Adrian Perrig's research papers

 
Home
TESLA
Photos
Links
 

2006 --

  • SIA: Secure Information Aggregation in Sensor Networks (PDF). With Haowen Chan, Bartosz Przydatek, and Dawn Song. Journal of Computer Security.
  • Secure Sensor Network Routing: A Clean-Slate Approach (PDF). With Bryan Parno, Mark Luk, and Evan Gaustad. CoNext, December 2006.
  • (R)Evolutionary Bootstrapping of a Global PKI for Securing BGP (PDF). With Yih-Chun Hu, David McGrew, Brian Weis, and Dan Wendlandt. ACM HotNets, November 2006.
  • Secure Hierarchical In-Network Aggregation in Sensor Networks (PDF). With Haowen Chan and Dawn Song. ACM CCS, November 2006.
  • Modeling Adoptability of Secure BGP Protocols (PDF). With Haowen Chan, Debabrata Dash, and Hui Zhang. Appears at ACM Sigcomm, September 2006.
  • SCUBA: Secure Code Update By Attestation in Sensor Networks (PDF). With Arvind Seshadri, Mark Luk, Leendert van Doorn, and Pradeep Khosla. Appears at ACM Workshop on Wireless Security (WiSe), September 2006.
  • Externally Verifiable Code Execution (PDF). With Arvind Seshadri, Mark Luk, Leendert van Doorn, and Pradeep Khosla. Appears in Communications of the ACM, 49(9):45-49, September 2006.
  • Seven Cardinal Properties of Sensor Network Broadcast Authentication (PDF). With Mark Luk and Bram Whillock. Appears at ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), October 2006.
  • Designing an evaluation method for security user interfaces: lessons from studying secure wireless network configuration (PDF). With Cynthia Kuo and Jesse Walker. In Interactions 13(3), May-June 2006.
  • StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense (PDF). With Abraham Yaar and Dawn Song. To appear in JSAC.
  • Bump in the Ether: A Framework for Securing Sensitive User Input (PDF). With Jonathan M. McCune and Michael K. Reiter. Appears at USENIX Annual Technical Conference, June 2006.
  • A Clean-Slate Design for the Next-Generation Secure Internet (PDF). With Steven Bellovin, David Clark, and Dawn Song. Report of an NSF workshop held at CMU 12-14 July 2005. Other GENI workshop reports are available.
  • Phoolproof Phishing Prevention (PDF of pre-print version). With Bryan Parno and Cynthia Kuo. To appear at Financial Cryptography and Data Security (FC '06). Check out our Phoolproof Phishing project page.

2005

2004

2003

2002

2001

  • SPINS: Security Protocols for Sensor Networks (PS, PDF, PPT, PS.GZ, HTML, BIB), with Robert Szewczyk, Victor Wen, David Culler, and Doug Tygar, in Proceedings of Seventh Annual International Conference on Mobile Computing and Networks MOBICOM 2001, July 2001.
  • Efficient and Secure Source Authentication for Multicast (PS, PDF, PS.GZ, HTML, BIB), with Ran Canetti, Dawn Song, and Doug Tygar, in Proceedings of Network and Distributed System Security Symposium NDSS 2001, February 2001. Check out our TESLA project page.
  • The BiBa One-Time Signature and Broadcast Authentication Protocol PS, PDF, PS.GZ, HTML, BIB, in Proceedings of the ACM Conference on Computer and Communications Security CCS 2001, November 2001.
  • ELK, a New Protocol for Efficient Large-Group Key Distribution (PS, PDF, PS.GZ, BIB), with Dawn Song, and Doug Tygar, in Proceedings. of IEEE Security and Privacy Symposium S&P2001, May 2001.
  • Communication-Efficient Group Key Agreement (PS, PS.GZ, PDF, HTML, BIB), with Yongdae Kim and Gene Tsudik, International Federation for Information Processing IFIP SEC 2001.
  • Advanced and Authenticatd Marking Schemes for IP Traceback PS, PS.GZ, PDF, with Dawn Song. Published at IEEE Infocom 2001
  • AGVI --- Automatic Generation, Verification, and Implementation of Security ProtocolsPS, PS.GZ, PDF, HTML, BIB, with Dawn Song and Doantam Phan. In Proceedings of 13th Conference on Computer Aided Verification CAV 2001, July 2001.
  • SAM: A Flexible and Secure Auction Architecture Using Trusted HardwarePS, PS.GZ, with Sean Smith, Dawn Song, and Doug Tygar. Submitted to the Electronic Journal on E-commerce Tools and Applications.
  • SAM: A Flexible and Secure Auction Architecture Using Trusted HardwarePS, PS.GZ, PDF, HTML, BIB, with Sean Smith, Dawn Song, and Doug Tygar. First International Workshop on Internet Computing and E-Commerce ICEC 2001 or mirror.

-- 2000

  • Efficient Authentication and Signing of Multicast Streams over Lossy Channels PS, PDF, PS.GZ, HTML, BIB, with Ran Canetti, Dawn Song, and Doug Tygar, in Proc. of IEEE Security and Privacy Symposium S&P2000, May 2000. Check out our TESLA project page.
  • Group Key Agreement Efficient in Communication PS, PDF, with Yongdae Kim and Gene Tsudik, to appear in IEEE Transactions on Computers.
  • Simple and Fault-Tolerant Key Agreement for Dynamic Collaborative Groups (the Tree Group Diffie Hellman (TGDH) protocol), PS, PS.GZ, PDF, HTML, BIB, with Yongdae Kim and Gene Tsudik, 7th ACM Conference on Computer and Communication Security CCS 2000.
  • Efficient Collaborative Key Management Protocols for Secure Autonomous Group Communication, BIB, International Workshop on Cryptographic Techniques and E-Commerce CrypTEC '99.
  • Advanced and Authenticatd Marking Schemes for IP Traceback PS, PS.GZ, PDF, with Dawn Song. Technical Report No. UCB/CSD-00-1107.
  • A First Step towards the Automatic Generation of Security Protocols PS, PS.GZ, PDF, HTML, BIB, with Dawn Song. In Proc. of Network and Distributed System Security NDSS 2000, February 2000.
  • Looking for diamonds in the desert: Automatic security protocol generation for three-party authentication and key distribution PS, PS.GZ, PDF, HTML, BIB, with Dawn Song. In Proc. of IEEE Computer Security Foundations Workshop CSFW 13, July 2000.
  • Practical Techniques for Searches on Encrypted Data PS, PS.GZ, PDF, HTML, BIB, with Dawn Song and David Wagner. In Proc. of IEEE Security and Privacy Symposium S&P2000, May 2000.
  • Hash Visualization: a New Technique to Improve Real-World Security PS, PS.GZ, PDF, HTML, BIB, with Dawn Song. International Workshop on Cryptographic Techniques and E-Commerce CrypTEC '99.
  • Déjà Vu: A User Study Using Images for Authentication PS, PS.GZ, PDF, HTML, BIB, with Rachna Dhamija, 9th Usenix Security Symposium, August 2000.
  • Watermarking in the real world. Discusses the limitations of current watermarking algorithms. Available in PS, PDF, and in HTML
  • I collaborated with Scott Craver and Fabien Petitcolas on the robustness of watermarking chapter in the book Information hiding techniques for steganography and digital watermarking. You can order it at Amazon.
  • User authentication and recognition through keystroke latency analysis. This was joint work with Dawn Song and Peter Venable. Our report is available in PS, PDF, and HTML.
  • Emacs and Unix Tricks in PS, PDF, and HTML may improve your productivity.