Massachusetts Institute of Technology

General Info

Rank: #20 Worldwide
#16 in US
Papers: 105
Number of Researchers: 136
APA
(average papers per authors):
0.8
Country: USA

Activity Map

Contributors

  • Srinivas Devadas (12 papers)
  • Nickolai Zeldovich (9 papers)
  • Martin Rinard (7 papers)
  • Ronald L. Rivest (7 papers)
  • Hari Balakrishnan (5 papers)
  • Raluca Ada Popa (4 papers)
  • Ling Ren (4 papers)
  • Alin Tomescu (4 papers)
  • Ranjit Kumaresan (4 papers)
  • Stelios Sidiroglou-Douskos (3 papers)
  • Howard Shrobe (3 papers)
  • Marten van Dijk (3 papers)
  • Taesoo Kim (3 papers)
  • Madars Virza (3 papers)
  • Henry Corrigan-Gibbs (3 papers)
  • M. Frans Kaashoek (3 papers)
  • Michael A. Specter (3 papers)
  • Kevin Fu (2 papers)
  • Susan Hohenberger (2 papers)
  • Jaeyeon Jung (2 papers)
  • Shafi Goldwasser (2 papers)
  • Fan Long (2 papers)
  • Yossi Gilad (2 papers)
  • Derek Leung (2 papers)
  • Dwaine Clarke (2 papers)
  • Blaise Gassend (2 papers)
  • Eran Tromer (2 papers)
  • Frank Li (2 papers)
  • Alessandro Chiesa (2 papers)
  • Ulziibayar Otgonbaatar (2 papers)
  • Silvio Micali (2 papers)
  • Kevin Liao (2 papers)
  • Sacha Servan-Schreiber (2 papers)
  • Robert Morris (2 papers)
  • Christopher W. Fletcher (2 papers)
  • Vinod Vaikuntanathan (2 papers)
  • Ilia Lebedev (2 papers)
  • Nikos Vasilakis (2 papers)
  • Nick Feamster (2 papers)
  • Albert Kwon (2 papers)
  • Sunoo Park (2 papers)
  • Daniel Weitzner (2 papers)
  • Tom Yu (1 papers)
  • Sam Hartman (1 papers)
  • Kenneth Raeburn (1 papers)
  • Stuart Schechter (1 papers)
  • Will Stockwell (1 papers)
  • Cynthia McLain (1 papers)
  • Emily Stark (1 papers)
  • Michael I. Gordon (1 papers)
  • Deokhwan Kim (1 papers)
  • Jeff Perkins (1 papers)
  • Raphael Bost (1 papers)
  • Stephen Tu (1 papers)
  • Christopher Musco (1 papers)
  • Frank Wang (1 papers)
  • Adam Suhl (1 papers)
  • Venkat Arun (1 papers)
  • Yianni Giannaris (1 papers)
  • Carolina Ortega (1 papers)
  • Arthur W. Berger (1 papers)
  • Maxwell N. Krohn (1 papers)
  • Gookwon Edward Suh (1 papers)
  • Ajay Sudan (1 papers)
  • Mythili Vutukuru (1 papers)
  • Samuel Fingeret (1 papers)
  • Julian Gonzalez (1 papers)
  • Tiffany Tang (1 papers)
  • Anish Athalye (1 papers)
  • Kevin King (1 papers)
  • Andres Erbsen (1 papers)
  • Jade Philipoom (1 papers)
  • Jason Gross (1 papers)
  • Robert Sloan (1 papers)
  • Adam Chlipala (1 papers)
  • Lillian Tsai (1 papers)
  • Joonwon Choi (1 papers)
  • Tal Schuster (1 papers)
  • Jun Huang (1 papers)
  • Simon Langowski (1 papers)
  • Kyle Hogan (1 papers)
  • Zachary Newman (1 papers)
  • David Woodruff (1 papers)
  • Christopher Lesniewski-Laas (1 papers)
  • Bryan Ford (1 papers)
  • Jacob Strauss (1 papers)
  • Ling Cheung (1 papers)
  • Calvin Newport (1 papers)
  • Vijay Ganesh (1 papers)
  • Xiangyao Yu (1 papers)
  • Eric Soderstrom (1 papers)
  • Stavros Papadopoulos (1 papers)
  • Abhishek Jain (1 papers)
  • Jelle van den Hooff (1 papers)
  • Prashant Nalini Vasudevan (1 papers)
  • Hayim Shaul (1 papers)
  • Lei Yang (1 papers)
  • Shivam Handa (1 papers)
  • Alizee Schoen (1 papers)
  • Jiasi Shen (1 papers)
  • Alex Berke (1 papers)
  • Dan Calacci (1 papers)
  • Thomer M. Gil (1 papers)
  • Massimiliano Poletto (1 papers)
  • Steven Bauer (1 papers)
  • Nissanka B. Priyantha (1 papers)
  • Emil Sit (1 papers)
  • Kendra Smith (1 papers)
  • Russ Cox (1 papers)
  • Vladimir Kiriansky (1 papers)
  • Derek Bruening (1 papers)
  • Saman Amarasinghe (1 papers)
  • Magdalena Balazinska (1 papers)
  • Greg Harfst (1 papers)
  • David Karger (1 papers)
  • Chris Lesniewski-Laas (1 papers)
  • Stephen McCamant (1 papers)
  • Stefan Popoveniuc (1 papers)
  • Emily Shen (1 papers)
  • Shyamnath Gollakota (1 papers)
  • Nabeel Ahmed (1 papers)
  • Dina Katabi (1 papers)
  • Zhilei Xu (1 papers)
  • Mashael Al-Sabah (1 papers)
  • David Lazar (1 papers)
  • Srini Devadas (1 papers)
  • Victor Costan (1 papers)
  • Jonathan Frankle (1 papers)
  • Daniel Shaar (1 papers)
  • Chiraag Juvekar (1 papers)
  • Anantha Chandrakasan (1 papers)
  • Tej Chajed (1 papers)
  • James Koppel (1 papers)
  • Miles Dai (1 papers)
  • Miguel Gomez-Garcia (1 papers)
  • Mengjia Yan (1 papers)

