Omer Katz, Ben Livshits CS-2016-04 | November 2016
Publication 2-Server PIR with sub-polynomial communication Zeev Dvir, Sivakanth Gopi Journal of the ACM (JACM) | November 2016, Vol 63(4) Best Paper Award in STOC 2015 Conference version appeared in STOC 2015 where it was a cowinner of the best paper award.
Publication Understanding and Automatically Preventing Injection Attacks on Node.js Cristian-Alexandru Staicu, Michael Pradel, Ben Livshits TUD-CS-2016-14663 | November 2016
Publication MART: Targeted attack detection on a compromised network Jack W. Stokes, Himanshu Chandola, Christian Seifert, Tim Burrell 2016 Military Communications Conference | October 2016 Project
Publication Transparency Overlays and Applications Melissa Chase, Sarah Meiklejohn CCS ’16 Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security | October 2016
Publication Hash First, Argue Later: Adaptive Verifiable Computations on Outsourced Data Dario Fiore, Cédric Fournet, Esha Ghosh, Markulf Kohlweiss, Olya Ohrimenko, Bryan Parno ACM Conference on Computer and Communications Security (CCS) | October 2016 Project
Publication Improvements to Secure Computation with Penalties Ranjit Kumaresan, Vinod Vaikuntanathan, Prashant Nalini CCS ’16 Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security | October 2016 ISBN: 978-1-4503-4139-4