Security Research - Selected Publications
Find below selected recent publications from our department. More comprehensive publication lists can be found on the individual project pages listed on the main department page and the list of older projects.
Books and Book Chapters
- David Challener, Kent Yoder, Ryan Catherman, David Safford, Leendert Van Doorn.
A Practical Guide to Trusted Computing
IBM Press, 2008.
ISBN 978-0132398428. -
Pankaj Rohatgi.
Side-channel attacks.
In Hossein Bidgoli, editor, Handbook of Information Security, Volume 3: Threats, Vulnerabilities, Prevention Detection and Management, pages 241-259. John Wiley & Sons, 2005.
ISBN 0471648337. -
Marco Pistoia, Nataraj Nagaratnam, Larry Koved, and Anthony Nadalin.
Enterprise Java Security: Building Secure J2EE Applications.
Addison-Wesley, 2004.
ISBN 0-321-11889-8. -
Suresh Chari, Charanjit S. Jutla, Josyula R. Rao, and Pankaj Rohatgi.
Programming methodology.
In Annabelle McIver and Carroll Morgan, editors, Programming methodology, Monographs in Computer Science, chapter Power Analysis: Attacks and Countermeasures, pages 415-439. Springer-Verlag, Berlin Germany, 2003.
ISBN 0-387-95349.
Articles in Journals and Refereed Conferences
- B. Barak, Y. Dodis, H. Krawczyk, O. Pereira, K. Pietrzak,
F. Standaert and Y. Yu.
Leftover Hash Lemma, Revisited
in Advances in Cryptology -- CRYPTO, 2011. - Gilad Asharov, Yehuda Lindell and Tal Rabin.
Perfectly-Secure Multiplication for Anyt< n/3 .
in Advances in Cryptology -- CRYPTO, 2011. - Matthew Fredrikson, Mihai Christodorescu and Sumesh Jha
Dynamic behavior matching: a complexity analysis and new approximation algorithms
in 23rd international conference on Automated deduction (CADE'11), 2011. - Mihai Christodorescu, Matthew Fredrikson, Somesh Jha and Jonathon Giffin
End-to-End Software Diversification of Internet Services
in Moving Target Defense --- Creating Asymmetric Uncertainty for Cyber Threats, Springer, 2011. - Craig Gentry and Shai Halevi.
Implementing Gentry's fully-homomorphic encryption scheme
in Advances in Cryptology -- EUROCRYPT, 2011. - Andrea Lanzi, Davide Balzarotti, Christopher Kruegel, Mihai Christodorescu and Engin Kirda
AccessMiner: using system-centric models for malware protection
in ACM Conference on Computer and Communications Security, Chicago, 2010. - Rosario Gennaro, Craig Gentry and Brian Parno.
Non-interactive verifiable computing: Outsourcing computation to untrusted workers.
in Advances in Cryptology -- CRYPTO, 2010. - Matt Fredrikson, Mihai Christodorescu, Somesh Jha, Reiner Sailer and Xifeng Yan
Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors,
in Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, CA, 2010. - Suresh Chari, Shai Halevi and Wietse Venema.
Where Do You Want to Go Today? Escalating Privileges by Pathname Manipulation.
in 17th Annual Network and Distributed System Security Symposium (NDSS), 2010. - Matt Fredrikson, Mihai Christodorescu, Jonathon Giffin and Somesh Jha
A Declarative Framework for Intrusion Analysis
in Cyber Situational Awareness --- Issues and Research, Springer, 2009. - Craig Gentry.
Fully homomorphic encryption using ideal lattices.
in Proceedings of the 41st annual ACM symposium on Theory of Computing, 2009. -
Stefan Berger, Ramon Cáceres, Dimitrios Pendarakis, Reiner Sailer,
Enriquillo Valdez, Ronald Perez, Wayne Schildhauer, and Deepa Srinivasan.
TVDc: Managing security in the trusted virtual datacenter.
ACM Operating Systems Review, 42(2), 2008. -
Frederik De Keukelaere, Sumeer Bhola, Michael Steiner, Suresh Chari, and
Sachiko Yoshihama.
SMash: Secure cross-domain mashups on unmodified browsers.
In 17th International Conference on the World-Wide Web, 2008. -
Pau-Chen Cheng, Pankaj Rohatgi, Claudia Keser, Paul A. Karger, Grant M. Wagner,
and Angela Schuett Reninger.
Fuzzy multi-level security: An experiment on quantified risk-adaptive access control.
In Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, CA, 2007. -
Dakshi Agrawal, Selcuk Baktir, Deniz Karakoyunlu, Pankaj Rohatgi, and Berk
Sunar.
Trojan detection using IC fingerprinting.
In Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 296-310, Oakland, CA, 2007.