Security and privacy research

I currently work on In the past, I worked on
Full accounting for verifiable outsourcing
joint with Riad Wahby, Ye Ji, abhi shelat, Justin Thaler, Michael Walfish, and Thomas Wies
ACM Conference on Computer and Communications Security, 2017.
published version
Defending against malicious peripherals with Cinch
joint with Sebastian Angel, Riad S. Wahby, Max Howald, Joshua B. Leners, Michael Spilo, Zhen Sun, and Michael Walfish
25th Usenix Security Symposium, 2016.
published version
Efficient RAM and control flow in verifiable outsourced computation
joint with Riad S. Wahby, Srinath Setty, Zuocheng Ren, and Michael Walfish
22nd Network & Distributed System Security Symposium (NDSS), 2015.
published version
Verifying computations without reexecuting them: from theoretical possibility to near-practicality
joint with Michael Walfish
Communications of the ACM (CACM), 2015.
published version
Verifying computations with state
joint with Benjamin Braun, Ariel J. Feldman, Zuocheng Ren, Srinath Setty, and Michael Walfish
ACM Symposium on Operating Systems Principles (SOSP), 2013.
published version
A hybrid architecture for interactive verified computation
joint with Victor Vu, Srinath Setty, and Michael Walfish
IEEE Symposium on Security and Privacy (Oakland), 2013.
published version
Resolving the conflict between generality and plausibility in verified computation
joint with Srinath Setty, Benjamin Braun, Victor Vu, Bryan Parno, and Michael Walfish
ACM European Conference on Computer Systems (EuroSys), 2013.
published version.
Taking proof-based verified computation a few steps closer to actual practicality
joint with Srinath Setty, Victor Vu, Nikhil Panpalia, Benjamin Braun, and Michael Walfish
21st Usenix Security Symposium (Usenix Security), 2012.
published version
Making argument systems for outsourced computation practical (sometimes)
joint with Srinath Setty, Richard McPherson, and Michael Walfish
19th Network and Distributed System Security Symposium (NDSS), 2012.
published version
Toward practical and unconditional verification of remote computations
joint with Srinath Setty and Michael Walfish
13th Workshop on Hot Topics in Operating Systems (HotOS), 2011.
published version
Location privacy and accountability in aggregate statistics for mobile systems
joint with Hari Balakrishnan, Raluca Popa, and Frank Li
18th ACM Conference on Computer and Communications Security, 2011.
published version
VPriv: Protecting privacy in location-based vehicular services
joint with Hari Balakrishnan and Raluca Popa
18th Usenix Security Conference, 2009.
published version
Congestion pricing that respects driver privacy.
joint with Robin Chase
IEEE International Conference on Intelligent Transportation Systems (ITSC), 2005.
published version
Automated traffic enforcement that respects driver privacy.
joint with Abhi Shelat and Lauren Keeler
IEEE International Conference on Intelligent Transportation Systems (ITSC), 2004.
published version