Radu Sion

Orcid: 0000-0002-1237-8276

Affiliations:
  • Stony Brook University, USA


According to our database1, Radu Sion authored at least 124 papers between 2000 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A Study of China's Censorship and Its Evasion Through the Lens of Online Gaming.
Proceedings of the 32nd USENIX Security Symposium, 2023

Wink: Deniable Secure Messaging.
Proceedings of the 32nd USENIX Security Symposium, 2023

2022
SoK: Plausibly Deniable Storage.
Proc. Priv. Enhancing Technol., 2022

Cloud Computing Security: Foundations and Research Directions.
Found. Trends Priv. Secur., 2022

AppBastion: Protection from Untrusted Apps and OSes on ARM.
Proceedings of the Computer Security - ESORICS 2022, 2022

An REE-independent Approach to Identify Callers of TEEs in TrustZone-enabled Cortex-M Devices.
Proceedings of the 8th ACM on Cyber-Physical System Security Workshop, 2022

2021
ConcurDB: Concurrent Query Authentication for Outsourced Databases.
IEEE Trans. Knowl. Data Eng., 2021

PEARL: Plausibly Deniable Flash Translation Layer using WOM coding.
Proceedings of the 30th USENIX Security Symposium, 2021

2020
SqORAM: Read-Optimized Sequential Write-Only Oblivious RAM.
Proc. Priv. Enhancing Technol., 2020

INFUSE: Invisible plausibly-deniable file system for NAND flash.
Proc. Priv. Enhancing Technol., 2020

Horizontal Privilege Escalation in Trusted Applications.
Proceedings of the 29th USENIX Security Symposium, 2020

DECAF: Automatic, Adaptive De-bloating and Hardening of COTS Firmware.
Proceedings of the 29th USENIX Security Symposium, 2020

CCSW'20: 2020 Cloud Computing Security Workshop.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Cost-Efficient Tasks and Data Co-Scheduling with AffordHadoop.
IEEE Trans. Cloud Comput., 2019

PD-DM: An efficient locality-preserving block device mapper with plausible deniability.
Proc. Priv. Enhancing Technol., 2019

ConcurORAM: High-Throughput Stateless Parallel Multi-Client ORAM.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

rORAM: Efficient Range ORAM with O(log2 N) Locality.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Speculative Execution Attacks and Cloud Security.
Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop, 2019

CCSW'19 Workshop Summary: 2019 Cloud Computing Security Workshop.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Regulatory Compliance in Data Management.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Trusted Hardware.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Steganography.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Digital Rights Management.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Efficient Range ORAM with 핆(log<sup>2</sup>N) Locality.
IACR Cryptol. ePrint Arch., 2018

CipherLocker: Encrypted File Sharing with Ranked Search https: //cipherlocker.com.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
DataLair: Efficient Block Storage with Plausible Deniability against Multi-Snapshot Adversaries.
Proc. Priv. Enhancing Technol., 2017

SeqORAM: A Locality-Preserving Write-Only Oblivious RAM.
CoRR, 2017

Droidsentry: Efficient Code Integrity and Control Flow Verification on TrustZone Devices.
Proceedings of the 21st International Conference on Control Systems and Computer Science, 2017

dm-x: Protecting Volume-level Integrity for Cloud Volumes and Local Block Devices.
Proceedings of the 8th Asia-Pacific Workshop on Systems, Mumbai, India, September 2, 2017, 2017

2016
Practical Foundations of History Independence.
IEEE Trans. Inf. Forensics Secur., 2016

Modern Cryptography and Security: An Inter-Community Dialogue (Dagstuhl Seminar 16051).
Dagstuhl Reports, 2016

POSTER: DroidShield: Protecting User Applications from Normal World Access.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

POSTER: KXRay: Introspecting the Kernel for Rootkit Timing Footprints.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

POSTER: ConcurORAM: High-Throughput Parallel Multi-Client ORAM.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

POSTER: DataLair: A Storage Block Device with Plausible Deniability.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Introspections on the Semantic Gap.
IEEE Secur. Priv., 2015

HiFlash: A History Independent Flash Device.
CoRR, 2015

Quantitative Musings on the Feasibility of Smartphone Clouds.
Proceedings of the 15th IEEE/ACM International Symposium on Cluster, 2015

2014
Private Badges for Geosocial Networks.
IEEE Trans. Mob. Comput., 2014

TrustedDB: A Trusted Hardware-Based Database with Privacy and Data Confidentiality.
IEEE Trans. Knowl. Data Eng., 2014

SoK: Introspections on Trust and the Semantic Gap.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

CloudFlow: Cloud-wide Policy Enforcement Using Fast VM Introspection.
Proceedings of the 2014 IEEE International Conference on Cloud Engineering, 2014

