Ari Juels

Orcid: 0009-0002-1143-5504

Affiliations:
  • Cornell University, Cornell Tech, New York City, NY, USA
  • RSA Laboratories, Bedford, MA, USA (former)
  • University of California, Berkeley, CA, USA (PhD 1996)


According to our database1, Ari Juels authored at least 157 papers between 1995 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
B-Privacy: Defining and Enforcing Privacy in Weighted Voting.
CoRR, September, 2025

Giving AI Agents Access to Cryptocurrency and Smart Contracts Creates New Vectors of AI Harm.
CoRR, July, 2025

Voting-Bloc Entropy: A New Metric for DAO Decentralization.
Proceedings of the 34th USENIX Security Symposium, 2025

Liquefaction: Privately Liquefying Blockchain Assets.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

2024
The Sting Framework: Proving the Existence of Superclass Adversaries.
IACR Cryptol. ePrint Arch., 2024

PROF: Protected Order Flow in a Profit-Seeking World.
IACR Cryptol. ePrint Arch., 2024

Props for Machine-Learning Security.
CoRR, 2024

GoAT: File Geolocation via Anchor Timestamping.
Proceedings of the Financial Cryptography and Data Security, 2024

Complete Knowledge: Preventing Encumbrance of Cryptographic Secrets.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
DAO Decentralization: Voting-Bloc Entropy, Bribery, and Dark DAOs.
CoRR, 2023

Open Problems in DAOs.
CoRR, 2023

Clockwork Finance: Automated Analysis of Economic Security in Smart Contracts.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Strategic Latency Reduction in Blockchain Peer-to-Peer Networks.
Proceedings of the Abstract Proceedings of the 2023 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, 2023

Forsage: Anatomy of a Smart-Contract Pyramid Scheme.
Proceedings of the Financial Cryptography and Data Security, 2023

Themis: Fast, Strong Order-Fairness in Byzantine Consensus.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Lanturn: Measuring Economic Security of Smart Contracts Through Adaptive Learning.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2021
CanDID: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance, and Accountability.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

SquirRL: Automating Attack Analysis on Blockchain Incentive Mechanisms with Deep Reinforcement Learning.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

2020
Flash Boys 2.0: Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Order-Fairness for Byzantine Consensus.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

DECO: Liberating Web Data Using Decentralized Oracles for TLS.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

BDoS: Blockchain Denial-of-Service.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Secure Brokered Delegation Through DelegaTEE.
IEEE Secur. Priv., 2019

The Hydra Framework for Principled, Automated Bug Bounties.
IEEE Secur. Priv., 2019

SquirRL: Automating Attack Discovery on Blockchain Incentive Mechanisms with Deep Reinforcement Learning.
CoRR, 2019

Flash Boys 2.0: Frontrunning, Transaction Reordering, and Consensus Instability in Decentralized Exchanges.
CoRR, 2019

Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

CHURP: Dynamic-Committee Proactive Secret Sharing.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

PIEs: Public Incompressible Encodings for Decentralized Storage.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Tesseract: Real-Time Cryptocurrency Exchange Using Trusted Hardware.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Multisketches: Practical Secure Sketches Using Off-the-Shelf Biometric Matching Algorithms.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Paralysis Proofs: Secure Dynamic Access Structures for Cryptocurrency Custody and More.
Proceedings of the 1st ACM Conference on Advances in Financial Technologies, 2019

2018
Paralysis Proofs: Safe Access-Structure Updates for Cryptocurrencies and More.
IACR Cryptol. ePrint Arch., 2018

PIEs: Public Incompressible Encodings for Decentralized Storage.
IACR Cryptol. ePrint Arch., 2018

Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contract Execution.
CoRR, 2018

DelegaTEE: Brokered Delegation Using Trusted Execution Environments.
Proceedings of the 27th USENIX Security Symposium, 2018

Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts.
Proceedings of the 27th USENIX Security Symposium, 2018

