Publication Permacoin: Repurposing Bitcoin Work for Data Preservation Andrew Miller, Ari Juels, Elaine Shi, Bryan Parno, Jonathan Katz Proceedings of the IEEE Symposium on Security and Privacy | May 2014 Proceedings of the IEEE Symposium on Security and Privacy
Publication World-Driven Access Control for Continuous Sensing Franziska Roesner, David Molnar, Alex Moshchuk, Tadayoshi Kohno, Helen Wang MSR-TR-2014-67 | May 2014
Publication Protecting Obfuscation Against Algebraic Attacks Boaz Barak, Sanjam Garg, Yael Tauman Kalai, Omer Paneth, Amit Sahai May 2014
Publication Deja Q: Using Dual Systems to Revisit q-Type Assumptions Melissa Chase, Sarah Meiklejohn Eurocrypt 2014 | May 2014
Publication On the Complexity of UC Commitments Juan A. Garay, Yuval Ishai, Ranjit Kumaresan, Hoeteck Wee Advances in Cryptology – EUROCRYPT 2014 | May 2014
Publication Pivot: Fast, Synchronous Mashup Isolation Using Generator Chains James Mickens Proceedings of the IEEE Symposium on Security and Privacy | May 2014
Publication Generating Summary Risk Scores for Mobile Applications Christopher S. Gates, Ninghui Li, Hao Peng, Bhaskar Sarma, Yuan Qi, Rahul Potharaju, Cristina Nita-Rotuaru, Ian Molloy IEEE Transactions on Dependable and Secure Computing | May 2014, Vol 11(3): pp. 238-251
Publication Stealing Webpages Rendered on Your Browser by Exploiting GPU Vulnerabilities Sangho Lee, Youngsok Kim, Jangwoo Kim, Jong Kim 35th IEEE Symposium on Security and Privacy (Oakland 2014) | May 2014
Publication Bootstrapping Privacy Compliance in Big Data Systems Shayak Sen, Saikat Guha, Anupam Dutta, Sriram Rajamani, Janice Tsai, Jeannette Wing Proceedings of the 35th IEEE Symposium on Security & Privacy (Oakland) | May 2014 Video