Bryan Parno

According to our database1, Bryan Parno authored at least 71 papers between 2003 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2022
Linear types for large-scale systems verification.
Proc. ACM Program. Lang., 2022

Logic Locking - Connecting Theory and Practice.
IACR Cryptol. ePrint Arch., 2022

Algebraic Reductions of Knowledge.
IACR Cryptol. ePrint Arch., 2022

2021
Transparency Dictionaries with Succinct Proofs of Correct Operation.
IACR Cryptol. ePrint Arch., 2021

Blockchains Enable Non-Interactive MPC.
IACR Cryptol. ePrint Arch., 2021

Self-Repairing Neural Networks: Provable Safety for Deep Networks via Dynamic Repair.
CoRR, 2021

SoK: Computer-Aided Cryptography.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Don't Yank My Chain: Auditable NF Service Chaining.
Proceedings of the 18th USENIX Symposium on Networked Systems Design and Implementation, 2021

Finding Invariants of Distributed Systems: It's a Small (Enough) World After All.
Proceedings of the 18th USENIX Symposium on Networked Systems Design and Implementation, 2021

Fast Geometric Projections for Local Robustness Certification.
Proceedings of the 9th International Conference on Learning Representations, 2021

HerQules: securing programs via hardware-enforced message queues.
Proceedings of the ASPLOS '21: 26th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2021

2020
A Direct Construction for Asymptotically Optimal zkSNARKs.
IACR Cryptol. ePrint Arch., 2020

Storing and Retrieving Secrets on a Blockchain.
IACR Cryptol. ePrint Arch., 2020

A Security Model and Fully Verified Implementation for the IETF QUIC Record Layer.
IACR Cryptol. ePrint Arch., 2020

Talek: Private Group Messaging with Hidden Access Patterns.
IACR Cryptol. ePrint Arch., 2020

Verified Transformations and Hoare Logic: Beautiful Proofs for Ugly Assembly Language.
Proceedings of the Software Verification - 12th International Conference, 2020


Armada: low-effort verification of high-performance concurrent programs.
Proceedings of the 41st ACM SIGPLAN International Conference on Programming Language Design and Implementation, 2020

Storage Systems are Distributed Systems (So Verify Them That Way!).
Proceedings of the 14th USENIX Symposium on Operating Systems Design and Implementation, 2020

CAPS: Smoothly Transitioning to a More Resilient Web PKI.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
A verified, efficient embedding of a verifiable assembly language.
Proc. ACM Program. Lang., 2019

EverCrypt: A Fast, Verified, Cross-Platform Cryptographic Provider.
IACR Cryptol. ePrint Arch., 2019

SoK: Computer-Aided Cryptography.
IACR Cryptol. ePrint Arch., 2019

2017
IronFleet: proving safety and liveness of practical distributed systems.
Commun. ACM, 2017

Vale: Verifying High-Performance Cryptographic Assembly Code.
Proceedings of the 26th USENIX Security Symposium, 2017

Komodo: Using verification to disentangle secure-enclave hardware from software.
Proceedings of the 26th Symposium on Operating Systems Principles, 2017


2016
Hash First, Argue Later: Adaptive Verifiable Computations on Outsourced Data.
IACR Cryptol. ePrint Arch., 2016

Pinocchio: nearly practical verifiable computation.
Commun. ACM, 2016

Cinderella: Turning Shabby X.509 Certificates into Elegant Anonymous Credentials with the Magic of Verifiable Computation.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

2015
Network Adversary Attacks against Secure Encryption Schemes.
IEICE Trans. Commun., 2015

A Note on the Unsoundness of vnTinyRAM's SNARK.
IACR Cryptol. ePrint Arch., 2015

IronFleet: proving practical distributed systems correct.
Proceedings of the 25th Symposium on Operating Systems Principles, 2015

2014
Geppetto: Versatile Verifiable Computation.
IACR Cryptol. ePrint Arch., 2014

Missive: Fast Application Launch From an Untrusted Buffer Cache.
Proceedings of the 2014 USENIX Annual Technical Conference, 2014

