|
2006
--
- SIA:
Secure Information Aggregation in Sensor Networks (PDF).
With Haowen Chan, Bartosz Przydatek, and Dawn Song. Journal of Computer
Security.
- Secure
Sensor Network Routing: A Clean-Slate Approach (PDF).
With Bryan Parno, Mark Luk, and Evan Gaustad. CoNext, December
2006.
- (R)Evolutionary
Bootstrapping of a Global PKI for Securing BGP (PDF).
With Yih-Chun Hu, David
McGrew, Brian Weis, and Dan Wendlandt. ACM HotNets,
November 2006.
- Secure
Hierarchical In-Network Aggregation in Sensor Networks (PDF).
With Haowen Chan and Dawn Song. ACM CCS,
November 2006.
- Modeling
Adoptability of Secure BGP Protocols (PDF).
With Haowen Chan, Debabrata Dash, and Hui Zhang. Appears at ACM Sigcomm, September
2006.
- SCUBA:
Secure Code Update By Attestation in Sensor Networks (PDF).
With Arvind Seshadri, Mark Luk, Leendert van Doorn, and Pradeep Khosla.
Appears at ACM
Workshop on Wireless Security (WiSe), September 2006.
- Externally
Verifiable Code Execution (PDF).
With Arvind Seshadri, Mark Luk, Leendert van Doorn, and Pradeep Khosla.
Appears in Communications
of the ACM, 49(9):45-49, September 2006.
- Seven
Cardinal Properties of Sensor Network Broadcast Authentication (PDF).
With Mark Luk and Bram Whillock. Appears at ACM Workshop on
Security of Ad Hoc and Sensor Networks (SASN), October 2006.
- Designing
an evaluation method for security user interfaces: lessons from
studying secure wireless network configuration (PDF).
With Cynthia Kuo and Jesse Walker. In Interactions
13(3), May-June 2006.
- StackPi:
New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing
Defense (PDF).
With Abraham Yaar and Dawn Song. To appear in JSAC.
- Bump
in the Ether: A Framework for Securing Sensitive User Input (PDF).
With Jonathan M. McCune and Michael K. Reiter. Appears at USENIX Annual Technical
Conference, June 2006.
- A
Clean-Slate Design for the Next-Generation Secure Internet (PDF).
With Steven Bellovin, David Clark, and Dawn Song. Report of an NSF
workshop held at CMU 12-14 July 2005. Other GENI workshop reports
are available.
- Phoolproof
Phishing Prevention (PDF
of pre-print version). With Bryan Parno and Cynthia Kuo.
To appear at Financial Cryptography and
Data Security (FC '06). Check out our Phoolproof
Phishing
project page.
2005
- Pioneer:
Verifying Integrity and Guaranteeing Execution of Code on Legacy
Platforms (PDF,
BIB).
With Arvind Seshadri, Mark Luk, Elaine Shi, Leendert van Doorn, and
Pradeep Khosla.
Appears at ACM Symposium on
Operating Systems Principles (SOSP). Source code and additional
information is available on our Pioneer project
page.
- Ariadne: A Secure
On-Demand Routing Protocol for Ad Hoc Networks (PDF).
With Yih-Chun Hu and Dave Johnson. Appears in Wireless Networks
Journal, 11(1), 2005.
- Challenges in
Securing Vehicular Networks (PDF,
BIB).
With Bryan Parno.
Appears at Workshop
on Hot Topics in Networks (HotNets-IV).
- Seeing-Is-Believing:
Using Camera Phones for Human-Verifiable Authentication (PDF, BIB).
With Jonathan M. McCune and Michael K. Reiter.
Appears at IEEE
Symposium on Security and Privacy 2005.
- BIND: A
Time-of-use Attestation Service for Secure Distributed Systems (PDF,
BIB).
With Elaine Shi and Leendert van Doorn. Appears at IEEE
Symposium on Security and Privacy 2005.
- Distributed
Detection of Node Replication Attacks in Sensor Networks (PDF,
BIB).
With Bryan Parno and Virgil Gligor. Appears at IEEE
Symposium on Security and Privacy 2005.
- Detection of
Denial-of-Message Attacks on Sensor Network Broadcasts (PDF, BIB).