Papers

"Accountable-subgroup multisignatures: extended abstract"

Silvio Micali, ... -- CCS 2001

"MULTOPS: A Data-Structure for Bandwidth Attack Detection"

Thomer M. Gil, Massimiliano Poletto, ... -- Usenix 2001

"Secure Data Deletion for Linux File Systems"

Steven Bauer, Nissanka B. Priyantha, ... -- Usenix 2001

"The Dos and Don'ts of Client Authentication on the Web"

Kevin Fu, Emil Sit, Kendra Smith, Nick Feamster, ... -- Usenix 2001

"Silicon physical random functions"

Blaise Gassend, Dwaine Clarke, Marten van Dijk, Srinivas Devadas, ... -- CCS 2002

"Tarzan: a peer-to-peer anonymizing network layer"

Robert Morris, ... -- CCS 2002

"Security in Plan 9"

Russ Cox, ... -- Usenix 2002

"Secure Execution via Program Shepherding"

Vladimir Kiriansky, Derek Bruening, Saman Amarasinghe, ... -- Usenix 2002

"Infranet: Circumventing Web Censorship and Surveillance"

Nick Feamster, Magdalena Balazinska, Greg Harfst, Hari Balakrishnan, David Karger, ... -- Usenix 2002

"Making Mix Nets Robust for Electronic Voting by Randomized Partial Checking"

Ronald L. Rivest, ... -- Usenix 2002

"The blocker tag: selective blocking of RFID tags for consumer privacy"

Ronald L. Rivest, ... -- CCS 2003

"SSL Splitting: Securely Serving Data from Untrusted Caches"

Chris Lesniewski-Laas, M. Frans Kaashoek, ... -- Usenix 2003

"The Perils of Unauthenticated Encryption: Kerberos Version 4"

Tom Yu, Sam Hartman, Kenneth Raeburn, ... -- NDSS 2004

"Fast Portscan Detection Using Sequential Hypothesis Testing"

Jaeyeon Jung, Arthur W. Berger, Hari Balakrishnan, ... -- Oakland 2004

"On-the-Fly Verification of Rateless Erasure Codes for Efficient Content Distribution"

Maxwell N. Krohn, ... -- Oakland 2004

"Private Inference Control"

David Woodruff, ... -- CCS 2004

"Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage"

Kevin Fu, Susan Hohenberger, ... -- NDSS 2005

"Towards Constant Bandwidth Overhead Integrity Checking of Untrusted Data"

Dwaine Clarke, Gookwon Edward Suh, Blaise Gassend, Ajay Sudan, Marten van Dijk, Srinivas Devadas, ... -- Oakland 2005