2017
Rethinking Security in the Era of Cloud Computing.
IEEE Secur. Priv., 2017

A New Distribution Sensitive Secure Sketch and a Comparison Between Approaches to Typo-Tolerant Authentication.
IACR Cryptol. ePrint Arch., 2017

Tesseract: Real-Time Cryptocurrency Exchange using Trusted Hardware.
IACR Cryptol. ePrint Arch., 2017

REM: Resource-Efficient Mining for Blockchains.
Proceedings of the 26th USENIX Security Symposium, 2017

ROTE: Rollback Protection for Trusted Execution.
Proceedings of the 26th USENIX Security Symposium, 2017

(Short Paper) PieceWork: Generalized Outsourcing Control for Proofs of Work.
Proceedings of the Financial Cryptography and Data Security, 2017

Sealed-Glass Proofs: Using Transparent Enclaves to Prove and Sell Knowledge.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

FairTest: Discovering Unwarranted Associations in Data-Driven Applications.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

A New Distribution-Sensitive Secure Sketch and Popularity-Proportional Hashing.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

Solidus: Confidential Distributed Ledger Transactions via PVORM.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Privacy is dead, long live privacy.
Commun. ACM, 2016

Stealing Machine Learning Models via Prediction APIs.
Proceedings of the 25th USENIX Security Symposium, 2016

pASSWORD tYPOS and How to Correct Them Securely.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Setting Standards for Altering and Undoing Smart Contracts.
Proceedings of the Rule Technologies. Research, Tools, and Applications, 2016

On Scaling Decentralized Blockchains - (A Position Paper).
Proceedings of the Financial Cryptography and Data Security, 2016

Town Crier: An Authenticated Data Feed for Smart Contracts.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

The Ring of Gyges: Investigating the Future of Criminal Smart Contracts.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Discovering Unwarranted Associations in Data-Driven Applications with the FairTest Testing Toolkit.
CoRR, 2015

The Pythia PRF Service.
Proceedings of the 24th USENIX Security Symposium, 2015

GenoGuard: Protecting Genomic Data against Brute-Force Attacks.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Cracking-Resistant Password Vaults Using Natural Language Encoders.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

A Formal Treatment of Backdoored Pseudorandom Generators.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

Falcon Codes: Fast, Authenticated LT Codes (Or: Making Rapid Tornadoes Unstoppable).
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Honey Encryption: Encryption beyond the Brute-Force Barrier.
IEEE Secur. Priv., 2014

Falcon Codes: Fast, Authenticated LT Codes.
IACR Cryptol. ePrint Arch., 2014

The interplay of neuroscience and cryptography: technical perspective.
Commun. ACM, 2014

Permacoin: Repurposing Bitcoin Work for Data Preservation.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

A bodyguard of lies: the use of honey objects in information security.
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014

PillarBox: Combating Next-Generation Malware with Fast Forward-Secure Logging.
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014

Honey Encryption: Security Beyond the Brute-Force Bound.
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014

Cross-Tenant Side-Channel Attacks in PaaS Clouds.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

An Epidemiological Study of Malware Encounters in a Large Enterprise.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Securing the Data in Big Data Security Analytics.
IACR Cryptol. ePrint Arch., 2013

New approaches to security and availability for cloud data.
Commun. ACM, 2013

Tailing RFID Tags for Clone Detection.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Drifting Keys: Impersonation detection for constrained devices.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Balancing security and utility in medical devices?
Proceedings of the 50th Annual Design Automation Conference 2013, 2013

Heart-to-heart (H2H): authentication for implanted medical devices.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Honeywords: making password-cracking detectable.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Fifth ACM cloud computing security workshop (CCSW 2013).
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks.
Proceedings of the Annual Computer Security Applications Conference, 2013