With Jonathan McCune, Elaine Shi, and Michael K. Reiter. Appears at IEEE
Symposium on Security and Privacy 2005.
- Wormhole Attacks
in Wireless Networks (PDF).
With Yih-Chun Hu and Dave Johnson. Appears in IEEE Journal on Selected
Areas in Communications (JSAC).
- PIKE: Peer
Intermediaries for Key Establishment in Sensor Networks (PS, PDF,
BIB).
With Haowen Chan. Appears
at IEEE Infocom 2005.
- FIT: Fast
Internet Traceback (PS, PDF, BIB).
With Avi Yaar and Dawn
Song. Appears at IEEE
Infocom 2005.
- Using Clustering
Information for Sensor Network Localization (PDF,
BIB).
With Haowen Chan and Mark Luk. Appears at IEEE Conference on
Distributed Computing in Sensor Systems (DCOSS 2005).
- Efficient
Constructions for One-way Hash Chains (PDF,
BIB).
With Yih-Chun Hu and Markus Jakobsson. Appears
at Applied Cryptography and Network
Security (ACNS 2005).
- NATBLASTER:
Establishing TCP Connections Between Hosts Behind NATs (PDF,
BIB).
With Andrew Biggadike, Daniel Ferullo and Geoffrey Wilson. Appears at ACM SIGCOMM ASIA Workshop.
2004
- SPV: Secure Path
Vector Routing for Securing BGP (PS, PDF, PPT,
BIB).
With Yih-Chun Hu and Marvin Sirbu.
Appears in ACM
SIGCOMM 2004.
- SIFF: A Stateless
Internet Flow Filter to Mitigate DDoS Flooding Attacks (PS, PDF,
BIB).
With Avi Yaar and Dawn Song. Appears in 2004 IEEE
Symposium on Security and Privacy.
- SWATT:
SoftWare-based ATTestation for Embedded Devices (PS, PDF,
BIB).
With Arvind Seshadri, Leendert van Doorn, and Pradeep Khosla. Appears
in 2004
IEEE
Symposium on Security and Privacy.
- Designing Secure
Sensor Networks (PDF,
BIB).
With Elaine Shi. Appears in Wireless Communication Magazine, 11(6),
December
2004.
- A Survey of
Secure Wireless Ad Hoc Routing (PDF,
BIB).
With Yih-Chun Hu. Appears in IEEE Security & Privacy, special issue
on Making Wireless Work, 2(3):28-39, IEEE, May/June 2004.
- Key Infection:
Smart Trust for Smart Dust (PS,
PDF,
BIB).
With Ross Anderson and Haowen Chan.
Appears in IEEE International
Conference on Network Protocols (ICNP 2004).
- Using SWATT for
Verifying Embedded Systems in Cars (PS,
PDF,
BIB).
With Arvind Seshadri, Leendert van Doorn, and Pradeep Khosla. Appears
in Embedded
Security in Cars Workshop (ESCAR 2004).
- Security in
Wireless Sensor Networks (PDF).
With David Wagner and Jack Stankovic. In Communications of the ACM,
47(6), June 2004.
- A Survey of
Secure Wireless Ad Hoc Routing PDF.
Appears in IEEE Security
and Privacy special issue on Making Wireless Work, 2(3):28-39,
IEEE, May/June 2004.
- The Sybil Attack
in Sensor Networks: Analysis and Defenses (PS, PDF,
BIB).
With James Newsome, Elaine Shi, and Dawn Song.
Appears in Third International
Symposium on Information Processing in Sensor Networks (IPSN 2004).
- Distillation
Codes and Applications to DoS Resistant Multicast Authentication (PS,
PDF,
BIB).
With Chris Karlof, Naveen Sastry, Yaping Li, and Doug Tygar.
Appears in Network
and Distributed System Security Symposium (NDSS 2004).
- ACE: An Emergent
Algorithm for Highly Uniform Cluster Formation (PDF,
BIB).
With Haowen Chan.
Appears in First European Workshop on
Wireless Sensor Networks (EWSN 2004).
2003
- Taming IP Packet
Flooding Attacks (PS,
PDF,
BIB).
With Daniel Adkins, Karthik Lakshminarayanan, and Ion Stoica.
Appears in Workshop on
Hot Topics in Networks (HotNets-II).