"Proxy Re-Signatures: New Definitions, Algorithms, Applications"

Susan Hohenberger, ... -- CCS 2005

"Inoculating SSH Against Address Harvesting"

Stuart Schechter, Jaeyeon Jung, Will Stockwell, Cynthia McLain, ... -- NDSS 2006

"Fourth-Factor Authentication: Somebody You Know"

Ronald L. Rivest, ... -- CCS 2006

"Evaluating SFI for a CISC Architecture"

Stephen McCamant, ... -- Usenix 2006

"Alpaca: Extensible Authorization for Distributed Services"

Christopher Lesniewski-Laas, Bryan Ford, Jacob Strauss, M. Frans Kaashoek, Robert Morris, ... -- CCS 2007

"Provably Secure Ciphertext Policy ABE"

Ling Cheung, Calvin Newport, ... -- CCS 2007

"Efficient and Robust TCP Stream Normalization"

Mythili Vutukuru, Hari Balakrishnan, ... -- Oakland 2008

"Noninterference for a Practical DIFC-Based Operating System"

Eran Tromer, ... -- Oakland 2009

"Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds"

Eran Tromer, ... -- CCS 2009

"Nemesis: Preventing Authentication and Access Control Vulnerabilities in Web Applications"

Nickolai Zeldovich, ... -- Usenix 2009

"VPriv: Protecting Privacy in Location-Based Vehicular Services"

Hari Balakrishnan, Raluca Ada Popa, ... -- Usenix 2009

"Modeling attacks on physical unclonable functions"

Srinivas Devadas, ... -- CCS 2010

"Making Linux Protection Mechanisms Egalitarian with UserFS"

Taesoo Kim, Nickolai Zeldovich, ... -- Usenix 2010

"Scantegrity II Municipal Election at Takoma Park: The First E2E Binding Governmental Election with Ballot Privacy"

Stefan Popoveniuc, Ronald L. Rivest, Emily Shen, ... -- Usenix 2010

"Automatic Error Finding in Access-Control Policies"

Vijay Ganesh, Martin Rinard, ... -- CCS 2011

"How to Tell if Your Cloud Files Are Vulnerable to Drive Crashes"

Ronald L. Rivest, ... -- CCS 2011

"Privacy and Accountability for Location-based Aggregate Statistics"

Raluca Ada Popa, Hari Balakrishnan, Frank Li, ... -- CCS 2011

"Secure In-Band Wireless Pairing"

Shyamnath Gollakota, Nabeel Ahmed, Nickolai Zeldovich, Dina Katabi, ... -- Usenix 2011

"The Case for Prefetching and Prevalidating TLS Server Certificates"

Emily Stark, ... -- NDSS 2012

"Hourglass Schemes: How to Prove that Cloud Files Are Encrypted"

Ronald L. Rivest, ... -- CCS 2012

"STEALTHMEM: System-Level Protection Against Cache-Based Side Channel Attacks in the Cloud"

Taesoo Kim, ... -- Usenix 2012

"Tracking Rootkit Footprints with a Practical Memory Analysis System"

Zhilei Xu, ... -- Usenix 2012

"Contextual Policy Enforcement in Android Applications with Permission Event Graphs"

Martin Rinard, ... -- NDSS 2013

"PUFs in Security Protocols: Attack Models and Security Evaluations"

Marten van Dijk, ... -- Oakland 2013

"An Ideal-Security Protocol for Order-Preserving Encoding"

Raluca Ada Popa, Frank Li, Nickolai Zeldovich, ... -- Oakland 2013

"Path ORAM: An Extremely Simple Oblivious RAM Protocol"

Christopher W. Fletcher, Ling Ren, Xiangyao Yu, Srinivas Devadas, ... -- CCS 2013

"Honeywords: Making Password-Cracking Detectable"

Ronald L. Rivest, ... -- CCS 2013

"From Zygote to Morula: Fortifying Weakened ASLR on Android"

Taesoo Kim, ... -- Oakland 2014

"Zerocash: Decentralized Anonymous Payments from Bitcoin"

Alessandro Chiesa, Madars Virza, ... -- Oakland 2014

"Information Leaks Without Memory Disclosures: Remote Side Channel Attacks on Diversified Code"

Eric Soderstrom, ... -- CCS 2014

"Taking Authenticated Range Queries to Arbitrary Dimensions"