DIMMer: A case for turning off DIMMs in clouds.
Proceedings of the ACM Symposium on Cloud Computing, 2014

Costs and Security in Clouds.
Proceedings of the Secure Cloud Computing, 2014

2013
Access privacy and correctness on untrusted storage.
ACM Trans. Inf. Syst. Secur., 2013

CorrectDB: SQL Engine with Practical Query Authentication.
Proc. VLDB Endow., 2013

To Cloud Or Not To? Musings on Clouds, Security and Big Data.
Proceedings of the Secure Data Management - 10th VLDB Workshop, 2013

LiPS: A Cost-Efficient Data and Task Co-Scheduler for MapReduce.
Proceedings of the 2013 IEEE International Symposium on Parallel & Distributed Processing, 2013

Ficklebase: Looking into the future to erase the past.
Proceedings of the 29th IEEE International Conference on Data Engineering, 2013

To cloud my big data or not to?: musings at the intersection of big data, intense computing and clouds.
Proceedings of the ScienceCloud'13, 2013

LiPS: A cost-efficient data and task co-scheduler for MapReduce.
Proceedings of the 20th Annual International Conference on High Performance Computing, 2013

HIFS: history independence for file systems.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Toward Private Joins on Outsourced Data.
IEEE Trans. Knowl. Data Eng., 2012

Fighting Mallory the Insider: Strong Write-Once Read-Many Storage Assurances.
IEEE Trans. Inf. Forensics Secur., 2012

Tipping Pennies? Privately Practical Anonymous Micropayments.
IEEE Trans. Inf. Forensics Secur., 2012

On Securing Untrusted Clouds with Cryptography.
IEEE Data Eng. Bull., 2012

PrivateFS: a parallel oblivious file system.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Single round access privacy on outsourced storage.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

The Shy Mayor: Private Badges in GeoSocial Networks.
Proceedings of the Applied Cryptography and Network Security, 2012

2011
Secure Data Outsourcing: A Brief Overview.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Practical Oblivious Outsourced Storage.
ACM Trans. Inf. Syst. Secur., 2011

Write-Once Read-Many Oblivious RAM.
IEEE Trans. Inf. Forensics Secur., 2011

TrustedDB: A Trusted Hardware based Outsourced Database Engine.
Proc. VLDB Endow., 2011

Conditional e-payments with transferability.
J. Parallel Distributed Comput., 2011

Enhancement of Xen's scheduler for MapReduce workloads.
Proceedings of the 20th ACM International Symposium on High Performance Distributed Computing, 2011

Private geosocial networking.
Proceedings of the 19th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, 2011

Oblivious Outsourced Storage with Delegation.
Proceedings of the Financial Cryptography and Data Security, 2011

To cloud or not to cloud?: musings on costs and viability.
Proceedings of the ACM Symposium on Cloud Computing in conjunction with SOSP 2011, 2011

Poster: making the case for intrinsic personal physical unclonable functions (IP-PUFs).
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Regulatory Compliance.
Proceedings of the Handbook of Financial Cryptography and Security., 2010

Collaborative location certification for sensor networks.
ACM Trans. Sens. Networks, 2010

The PUF Promise.
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010

Towards a Secure and Efficient System for End-to-End Provenance.
Proceedings of the 2nd Workshop on the Theory and Practice of Provenance, 2010

Joining Privately on Outsourced Data.
Proceedings of the Secure Data Management, 7th VLDB Workshop, SDM 2010, Singapore, 2010

Regulatory Compliant Oblivious RAM.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

2009
Trusted Hardware.
Proceedings of the Encyclopedia of Database Systems, 2009

Steganography.
Proceedings of the Encyclopedia of Database Systems, 2009

Regulatory Compliance in Data Management.
Proceedings of the Encyclopedia of Database Systems, 2009

Digital Rights Management.
Proceedings of the Encyclopedia of Database Systems, 2009

Secure Provenance: Protecting theGenealogy of Bits.
login Usenix Mag., 2009

Preventing history forgery with secure provenance.
ACM Trans. Storage, 2009

A personal mobile DRM manager for smartphones.
Comput. Secur., 2009

XPay: practical anonymous payments for tor routing and other networked services.
Proceedings of the 2009 ACM Workshop on Privacy in the Electronic Society, 2009

The Blind Stone Tablet: Outsourcing Durability to Untrusted Parties.
Proceedings of the Network and Distributed System Security Symposium, 2009

The Case of the Fake Picasso: Preventing History Forgery with Secure Provenance.
Proceedings of the 7th USENIX Conference on File and Storage Technologies, 2009