Permacoin: Repurposing Bitcoin Work for Data Preservation.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

Ironclad Apps: End-to-End Security via Automated Full-System Verification.
Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation, 2014

Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers (dissertation, updated version).
ACM Books 2, ACM / Morgan & Claypool, ISBN: 978-1-62705-477-5, 2014

2013
The 10-Kilobyte Web Browser.
login Usenix Mag., 2013

How to Run POSIX Apps in a Minimal Picoprocess.
Proceedings of the 2013 USENIX Annual Technical Conference, 2013

Embassies: Radically Refactoring the Web.
Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation, 2013

Shroud: ensuring private access to large-scale data in the data center.
Proceedings of the 11th USENIX conference on File and Storage Technologies, 2013

Fifth ACM cloud computing security workshop (CCSW 2013).
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

The first workshop on language support for privacy-enhancing technologies (PETShop'13).
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Pinocchio coin: building zerocoin from a succinct pairing-based proof system.
Proceedings of the PETShop'13, 2013

2012
Resolving the conflict between generality and plausibility in verified computation.
IACR Cryptol. ePrint Arch., 2012

Toward Practical Private Access to Data Centers via Parallel ORAM.
IACR Cryptol. ePrint Arch., 2012

Quadratic Span Programs and Succinct NIZKs without PCPs.
IACR Cryptol. ePrint Arch., 2012

Trust extension for commodity computers.
Commun. ACM, 2012

Lockdown: Towards a Safe and Practical Architecture for Security Applications on Commodity Platforms.
Proceedings of the Trust and Trustworthy Computing - 5th International Conference, 2012

User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

2011
Bootstrapping Trust in Modern Computers.
Springer Briefs in Computer Science 10, Springer, ISBN: 978-1-4614-1460-5, 2011

How to Delegate and Verify in Public: Verifiable Computation from Attribute-based Encryption.
IACR Cryptol. ePrint Arch., 2011

Memoir: Practical State Continuity for Protected Modules.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

The web interface should be radically refactored.
Proceedings of the Tenth ACM Workshop on Hot Topics in Networks (HotNets-X), 2011

2010
Bootstrapping Trust in Commodity Computers.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

2009
Non-Interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers.
IACR Cryptol. ePrint Arch., 2009

CLAMP: Practical Prevention of Large-Scale Data Leaks.
Proceedings of the 30th IEEE Symposium on Security and Privacy (S&P 2009), 2009

2008
Unidirectional Key Distribution Across Time and Space with Applications to RFID Security.
IACR Cryptol. ePrint Arch., 2008

Bootstrapping Trust in a "Trusted" Platform.
Proceedings of the 3rd USENIX Workshop on Hot Topics in Security, 2008

Countermeasures against Government-Scale Monetary Forgery.
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008

Flicker: an execution infrastructure for tcb minimization.
Proceedings of the 2008 EuroSys Conference, Glasgow, Scotland, UK, April 1-4, 2008, 2008

SNAPP: stateless network-authenticated path pinning.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

How low can you go?: recommendations for hardware-supported minimal TCB code execution.
Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems, 2008

2007
Minimal TCB Code Execution.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007

Portcullis: protecting connection setup from denial-of-capability attacks.
Proceedings of the ACM SIGCOMM 2007 Conference on Applications, 2007

2006
Phoolproof Phishing Prevention.
Proceedings of the Financial Cryptography and Data Security, 2006

Secure sensor network routing: a clean-slate approach.
Proceedings of the 2006 ACM Conference on Emerging Network Experiment and Technology, 2006

2005
Distributed Detection of Node Replication Attacks in Sensor Networks.
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), 2005

2004
Defending a P2P Digital Preservation System.
IEEE Trans. Dependable Secur. Comput., 2004

2003
An Analysis of Database-Driven Mail Servers.
Proceedings of the 17th Conference on Systems Administration (LISA 2003), 2003


  Loading...