Stavros Papadopoulos, ... -- CCS 2014

"Practical UC security with a global random oracle"

Abhishek Jain, ... -- CCS 2014

"VerSum: Verifiable Computations over Large Public Logs"

Jelle van den Hooff, M. Frans Kaashoek, Nickolai Zeldovich, ... -- CCS 2014

"Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture"

Alessandro Chiesa, Madars Virza, ... -- Usenix 2014

"Information Flow Analysis of Android Applications in DroidSafe"

Michael I. Gordon, Deokhwan Kim, Jeff Perkins, Martin Rinard, ... -- NDSS 2015

"Machine Learning Classification over Encrypted Data"

Raphael Bost, Raluca Ada Popa, Stephen Tu, Shafi Goldwasser, ... -- NDSS 2015

"Principled Sampling for Anomaly Detection"

Fan Long, Christopher Musco, Stelios Sidiroglou-Douskos, Martin Rinard, ... -- NDSS 2015

"Missing the Point(er): On the Effectiveness of Code Pointer Integrity"

Samuel Fingeret, Julian Gonzalez, Ulziibayar Otgonbaatar, Tiffany Tang, Howard Shrobe, Stelios Sidiroglou-Douskos, Martin Rinard, ... -- Oakland 2015

"Secure Sampling of Public Parameters for Succinct Zero Knowledge Proofs"

Madars Virza, ... -- Oakland 2015

"Control Jujutsu: On the Weaknesses of Fine-Grained Control Flow Integrity"

Fan Long, Ulziibayar Otgonbaatar, Howard Shrobe, Martin Rinard, Stelios Sidiroglou-Douskos, ... -- CCS 2015

"How to Use Bitcoin to Play Decentralized Poker"

Ranjit Kumaresan, ... -- CCS 2015

"Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services"

Albert Kwon, Mashael Al-Sabah, David Lazar, Srini Devadas, ... -- Usenix 2015

"Constants Count: Practical Improvements to Oblivious RAM"

Ling Ren, Christopher W. Fletcher, Albert Kwon, Srinivas Devadas, ... -- Usenix 2015

"pASSWORD tYPOS and How to Correct Them Securely"

Anish Athalye, ... -- Oakland 2016

"Efficient Batched Oblivious PRF with Applications to Private Set Intersection"

Ranjit Kumaresan, ... -- CCS 2016

"Improvements to Secure Computation with Penalties"

Ranjit Kumaresan, Vinod Vaikuntanathan, Prashant Nalini Vasudevan, ... -- CCS 2016

"Amortizing Secure Computation with Penalties"

Ranjit Kumaresan, ... -- CCS 2016

"Sanctum: Minimal Hardware Extensions for Strong Software Isolation"

Victor Costan, Ilia Lebedev, Srinivas Devadas, ... -- Usenix 2016

"Are We There Yet? On RPKI's Deployment and Security"

Yossi Gilad, ... -- NDSS 2017

"HOP: Hardware makes Obfuscation Practical"

Ling Ren, ... -- NDSS 2017

"Catena: Efficient Non-equivocation via Bitcoin"

Alin Tomescu, Srinivas Devadas, ... -- Oakland 2017

"A Formal Foundation for Secure Remote Execution of Enclaves"

Ilia Lebedev, Srinivas Devadas, ... -- CCS 2017

"Veil: Private Browsing Semantics Without Browser-side Assistance."

Frank Wang, Nickolai Zeldovich, ... -- NDSS 2018

"Implementing Conjunction Obfuscation under Entropic Ring LWE"

Kevin King, ... -- Oakland 2018

"Bandwidth-Hard Functions: Reductions and Lower Bounds"

Ling Ren, ... -- CCS 2018

"Secure Search via Sketching for Homomorphic Encryption"

Hayim Shaul, ... -- CCS 2018

"Practical Accountability of Secret Processes"

Jonathan Frankle, Sunoo Park, Daniel Shaar, Shafi Goldwasser, Daniel Weitzner, ... -- Usenix 2018

"GAZELLE: A Low Latency Framework for Secure Neural Network Inference"

Chiraag Juvekar, Vinod Vaikuntanathan, Anantha Chandrakasan, ... -- Usenix 2018

"Vault: Fast Bootstrapping for Cryptocurrencies"