- SIA: Secure
Information Aggregation in Sensor Networks (PDF, BIB).
With Bartosz Przydatek and Dawn Song.
Appears in ACM SenSys 2003.
- Security and
Privacy in Sensor Networks (PDF,
BIB).
With Haowen Chan.
Appears in IEEE Computer
Magazine,
October 2003.
- Opportunistic Use
of Content Addressable Storage for Distributed File Systems PDF,
BIB.
With Niraj Tolia, Michael Kozuch, Mahadev Satyanarayanan, Brad Karp,
and Thomas Bressoud.
Appears in the 2003
Usenix Annual Technical Conference.
- Random Key
Predistribution Schemes for Sensor Networks PS,
PDF,
BIB.
With Haowen Chan and Dawn Song. Appears in IEEE Symposium on
Security and Privacy 2003.
- Pi: A Path
Identification Mechanism to Defend against DDoS Attacks PS, PDF, BIB.
With Avi Yaar and Dawn Song. Appears in IEEE Symposium on
Security and Privacy 2003.
- Efficient
Security Mechanisms for Routing Protocols (PS,
PDF,
PS.GZ,
BIB).
With Yih-Chun Hu and Dave Johnson. Appears in the proceedings of the Tenth Annual
Network and Distributed System Security Symposium (NDSS 2003).
- Rushing Attacks
and Defense in Wireless Ad Hoc Network Routing Protocols (PS,
PDF,
PS.GZ,
BIB).
With Yih-Chun Hu and Dave Johnson. In ACM Workshop on
Wireless Security (WiSe 2003).
- (SuperSEAD
journal paper) SEAD: Secure Efficient Distance Vector Routing for
Mobile Wireless Ad Hoc Networks (PDF,
BIB).
Appears in Ad Hoc
Networks Journal,
1(2003), pages 175-192.
- Packet Leashes: A
Defense against Wormhole Attacks in Wireless Networks (PS,
PDF,
PS.GZ,
BIB).
With
Yih-Chun Hu and Dave Johnson. In IEEE Infocom 2003.
2002
- Ariadne: A Secure
On-Demand Routing Protocol for Ad Hoc Networks (PS,
PDF,
PS.GZ,
BIB).
With Yih-Chun Hu and Dave Johnson. Appears in Mobicom 2002.
- SEAD: Secure
Efficient Distance Vector Routing for Mobile Wireless Ad Hoc
Networks (PS,
PDF,
PS.GZ,
BIB).
With Yih-Chun Hu and Dave Johnson. In Fourth IEEE Workshop on Mobile
Computing Systems and Applications (WMCSA '02), June 2002.
- SPINS: Security
Protocols for Sensor Networks (PS,
PDF,
BIB),
with Robert Szewczyk, Victor Wen, David Culler, and Doug Tygar, in Wireless Networks
Journal (WINE), September 2002.
- The TESLA
Broadcast Authentication Protocol (PS,
PDF,
PS.GZ,
HTML,
BIB),
with Ran Canetti, Dawn Song, and Doug Tygar, in RSA Cryptobytes,
Summer 2002.
- My thesis,
published as a book.
2001
- SPINS: Security
Protocols for Sensor Networks (PS,
PDF,
PPT,
PS.GZ,
HTML,
BIB),
with Robert Szewczyk, Victor Wen, David Culler, and Doug Tygar, in
Proceedings of Seventh Annual International Conference on Mobile
Computing and Networks MOBICOM
2001, July 2001.
- Efficient and
Secure Source Authentication for Multicast (PS,
PDF,
PS.GZ,
HTML,
BIB),
with Ran Canetti, Dawn Song, and Doug Tygar,
in Proceedings of Network and Distributed System Security Symposium NDSS 2001, February 2001. Check
out our TESLA
project page.
- The BiBa One-Time
Signature and Broadcast Authentication Protocol PS,
PDF,
PS.GZ,
HTML,
BIB,
in Proceedings of the ACM
Conference on Computer and Communications Security CCS 2001, November
2001.
- ELK,
a New Protocol for Efficient Large-Group Key Distribution (PS,
PDF,
PS.GZ,
BIB),
with Dawn Song, and Doug Tygar, in Proceedings. of
IEEE Security and Privacy Symposium S&P2001,
May 2001.
