CSAIL Papers

Active Trust Management for Autonomous Adaptive Survivable Systems. In Self-Adaptive Software, Springer-Verlag Lecture-Notes in Computer Science #1936, February 2001, Robertson, Laddaga, Shrobe, eds

Howard Shrobe, Jon Doyle, Peter Szolovits

 

Improving Application Security with Data Flow Assertions

Alexander Yip, Xi Wang, Nickolai Zeldovich, Frans Kaashoek

An Ideal-Security Protocol for Order-Preserving Encoding

Raluca Ada Popa, Frank H. Li, Nickolai Zeldovich

Proxy-Based Security Protocols in Networked Mobile Devices

Matthew Burnside, Dwaine Clarke, Todd Mills, Srinivas Devadas, Ronald Rivest

Efficient Memory Integrity Verification and Encryption for Secure Processors

G. Edward Suh, Dwaine Clarke, Blaise Gassend,Marten van Dijk, Srini Devadas

Succinct Functional Encryption and Applications: Reusable Garbled Circuits and Beyond." IACR Cryptology ePrint Archive 2012: 733, 2012

Shafi Goldwasser and Yael Kalai and Raluca Ada Popa and Vinod Vaikuntanathan and Nickolai Zeldovich

The Blast Query Language for Software Verification

Dirk Beyer, Adam Chlipala, Thomas Henzinger, Ranjit Jhala, Rupak Majumdar

Freecursive ORAM: [Nearly] Free Recursion and Integrity Verification for Position-based Oblivious RAM

Christopher W. Fletchery, Ling Reny, Albert Kwony, Marten van Dijkz, Srinivas Devadas

A Noise Bifurcation Architecture for Linear Additive Physical Functions

Meng-Day (Mandel) Yu, David Raihi, Ingrid Verbauwhede, Srinivas Devadas