Zoran Skoda
computer security

See also blockchain security.

Verified & accountable computation

  • B. Parno, J. Howell, C. Gentry, M. Raykova, Pinocchio: nearly practical verifiable computation, in: Security and Privacy (SP), 2013 IEEE Symposium on. 238–252. IEEE (2013) iacr preprint pdf
  • Jérémie Decouchant et al. PAG: private and accountable gossip, 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS); preprint pdf
  • Ranjit Kumaresan (Microsoft) Amortizing cecure computation with penalties ACM CCS 2016 pdf
  • KVM deterministic replay pdf
  • Michael Walfish, Andrew J. Blumberg, Verifying computations without reexecuting them, Commun. ACM 58(2):74–84, 2015.

Attacks

Execution enclaves

  • Pramod Subramanyan, Rohit Sinha, Ilia Lebedev, Srinivas Devadas, Sanjit A. Seshia, A formal foundation for secure remote execution enclaves, eprint.iacr.org/2017/565.pdf
  • Enclave programming model intel
  • POSTER: Rust SGX SDK: Towards Memory Safety in Intel SGX Enclave doi

Strand spaces

  • Joshua D Guttman, F Javier Thayer, Authentication tests and the structure of bundles, Theoretical computer science, 283(2):333–380, 2002.
  • F. Javier Thayer Fabrega, Jonathan C. Herzog, Joshua D. Guttman, Strand Spaces: Why is a Security Protocol Correct? pdf; Strand spaces: proving security protocols correct_, pdf
  • M. Abadi and M. R. Tuttle A semantics for a logic of au-thentication, Proceedings of the 10th ACM Symposium onPrinciples of Distributed Computing, pages 201–216, Au-gust 1991.
  • Ryan Culpepper, Strand spaces, slides pdf
  • jherzog
  • Strand Spaces with Choice via a Process Algebra Semantics pdf
  • Y Li, Ju Pang, An inductive approach to strand spaces, pdf
  • Allaa Kamil, Gavin Lowe, Specifying and modelling secure channels in strand spaces pdf

Last revised on July 22, 2019 at 14:39:38. See the history of this page for a list of all contributions to it.