Remembrance: The Unbearable Sentience of Being Digital.
Proceedings of the Fourth Biennial Conference on Innovative Data Systems Research, 2009

2008
Database Watermarking for Copyright Protection.
Proceedings of the Handbook of Database Security - Applications and Trends, 2008

Towards Secure Data Outsourcing.
Proceedings of the Handbook of Database Security - Applications and Trends, 2008

Trustworthy Records Retention.
Proceedings of the Handbook of Database Security - Applications and Trends, 2008

Usable PIR.
Proceedings of the Network and Distributed System Security Symposium, 2008

Strong WORM.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008

Building castles out of mud: practical access pattern privacy and correctness on untrusted storage.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

2007
Rights Assessment for Relational Data.
Proceedings of the Secure Data Management in Decentralized Systems, 2007

A grid-based approach for enterprise-scale data mining.
Future Gener. Comput. Syst., 2007

Regulatory-Compliant Data Management.
Proceedings of the 33rd International Conference on Very Large Data Bases, 2007

NS2: Networked Searchable Store with Correctness.
Proceedings of the 33rd International Conference on Very Large Data Bases, 2007

Introducing secure provenance: problems and challenges.
Proceedings of the 2007 ACM Workshop On Storage Security And Survivability, 2007

Requirements of Secure Storage Systems for Healthcare Records.
Proceedings of the Secure Data Management, 4th VLDB Workshop, SDM 2007, Vienna, Austria, 2007

On the Practicality of Private Information Retrieval.
Proceedings of the Network and Distributed System Security Symposium, 2007

Conditional E-Cash.
Proceedings of the Financial Cryptography and Data Security, 2007

Personal Digital Rights Management for Mobile Cellular Devices.
Proceedings of the Financial Cryptography and Data Security, 2007

2006
Rights Protection for Discrete Numeric Streams.
IEEE Trans. Knowl. Data Eng., 2006

Uncheatable Reputation for Distributed Computation Markets.
Proceedings of the Financial Cryptography and Data Security, 2006

XG: A Grid-Enabled Query Processing Engine.
Proceedings of the Advances in Database Technology, 2006

Secure Data Outsourcing.
Proceedings of the 13th International Conference on Management of Data, 2006

2005
Rights Protection for Categorical Data.
IEEE Trans. Knowl. Data Eng., 2005

Query Execution Assurance for Outsourced Databases.
Proceedings of the 31st International Conference on Very Large Data Bases, Trondheim, Norway, August 30, 2005

Evolving Toward the Perfect Schedule: Co-scheduling Job Assignments and Data Replication in Wide-Area Systems Using a Genetic Algorithm.
Proceedings of the Job Scheduling Strategies for Parallel Processing, 2005

Dynamic Stochastic Models for Workflow Response Optimization.
Proceedings of the 2005 IEEE International Conference on Web Services (ICWS 2005), 2005

XG: A Data-Driven Computation Grid for Enterprise-Scale Mining.
Proceedings of the Database and Expert Systems Applications, 16th International Conference, 2005

2004
Rights Protection for Relational Data.
IEEE Trans. Knowl. Data Eng., 2004

Digital Rights Protection.
IEEE Data Eng. Bull., 2004

Resilient Rights Protection for Sensor Streams.
Proceedings of the (e)Proceedings of the Thirtieth International Conference on Very Large Data Bases, VLDB 2004, Toronto, Canada, August 31, 2004

Attacking digital watermarks.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004

wmdb.: Rights Protection for Numeric Relational Data.
Proceedings of the 20th International Conference on Data Engineering, 2004

Proving Ownership over Categorical Data.
Proceedings of the 20th International Conference on Data Engineering, 2004

QuaSAQ: An Approach to Enabling End-to-End QoS for Multimedia Databases.
Proceedings of the Advances in Database Technology, 2004

2003
Resilient Information Hiding for Abstract Semi-structures.
Proceedings of the Digital Watermarking, Second International Workshop, 2003

On-the-fly Intrusion Detection for Web Portals.
Proceedings of the 2003 International Symposium on Information Technology (ITCC 2003), 2003

2002
Issues and Evaluations of Caching Solutions for Web Application Acceleration.
Proceedings of 28th International Conference on Very Large Data Bases, 2002

On Watermarking Numeric Sets.
Proceedings of the Digital Watermarking, First International Workshop, 2002

Power: A Metric for Evaluating Watermarking Algorithms.
Proceedings of the 2002 International Symposium on Information Technology (ITCC 2002), 2002

Natural Language Watermarking and Tamperproofing.
Proceedings of the Information Hiding, 5th International Workshop, 2002

2000
The Bond Agent System and Applications.
Proceedings of the Agent Systems, 2000


  Loading...