Publication Verito: A Practical System for Transparency and Accountability in Virtual Economies Raghav Bhaskar, Saikat Guha, Srivatsan Laxman, Prasad Naldurg Proceedings of the Network and Distributed Systems Security Symposium (NDSS) | February 2013 Proceedings of the Network and Distributed Systems Security Symposium (NDSS)
Publication InteGuard: Toward Automatic Protection of Third-Party Web Service Integrations Luyi Xing, Yangyi Chen, XiaoFeng Wang, Shuo Chen Network & Distributed System Security Symposium (NDSS) | February 2013 Network & Distributed System Security Symposium (NDSS)
Publication ZQL: A Compiler for Privacy-Preserving Data Processing Cédric Fournet, Markulf Kohlweiss, George Danezis MSR-TR-2013-25 | February 2013 Video
Publication Missive: Fast Appliance Launch From an Untrusted Buffer Cache Jon Howell, Jeremy Elson, Bryan Parno, John (JD) Douceur MSR-TR-2013-9 | January 2013
Publication How to Run POSIX Apps in a Minimal Picoprocess Jon Howell, Bryan Parno, John (JD) Douceur MSR-TR-2013-10 | January 2013
Publication Orthogonal Security With Cipherbase Arvind Arasu, Spyros Blanas, Ken Eguro, Raghav Kaushik, Donald Kossmann, Ravi Ramamurthy, Ramarathnam Venkatesan 6th Biennial Conference on Innovative Data Systems Research (CIDR’13) | January 2013 6th Biennial Conference on Innovative Data Systems Research (CIDR'13)
Publication Small World: Collisions Among Attackers in a Finite Population Cormac Herley WEIS | January 2013
Publication Fully Automated Analysis of Padding-Based Encryption in the Computational Model Gilles Barthe, Juan Manuel Crespo, César Kunz, Benedikt Schmidt, Benjamin Grégoire, Yassine Lakhnech, Santiago Zanella-Béguelin 20th ACM Conference on Computer and Communications Security, CCS 2013 | January 2013
Publication Does My Password Go up to Eleven? The Impact of Password Meters on Password Selection Serge Egelman, Andreas Sotirakopoulos, Ildar Muslukhov, Konstantin Beznosov, Cormac Herley Proc. CHI | January 2013