Publication ZQL: A Compiler for Privacy-Preserving Data Processing Cédric Fournet, Markulf Kohlweiss, George Danezis MSR-TR-2013-25 | February 2013 Video
Publication Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme Joppe Bos, Kristin Lauter, Jake Loftus, Michael Naehrig MSR-TR-2013-23 | February 2013
Publication InteGuard: Toward Automatic Protection of Third-Party Web Service Integrations Luyi Xing, Yangyi Chen, XiaoFeng Wang, Shuo Chen Network & Distributed System Security Symposium (NDSS) | February 2013 Network & Distributed System Security Symposium (NDSS)
Publication Missive: Fast Appliance Launch From an Untrusted Buffer Cache Jon Howell, Jeremy Elson, Bryan Parno, John (JD) Douceur MSR-TR-2013-9 | January 2013
Publication How to Run POSIX Apps in a Minimal Picoprocess Jon Howell, Bryan Parno, John (JD) Douceur MSR-TR-2013-10 | January 2013
Publication Orthogonal Security With Cipherbase Arvind Arasu, Spyros Blanas, Ken Eguro, Raghav Kaushik, Donald Kossmann, Ravi Ramamurthy, Ramarathnam Venkatesan 6th Biennial Conference on Innovative Data Systems Research (CIDR’13) | January 2013 6th Biennial Conference on Innovative Data Systems Research (CIDR'13)
Publication Keys to the Cloud: Formal Analysis and Concrete Attacks on Encrypted Web Storage Chetan Bansal, Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Sergio Maffeis 2nd Conference on Principles of Security and Trust (POST 2013) | January 2013
Publication Fully Automated Analysis of Padding-Based Encryption in the Computational Model Gilles Barthe, Juan Manuel Crespo, César Kunz, Benedikt Schmidt, Benjamin Grégoire, Yassine Lakhnech, Santiago Zanella-Béguelin 20th ACM Conference on Computer and Communications Security, CCS 2013 | January 2013
Publication Small World: Collisions Among Attackers in a Finite Population Cormac Herley WEIS | January 2013