David Durham

According to our database1, David Durham authored at least 25 papers between 2000 and 2023.

Collaborative distances:



In proceedings 
PhD thesis 


On csauthors.net:


MEMES: Memory Encryption-Based Memory Safety on Commodity Hardware.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

EC-CFI: Control-Flow Integrity via Code Encryption Counteracting Fault Attacks.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2023

Cryptographic Capability Computing.
Proceedings of the MICRO '21: 54th Annual IEEE/ACM International Symposium on Microarchitecture, 2021

Κ-Cipher: A Low Latency, Bit Length Parameterizable Cipher.
IACR Cryptol. ePrint Arch., 2020

The MAGIC Mode for Simultaneously Supporting Encryption, Message Authentication and Error Correction.
IACR Cryptol. ePrint Arch., 2020

Security definitions, entropy measures and constructions for implicitly detecting data corruption.
Comput. Commun., 2020

K-Cipher: A Low Latency, Bit Length Parameterizable Cipher.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

IVP: A Three Level Confusion-Diffusion Network Supporting Implicit Data Integrity.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019

Cryptographic Constructions Supporting Implicit Data Integrity.
IACR Cryptol. ePrint Arch., 2018

Implicit Data Integrity: Protecting User Data without MACs.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

There is No Need to Waste Communication Bandwidth on MACs.
Proceedings of the 2018 Global Information Infrastructure and Networking Symposium, 2018

Non-recursive computation of the probability of more than two people having the same birthday.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

HotChips security tutorial.
Proceedings of the 2014 IEEE Hot Chips 26 Symposium (HCS), 2014

Mitigating exploits, rootkits and advanced persistent threats.
Proceedings of the 2014 IEEE Hot Chips 26 Symposium (HCS), 2014

Encrypting the internet.
Proceedings of the ACM SIGCOMM 2010 Conference on Applications, 2010

System-wide anatomy and tuning of a SPECweb SSL server.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010

A hypervisor-based system for protecting software runtime memory and persistent storage.
Proceedings of the 2008 Spring Simulation Multiconference, 2008

Denial of Service Attacks Using Internet Key Exchange Protocol.
Proceedings of the 5th IEEE Consumer Communications and Networking Conference, 2008

Human Perceivable Authentication: An Economical Solution for Security Associations in Short-Distance Wireless Networking.
Proceedings of the 16th International Conference on Computer Communications and Networks, 2007

Mitigating the Lying-Endpoint Problem in Virtualized Network Access Frameworks.
Proceedings of the Managing Virtualization of Networks and Services, 2007

Information Model for Describing Network Device QoS Datapath Mechanisms.
RFC, January, 2004

Building intelligent traffic engineering solutions.
Proceedings of the Network Control and Engineering for QoS, 2002

COPS Usage for Policy Provisioning (COPS-PR).
RFC, March, 2001

COPS usage for RSVP.
RFC, January, 2000

The COPS (Common Open Policy Service) Protocol.
RFC, January, 2000