2012
FlipIt: The Game of "Stealthy Takeover".
IACR Cryptol. ePrint Arch., 2012

Sherlock Holmes and the Case of the Advanced Persistent Threat.
Proceedings of the 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2012

Defending against the Unknown Enemy: Applying FlipIt to System Security.
Proceedings of the Decision and Game Theory for Security - Third International Conference, 2012

More for your money: exploiting performance heterogeneity in public clouds.
Proceedings of the ACM Symposium on Cloud Computing, SOCC '12, 2012

Cross-VM side channels and their use to extract private keys.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Hourglass schemes: how to prove that cloud files are encrypted.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Iris: a scalable cloud file system with efficient integrity checks.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2011
HomeAlone: Co-residency Detection in the Cloud via Side-Channel Analysis.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

Exploring implicit memory for painless password recovery.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

How to tell if your cloud files are vulnerable to drive crashes.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Future tense.
Commun. ACM, 2010

On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing.
Proceedings of the 5th USENIX Workshop on Hot Topics in Security, 2010

The Physical Basis of RFID Security.
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2010

Biometrics in electronic travel documents.
Proceedings of the Multimedia and Security Workshop, 2010

A Clean-Slate Look at Disk Scrubbing.
Proceedings of the 8th USENIX Conference on File and Storage Technologies, 2010

2009
CCCP: Secure Remote Storage for Computational RFIDs.
Proceedings of the 18th USENIX Security Symposium, 2009

Server-side detection of malware infection.
Proceedings of the 2009 Workshop on New Security Paradigms, 2009

Power games in RFID security.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009

EPC RFID tag security weaknesses and defenses: passport cards, enhanced drivers licenses, and beyond.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

Proofs of retrievability: theory and implementation.
Proceedings of the first ACM Cloud Computing Security Workshop, 2009

HAIL: a high-availability and integrity layer for cloud storage.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
RFID security and privacy: long-term research or short-term tinkering?
Proceedings of the First ACM Conference on Wireless Network Security, 2008

RFID security: in the shoulder and on the loading dock.
Proceedings of the First ACM Conference on Wireless Network Security, 2008

Unidirectional Key Distribution Across Time and Space with Applications to RFID Security.
Proceedings of the 17th USENIX Security Symposium, 2008

2007
In Response to: Letter to the Editor Regarding: "A Security Analysis of the Verichip Implantable RFID Device".
J. Am. Medical Informatics Assoc., 2007

Combating Click Fraud via Premium Clicks.
Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007

Defining Strong Privacy for RFID.
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications, 2007

Cryptanalysis of Two Lightweight RFID Authentication Schemes.
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications, 2007

Vulnerabilities in First-Generation RFID-enabled Credit Cards.
Proceedings of the Financial Cryptography and Data Security, 2007

Pors: proofs of retrievability for large files.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

Covert channels in privacy-preserving identification systems.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

Two-Party Computing with Encrypted Data.
Proceedings of the Advances in Cryptology, 2007

2006
RFID security and privacy: a research survey.
IEEE J. Sel. Areas Commun., 2006

Technology Evaluation: The Security Implications of VeriChip Cloning.
J. Am. Medical Informatics Assoc., 2006

Cache Cookies for Browser Authentication (Extended Abstract).
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

Shoehorning Security into the EPC Tag Standard.
Proceedings of the Security and Cryptography for Networks, 5th International Conference, 2006

The Outer Limits of RFID Security.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2006

Fourth-factor authentication: somebody you know.
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006

2005
RFID Privacy: An Overview of Problems and Proposed Solutions.
IEEE Secur. Priv., 2005

Strengthening EPC tags against cloning.
Proceedings of the 2005 ACM Workshop on Wireless Security, 2005

Coercion-resistant electronic elections.
Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, 2005

Security Analysis of a Cryptographically-Enabled RFID Device.
Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, July 31, 2005

Security and Privacy Issues in E-passports.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005

