Dynamic Searchable Encryption with Optimal Search in the Presence of Deletions
JG. Chamani, D.Papadopoulos, M.Karbasforushan, I.Demertzis
Proceedings of USENIX 2022, August 2022.
MaDIoT 2.0: Modern High-Wattage IoT Botnet Attacks and Defenses
T.Shekari, A.Cardenas, R.Beyah
Proceedings of USENIX Security 2022, August 2022.
Applying consensus and replication securely with FLAQR
P.Mondal, M.Algehed, O.Arden
Proceedings of CSF 2022, May 2022.
Payment Channels Under Network Congestion
T.Tran, H.Zheng, P.Alvaro, O.Arden
Proceedings of ICBC 2022, May 2022.
You Make Me Tremble: A First Look at Attacks Against Structural Control Systems
A.Zambrano, A.Palacio-Betancur, L.Burbano, A.NiƱo, L.Giraldo, M.Soto, J.Giraldo, A.Cardenas
Proceedings of ACM CCS 2021, November 2021.
On-device IoT Certificate Revocation Checking with Small Memory and Low Latency
X.Shi, S.Shi, M.Wang, J.Kaunisto, C.Qian
Proceedings of CCS 2021, November 2021.
Snoopy: Surpassing the Scalability Bottleneck of Oblivious Storage
E.Dauterman, V.Fang, I.Demertzis, N.Crooks, R.Popa
Proceedings of SOSP 2021, October 2021.
Artifice: Data in Disguise
A.Barker, Y.Gupta, S.Au, E.Chou, E.Miller, D.Long
Proceeding of MSST 2020, October 2020.
Concurrent Entanglement Routing for Quantum Networks: Model and Designs
S.Shi, C.Qian
Proceedings of SIGCOMM 2020, July 2020.
Inkpack: A Secure, Data-Exposure Resistant Storage System
O.Bel, K.Chang, D.Bittman, H.Isozaki, D.Long, E.Miller
Proceedings of SYSTOR 2018, June 2018.