Karim M. El Defrawy

According to our database1, Karim M. El Defrawy authored at least 49 papers between 2006 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
A High-Assurance, Automatically-Synthesized, Evaluator for Machine-Checked (Proactively) Secure Multi-Party Computation.
IACR Cryptology ePrint Archive, 2019

A Verified Architecture for Proofs of Execution on Remote Devices under Full Software Compromise.
CoRR, 2019

Advancing remote attestation via computer-aided formal verification of designs and synthesis of executables: opinion.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

VRASED: A Verified Hardware/Software Co-Design for Remote Attestation.
Proceedings of the 28th USENIX Security Symposium, 2019

A High-Assurance Evaluator for Machine-Checked Secure Multiparty Computation.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Longitudinal Analysis of Misuse of Bitcoin.
Proceedings of the Applied Cryptography and Network Security, 2019

2018
Formally Verified Hardware/Software Co-Design for Remote Attestation.
CoRR, 2018

Proactive Secure Multiparty Computation with a Dishonest Majority.
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018

BlockCIS - A Blockchain-Based Cyber Insurance System.
Proceedings of the 2018 IEEE International Conference on Cloud Engineering, 2018

Reconciling remote attestation and safety-critical operation on simple IoT devices.
Proceedings of the 55th Annual Design Automation Conference, 2018

Secure Non-interactive User Re-enrollment in Biometrics-Based Identification and Authentication Systems.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2018

Temporal Consistency of Integrity-Ensuring Computations and Applications to Embedded Systems Security.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

Theoretical Foundations for Mobile Target Defense: Proactive Secret Sharing and Secure Multiparty Computation.
Proceedings of the From Database to Cyber Security, 2018

2017
Efficient, Reusable Fuzzy Extractors from LWE.
IACR Cryptology ePrint Archive, 2017

HYDRA: HYbrid Design for Remote Attestation (Using a Formally Verified Microkernel).
CoRR, 2017

HYDRA: hybrid design for remote attestation (using a formally verified microkernel).
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

Brief Announcement: Secure Self-Stabilizing Computation.
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2017

Proactively Secure Cloud-Enabled Storage.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

FUsing Hybrid Remote Attestation with a Formally Verified Microkernel: Lessons Learned.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2017

Efficient, Reusable Fuzzy Extractors from LWE.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2017

Lightweight Swarm Attestation: A Tale of Two LISA-s.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Proactive Secret Sharing with a Dishonest Majority.
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016

Brief Announcement: Proactive Secret Sharing with a Dishonest Majority.
Proceedings of the 2016 ACM Symposium on Principles of Distributed Computing, 2016

Automated Inference of Dependencies of Network Services and Applications via Transfer Entropy.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Byzantine Fault Tolerant Software-Defined Networking (SDN) Controllers.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

2015
Communication-Optimal Proactive Secret Sharing for Dynamic Groups.
IACR Cryptology ePrint Archive, 2015

Communication-Optimal Proactive Secret Sharing for Dynamic Groups.
Proceedings of the Applied Cryptography and Network Security, 2015

2014
How to withstand mobile virus attacks, revisited.
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2014

Disincentivizing/Incentivizing Malicious/Honest Behavior on the Internet via Privacy-Preserving Appcoins.
Proceedings of the 22nd IEEE International Conference on Network Protocols, 2014

Founding Digital Currency on Secure Computation.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Agent societies and social networks for ubiquitous computing.
Personal and Ubiquitous Computing, 2013

How to Withstand Mobile Virus Attacks, Revisited.
IACR Cryptology ePrint Archive, 2013

Blindfolded Data Search via Secure Pattern Matching.
IEEE Computer, 2013

Neighborhood watch: On network coding throughput and key sharing.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

2012
Harvesting SSL Certificate Data to Identify Web-Fraud.
I. J. Network Security, 2012

5PM: Secure Pattern Matching.
IACR Cryptology ePrint Archive, 2012

5PM: Secure Pattern Matching.
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012

SMART: Secure and Minimal Architecture for (Establishing Dynamic) Root of Trust.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

2011
ALARM: Anonymous Location-Aided Routing in Suspicious MANETs.
IEEE Trans. Mob. Comput., 2011

Privacy-Preserving Location-Based On-Demand Routing in MANETs.
IEEE Journal on Selected Areas in Communications, 2011

Group Distance Bounding Protocols - (Short Paper).
Proceedings of the Trust and Trustworthy Computing - 4th International Conference, 2011

2010
GDB: Group Distance Bounding Protocols
CoRR, 2010

Attacks on physical-layer identification.
Proceedings of the Third ACM Conference on Wireless Network Security, 2010

2009
Harvesting SSL Certificate Data to Mitigate Web-Fraud
CoRR, 2009

Leveraging Social Contacts for Message Confidentiality in Delay Tolerant Networks.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

2008
PRISM: Privacy-friendly routing in suspicious MANETs (and VANETs).
Proceedings of the 16th annual IEEE International Conference on Network Protocols, 2008

2007
BotTorrent: Misusing BitTorrent to Launch DDoS Attacks.
Proceedings of the 3rd Workshop on Steps to Reducing Unwanted Traffic on the Internet, 2007

2006
Optimal Filtering for DDoS Attacks
CoRR, 2006

Proposal for a cross-layer coordination framework for next generation wireless systems.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2006


  Loading...