Publication Reusable Garbled Circuits and Succinct Functional Encryption Shafi Goldwasser, Yael Tauman Kalai, Raluca Ada Popa In Proceedings of the 45th annual ACM symposium on Theory of computing (STOC) | June 2013
Publication How to Run POSIX Apps in a Minimal Picoprocess Jon Howell, Bryan Parno, John (JD) Douceur Proceedings of the USENIX Annual Technical Conference | June 2013 Proceedings of the USENIX Annual Technical Conference Project
Publication Quadratic Span Programs and Succinct NIZKs without PCPs Rosario Gennaro, Craig Gentry, Bryan Parno, Mariana Raykova Proceedings of the IACR Eurocrypt Conference | May 2013 Proceedings of the IACR Eurocrypt Conference Project
Publication Large-Scale Malware Classification Using Random Projections and Neural Networks George Dahl, Jack W. Stokes, Li Deng, Dong Yu Proceedings IEEE Conference on Acoustics, Speech, and Signal Processing (ICASSP) | May 2013 Project
Publication Robust scareware image detection Christian Seifert, Jack W. Stokes, Christina Colcernian, John Platt, Long Lu 2013 International Conference on Acoustics, Speech, and Signal Processing | May 2013 Project
Publication Gone, But Not Forgotten: The Current State of Private Computing (Short Paper) Aseem Rastogi, Jun Yuan, Rob Johnson Web 2.0 Security & Privacy 2013 | May 2013
Publication You Needn’t Build That: Reusable Ethics-Compliance Infrastructure for Human Subjects Research Cristian Bravo-Lillo, Serge Egelman, Cormac Herley, Stuart Schechter, Janice Tsai Cyber-security Research Ethics Dialog & Strategy Workshop (CREDS 2013) | May 2013
Publication Pinocchio: Nearly Practical Verifiable Computation Bryan Parno, Jon Howell, Craig Gentry, Mariana Raykova Proceedings of the IEEE Symposium on Security and Privacy | May 2013 Proceedings of the IEEE Symposium on Security and Privacy Best Paper Award Project
Publication Finding the Linchpins of the Dark Web: a Study on Topologically Dedicated Hosts on Malicious Web Infrastructures Zhou Li, Sumayah Arlwais, Yinglian Xie, Fang Yu, XiaoFeng Wang IEEE Symposium on Security and Privacy, 2013 | May 2013 IEEE Symposium on Security and Privacy, 2013
Publication SocialWatch: Detection of Online Service Abuse via Large-Scale Social Graphs Junxian Huang, Yinglian Xie, Fang Yu, Qifa Ke, Martin Abadi, Eliot Gillum, Z. Morley Mao 8th ACM Symposium on Information, Computer and Communications Security (AsiaCCS) | May 2013