High-Power Proxies for Enhancing RFID Privacy and Utility.
Proceedings of the Privacy Enhancing Technologies, 5th International Workshop, 2005

Authenticating Pervasive Devices with Human Protocols.
Proceedings of the Advances in Cryptology, 2005

2004
RFID: security and privacy for five-cent wireless devices.
Proceedings of the 2004 ACM Workshop on Wireless Security, 2004

Soft blocking: flexible blocker tags on the cheap.
Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, 2004

RFID: Security and Privacy for Five-Cent Computers.
Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, 2004

Minimalist Cryptography for Low-Cost RFID Tags.
Proceedings of the Security in Communication Networks, 4th International Conference, 2004

"Yoking-Proofs" for RFID Tags.
Proceedings of the 2nd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2004 Workshops), 2004

Dining Cryptographers Revisited.
Proceedings of the Advances in Cryptology, 2004

Universal Re-encryption for Mixnets.
Proceedings of the Topics in Cryptology, 2004

New client puzzle outsourcing techniques for DoS resistance.
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004

Parallel mixing.
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004

2003
A New Two-Server Approach for Authentication with Short Secrets.
Proceedings of the 12th USENIX Security Symposium, Washington, D.C., USA, August 4-8, 2003, 2003

Squealing Euros: Privacy Protection in RFID-Enabled Banknotes.
Proceedings of the Financial Cryptography, 2003

The blocker tag: selective blocking of RFID tags for consumer privacy.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003

2002
A Fuzzy Vault Scheme.
IACR Cryptol. ePrint Arch., 2002

Making Mix Nets Robust for Electronic Voting by Randomized Partial Checking.
Proceedings of the 11th USENIX Security Symposium, 2002

RSA Key Generation with Verifiable Randomness.
Proceedings of the Public Key Cryptography, 2002

A Two-Server, Sealed-Bid Auction Protocol.
Proceedings of the Financial Cryptography, 6th International Conference, 2002

Proprietary Certificates.
Proceedings of the Topics in Cryptology, 2002

Optimistic Mixing for Exit-Polls.
Proceedings of the Advances in Cryptology, 2002

2001
An optimally robust hybrid mix network.
Proceedings of the Twentieth Annual ACM Symposium on Principles of Distributed Computing, 2001

Targeted Advertising ... And Privacy Too.
Proceedings of the Topics in Cryptology, 2001

Error-tolerant password recovery.
Proceedings of the CCS 2001, 2001

2000
How to turn loaded dice into fair coins.
IEEE Trans. Inf. Theory, 2000

Funkspiel schemes: an alternative to conventional tamper resistance.
Proceedings of the CCS 2000, 2000

Addition of ElGamal Plaintexts.
Proceedings of the Advances in Cryptology, 2000

Mix and Match: Secure Function Evaluation via Ciphertexts.
Proceedings of the Advances in Cryptology, 2000

1999
Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks.
Proceedings of the Network and Distributed System Security Symposium, 1999

Trustee Tokens: Simple and Practical Anonymous Digital Coin Tracing.
Proceedings of the Financial Cryptography, 1999

Proofs of Work and Bread Pudding Protocols.
Proceedings of the Secure Information Networks: Communications and Multimedia Security, 1999

A Fuzzy Commitment Scheme.
Proceedings of the CCS '99, 1999

1998
Hiding Cliques for Cryptographic Security.
Proceedings of the Ninth Annual ACM-SIAM Symposium on Discrete Algorithms, 1998

X-Cash: Executable Digital Cash.
Proceedings of the Financial Cryptography, 1998

A Practical Secure Physical Random Bit Generator.
Proceedings of the CCS '98, 1998

1997
Security of Blind Digital Signatures (Extended Abstract).
Proceedings of the Advances in Cryptology, 1997

1995
Stochastic Hillclimbing as a Baseline Mathod for Evaluating Genetic Algorithms.
Proceedings of the Advances in Neural Information Processing Systems 8, 1995


  Loading...