Publication A Practical Approach to Protocol-Agnostic Security for Multiparty Online Services Eric Chen, Shuo Chen, Shaz Qadeer, Rui Wang MSR-TR-2014-72 | May 2014
Publication Permacoin: Repurposing Bitcoin Work for Data Preservation Andrew Miller, Ari Juels, Elaine Shi, Bryan Parno, Jonathan Katz Proceedings of the IEEE Symposium on Security and Privacy | May 2014 Proceedings of the IEEE Symposium on Security and Privacy
Publication World-Driven Access Control for Continuous Sensing Franziska Roesner, David Molnar, Alex Moshchuk, Tadayoshi Kohno, Helen Wang MSR-TR-2014-67 | May 2014
Publication Protecting Obfuscation Against Algebraic Attacks Boaz Barak, Sanjam Garg, Yael Tauman Kalai, Omer Paneth, Amit Sahai May 2014
Publication On the Complexity of UC Commitments Juan A. Garay, Yuval Ishai, Ranjit Kumaresan, Hoeteck Wee Advances in Cryptology – EUROCRYPT 2014 | May 2014
Publication Deja Q: Using Dual Systems to Revisit q-Type Assumptions Melissa Chase, Sarah Meiklejohn Eurocrypt 2014 | May 2014
Publication Generating Summary Risk Scores for Mobile Applications Christopher S. Gates, Ninghui Li, Hao Peng, Bhaskar Sarma, Yuan Qi, Rahul Potharaju, Cristina Nita-Rotuaru, Ian Molloy IEEE Transactions on Dependable and Secure Computing | May 2014, Vol 11(3): pp. 238-251
Publication Bootstrapping Privacy Compliance in Big Data Systems Shayak Sen, Saikat Guha, Anupam Dutta, Sriram Rajamani, Janice Tsai, Jeannette Wing Proceedings of the 35th IEEE Symposium on Security & Privacy (Oakland) | May 2014 Video
Publication Stealing Webpages Rendered on Your Browser by Exploiting GPU Vulnerabilities Sangho Lee, Youngsok Kim, Jangwoo Kim, Jong Kim 35th IEEE Symposium on Security and Privacy (Oakland 2014) | May 2014