Publication U-Prove Designated-Verifier Accumulator Revocation Extension Christian Paquin, Lan Nguyen MSR-TR-2015-40 | May 2015 Project
Publication Securing Multiparty Online Services via Certification of Symbolic Transactions Eric Chen, Shuo Chen, Shaz Qadeer, Rui Wang Proceedings of the IEEE Symposium on Security and Privacy (Oakland) | May 2015 test test Project
Publication Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems Yuanzhong Xu, Weidong Cui, Marcus Peinado Proceedings of the 36th IEEE Symposium on Security and Privacy (Oakland) | May 2015
Publication Approximating Attack Surfaces with Stack Traces Christopher Theisen, Kim Herzig, Patrick Morrison, Brendan Murphy, Laurie Williams Companion Proceedings of the 37th International Conference on Software Engineering | May 2015 Please note that this paper is not yet published, but accepted for inclusion. Project
Publication Bitcoin Mining Pools: A Cooperative Game Theoretic Analysis Yoad Lewenberg, Yoram Bachrach, Yonatan Sompolinsky, Aviv Zohar, Jeffrey S. Rosenschein AAMAS | May 2015
Publication Selecting Elliptic Curves for Cryptography: an Efficiency and Security Analysis Joppe Bos, Michael Naehrig, Patrick Longa, Craig Costello Journal of Cryptographic Engineering | May 2015
Publication VC3: Trustworthy Data Analytics in the Cloud using SGX Felix Schuster, Manuel Costa, Cédric Fournet, Christos Gkantsidis, Marcus Peinado, Gloria Mainar-Ruiz, Mark Russinovich 36th IEEE Symposium on Security and Privacy | May 2015 Project
Publication Executable Proofs, Input-Size Hiding Secure Computation and a New Ideal World Melissa Chase, Rafail Ostrovsky, Ivan Visconti Eurocrypt 2015 | April 2015
Publication Hosting Services on an Untrusted Cloud Dan Boneh, Divya Gupta, Ilya Mironov, Amit Sahai EUROCRYPT | April 2015
Publication Playing the Legal Card: Using Ideation Cards to Raise Data Protection Issues within the Design Process Ewa Luger, Lachlan Urquhart, Tom Rodden, Michael Golembewski April 2015