Derek Leung, Adam Suhl, Yossi Gilad, Nickolai Zeldovich, ... -- NDSS 2019

"Simple High-Level Code For Cryptographic Arithmetic -- With Proofs, Without Compromises"

Andres Erbsen, Jade Philipoom, Jason Gross, Robert Sloan, Adam Chlipala, ... -- Oakland 2019

"Efficient Verifiable Secret Sharing with Share Recovery in BFT Protocols"

Alin Tomescu, ... -- CCS 2019

"Transparency Logs via Append-only Authenticated Dictionaries"

Alin Tomescu, Srinivas Devadas, ... -- CCS 2019

"EverParse: Verified Secure Zero-Copy Parsers for Authenticated Message Formats"

Tej Chajed, ... -- Usenix 2019

"Finding Safety in Numbers with Secure Allegation Escrows"

Venkat Arun, ... -- NDSS 2020

"Are We Susceptible to Rowhammer? An End-to-End Methodology for Cloud Providers"

Lillian Tsai, ... -- Oakland 2020

"EverCrypt: A Fast, Verified, Cross-Platform Crytographic Provider"

Joonwon Choi, ... -- Oakland 2020

"Humpty Dumpty: Controlling Word Meanings via Corpus Poisoning"

Tal Schuster, ... -- Oakland 2020

"Towards Scalable Threshold Cryptosystems"

Alin Tomescu, Srinivas Devadas, ... -- Oakland 2020

"The Ballot is Busted Before the Blockchain: A Security Analysis of Voatz, the First Internet Voting Application Used in U.S. Federal Elections"

Michael A. Specter, James Koppel, Daniel Weitzner, ... -- Usenix 2020

"Compact Certificates of Collective Knowledge"

Silvio Micali, Nickolai Zeldovich, ... -- Oakland 2021

"Electromagnetic Covert Channels Can Be Super Resilient"

Jun Huang, ... -- Oakland 2021

"High-Assurance Cryptography in the Spectre Era"

Kevin Liao, ... -- Oakland 2021

"Lightweight Techniques for Private Heavy Hitters"

Henry Corrigan-Gibbs, ... -- Oakland 2021

"SoK: Computer-Aided Cryptography"

Kevin Liao, ... -- Oakland 2021

"Preventing Dynamic Library Compromise on Node.js via RWX-Based Privilege Reduction"

Nikos Vasilakis, ... -- CCS 2021

"Securing Parallel-chain Protocols under Variable Mining Power"

Lei Yang, ... -- CCS 2021

"Supply-Chain Vulnerability Elimination via Active Learning and Regeneration"

Nikos Vasilakis, Shivam Handa, Alizee Schoen, Jiasi Shen, Martin Rinard, ... -- CCS 2021

"Private Blocklist Lookups with Checklist"

Henry Corrigan-Gibbs, ... -- Usenix 2021

"KeyForge: Non-Attributable Email from Forward-Forgeable Signatures"

Michael A. Specter, Sunoo Park, ... -- Usenix 2021

"Express: Lowering the Cost of Metadata-hiding Communication with Cryptographic Privacy"

Henry Corrigan-Gibbs, ... -- Usenix 2021

"Security Analysis of the Democracy Live Online Voting System"

Michael A. Specter, ... -- Usenix 2021

"Preventing Kernel Hacks with HAKCs"

Yianni Giannaris, Carolina Ortega, Howard Shrobe, ... -- NDSS 2022

"Private Nearest Neighbor Search with Sublinear Communication and Malicious Security"

Sacha Servan-Schreiber, Simon Langowski, Srinivas Devadas, ... -- Oakland 2022

"ShorTor: Improving Tor Network Latency via Multi-hop Overlay Routing"

Kyle Hogan, Sacha Servan-Schreiber, Zachary Newman, Srinivas Devadas, ... -- Oakland 2022

"Privacy Limitations of Interest-based Advertising on The Web: A Post-mortem Empirical Analysis of Google's FLoC"

Alex Berke, Dan Calacci, ... -- CCS 2022

"Aardvark: An Asynchronous Authenticated Dictionary with Applications to Account-based Cryptocurrencies"

Derek Leung, Nickolai Zeldovich, ... -- Usenix 2022

"Don't Mesh Around: Side-Channel Attacks and Mitigations on Mesh Interconnects"

Miles Dai, Miguel Gomez-Garcia, Mengjia Yan, ... -- Usenix 2022