- Communication-Efficient
Group Key Agreement (PS,
PS.GZ,
PDF,
HTML,
BIB),
with Yongdae Kim and Gene Tsudik,
International
Federation for Information Processing IFIP SEC 2001.
- Advanced and
Authenticatd Marking Schemes for IP Traceback PS,
PS.GZ,
PDF,
with Dawn Song.
Published at IEEE Infocom
2001
- AGVI ---
Automatic Generation, Verification, and Implementation of Security
ProtocolsPS,
PS.GZ,
PDF,
HTML,
BIB,
with Dawn Song and Doantam Phan. In Proceedings of 13th Conference on
Computer Aided Verification CAV 2001, July 2001.
- SAM: A Flexible
and Secure Auction Architecture Using Trusted HardwarePS,
PS.GZ,
with Sean Smith, Dawn Song, and Doug Tygar. Submitted
to the Electronic Journal on
E-commerce Tools and Applications.
- SAM: A Flexible
and Secure Auction Architecture Using Trusted HardwarePS,
PS.GZ,
PDF,
HTML,
BIB,
with Sean Smith, Dawn Song, and Doug Tygar. First
International Workshop on Internet Computing and E-Commerce ICEC 2001 or mirror.
--
2000
- Efficient
Authentication and Signing of Multicast Streams over Lossy Channels PS,
PDF,
PS.GZ,
HTML,
BIB,
with Ran Canetti, Dawn Song, and Doug Tygar,
in Proc. of IEEE Security and Privacy Symposium S&P2000,
May 2000. Check out our TESLA
project page.
- Group Key
Agreement Efficient in Communication PS,
PDF,
with Yongdae Kim and Gene Tsudik, to
appear in
IEEE Transactions on Computers.
- Simple and
Fault-Tolerant Key Agreement for Dynamic Collaborative Groups (the Tree
Group Diffie Hellman (TGDH) protocol), PS,
PS.GZ,
PDF,
HTML,
BIB,
with Yongdae Kim and Gene Tsudik, 7th ACM Conference on Computer and
Communication Security CCS 2000.
- Efficient
Collaborative Key Management Protocols for Secure Autonomous Group
Communication, BIB,
International Workshop on Cryptographic Techniques and E-Commerce CrypTEC '99.
- Advanced and
Authenticatd Marking Schemes for IP Traceback PS,
PS.GZ,
PDF,
with Dawn Song.
Technical
Report No. UCB/CSD-00-1107.
- A First Step
towards the Automatic Generation of Security Protocols PS,
PS.GZ,
PDF,
HTML,
BIB,
with Dawn Song. In
Proc. of
Network and Distributed System Security NDSS 2000, February 2000.
- Looking for
diamonds in the desert: Automatic security protocol generation for
three-party authentication and key distribution PS,
PS.GZ,
PDF,
HTML,
BIB,
with Dawn Song. In
Proc. of
IEEE Computer Security Foundations Workshop CSFW 13,
July 2000.
- Practical
Techniques for Searches on Encrypted Data PS, PS.GZ,
PDF,
HTML,
BIB,
with Dawn Song and David Wagner. In Proc. of
IEEE Security and Privacy Symposium S&P2000,
May 2000.
- Hash
Visualization: a New Technique to Improve Real-World Security PS,
PS.GZ,
PDF,
HTML,
BIB,
with Dawn Song.
International
Workshop on Cryptographic Techniques and E-Commerce CrypTEC '99.
- Déjà
Vu: A User Study Using Images for Authentication PS,
PS.GZ,
PDF,
HTML,
BIB,
with Rachna Dhamija, 9th
Usenix Security
Symposium, August 2000.
- Watermarking in
the real world. Discusses the limitations of current watermarking
algorithms. Available in PS,
PDF,
and in HTML
- I collaborated
with Scott Craver and Fabien Petitcolas on the robustness of
watermarking chapter in the book Information
hiding techniques for steganography and digital watermarking. You
can order
it at Amazon.
- User
authentication and recognition through keystroke latency analysis. This
was joint work with Dawn Song and Peter Venable.
Our report is available in PS,
PDF,
and HTML.
- Emacs and Unix
Tricks in PS,
PDF,
and HTML
may improve
your productivity.
|