Security

A. Tomescu, and S. Devadas, "Catena: Efficient Non-equivocation via Bitcoin", Proceedings of the IEEE Symposium on Security and Privacy, May 2017.

M. Yu, and S. Devadas, "Pervasive, Dynamic Authentication of Physical Items", Communications of the ACM, April 2017.

L. Ren, C. Fletcher, A. Kwon, M. van Dijk, and S. Devadas, "Design and Implementation of the Ascend Secure Processor", IEEE Transactions on Dependable and Secure Computing, online publication, March 2017.

L. Ren, and S. Devadas, "Proof of Space from Stacked Expanders", Proceedings of the Theory of Cryptography Conference (TCC), November 2016.

V. Costan, I. Lebedev, and S. Devadas, "Sanctum: Minimal Hardware Extensions for Strong Software Isolation", Proceedings of the 25th Usenix Security Symposium, August 2016. Slides with notes.

M. Yu, M. Hiller, J. Delvaux, R. Sowell, S. Devadas, and I. Verbauwhede, "A Lockdown Technique to Prevent Machine Learning on PUFs for Lightweight Authentication", IEEE Transactions on Multi-Scale Computing, April 2016. IEEE Xplore.

C. Herder, L. Ren, M. van Dijk, M. Yu, and S. Devadas, "Trapdoor Computational Fuzzy Extractors and Stateless Cryptographically-Secure Physical Unclonable Functions", IEEE Transactions on Dependable and Secure Systems, January 2017 (published online March 2016).

A. Kwon, D. Lazar, S. Devadas, and B. Ford, "Riffle: An Efficient Communication System with Strong Anonymity", Proceedings of the 16th Privacy Enhancing Technologies Symposium (PETS), July 2016.

S. Devadas, M. van Dijk, C. Fletcher, L. Ren, E. Shi and D. Wichs, "Onion ORAM: A Constant Bandwidth Blowup Oblivious RAM", Proceedings of the Theory of Cryptography Conference (TCC), January 2016.

A. Kwon, M. AlSabah, D. Lazar, M. Dacier and S. Devadas, "Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services", Proceedings of the 24th Usenix Security Symposium, August 2015.

L. Ren, C. W. Fletcher, A. Kwon, E. Stefanov, E. Shi, M. van Dijk and S. Devadas, "Constants Count: Practical Improvements for Oblivious RAM", Proceedings of the 24th Usenix Security Symposium, August 2015.

X. Yu, S. K. Haidar, L. Ren, C. Fletcher, A. Kwon, M. van Dijk, and S. Devadas, "PrORAM: Dynamic Prefetcher for Oblivious RAM", International Symposium on Computer Architecture (ISCA), June 2015.

M. Yu, M. Hiller, and S. Devadas, "Maximum-Likelihood Decoding of Device-Specific Multi-Bit Symbols for Reliable Key Generation", Hardware-Oriented Security and Trust (HOST) Symposium, May 2015.

C. Fletcher, L. Ren, A. Kwon, M. van Dijk, E. Stefanov, D. Serpanos, and S. Devadas,"A Low-Latency, Low-Area Hardware ORAM Controller", Symposium on Field-Programmable Custom Computing Machines (FCCM), May 2015.

C. . Fletcher, L. Ren, A. Kwon, M. van Dijk, S. Devadas, "Freecursive ORAM: [Nearly] Free Recursion and Integrity Verification for Position-based Oblivious RAM", Architectural Support for Programming Languages and Operating Systems (ASPLOS), March 2015.

M. Yu, D. M'raihi, I. Verbauwhede, and S. Devadas, "A Noise Bifurcation Architecture for Linear Additive Physical Functions", IEEE International Symposium on Hardware-Oriented Security and Trust, May 2014. Mandel Yu received the Best Student Presentation Award.

C. Fletcher, L. Ren, X. Yu, M. van Dijk, O. Khan, and S. Devadas, "Suppressing the Oblivious RAM Timing Channel While Making Information Leakage and Program Efficiency Trade-offs", Proceedings of the Int'l Symposium on High Peformance Computer Architecture (HPCA), February 2014.

E. Stefanov, M. van Dijk, E. Shi, C. Fletcher, L. Ren, X. Yu, and S. Devadas, "Path ORAM: An Extremely Simple Oblivious RAM Protocol", Proceedings of the 20th Computer and Communication Security Conference (CCS), November 2013. Best Student Paper Award.

X. Yu, C. Fletcher, L. Ren, M. Van Dijk, and S. Devadas, "Generalized External Interaction with Tamper-Resistant Hardware with Bounded Information Leakage", Proceedings of the Cloud Computing Security Workshop (CCSW), November 2013.

H-J. Yang, V. Costan, N. Zeldovich, and S. Devadas, "Authenticated Storage Using Small Trusted Hardware", Proceedings of the Cloud Computing Security Workshop (CCSW), November 2013.

L. Ren, C. Fletcher, X. Yu, M. van Dijk, and S. Devadas, "Integrity Verification for Path Oblivious-RAM", Proceedings of the 17th IEEE High Performance Extreme Computing Conference (HPEC), September 2013.

L. Ren, X. Yu, C. Fletcher, M. van Dijk, and S. Devadas, "Design Space Exploration and Optimization of Path Oblivious RAM in Secure Processors", Proceedings of the Int'l Symposium on Computer Architecture (ISCA), June 2013.

C. Fletcher, M. van Dijk, and S. Devadas, "Let's Stop Trusting Software With Our Sensitive Data", IEEE Design and Test of ICs, March/April 2013. The Last Byte.

M. Yu, D. M'raihi, S. Devadas, and I. Verbauwhede, "Security and Reliability Properties of Syndrome Coding Techniques Used in PUF Key Generation", GOMACTech-13 Conference, March 2013.

C. Fletcher, M. van Dijk, and S. Devadas, "A Secure Processor Architecture for Encrypted Computation on Untrusted Programs", ACM Scalable Trusted Computing Workshop (STC), October 2012.

C. Fletcher, M. van Dijk, and S. Devadas, "Towards a Interpreter for Efficient Encrypted Computation", ACM Cloud Computing Security Workshop (CCSW), October 2012.

M. Yu, A. Singh, R. Sowell, D. M'raihi and S. Devadas, "Performance Metrics and Empirical Results of a PUF Cryptographic Key Generation ASIC", IEEE International Symposium on Hardware-Oriented Security and Trust, June 2012. Best Paper Award.

M. Yu, D. M'Raihi, R. Sowell and S. Devadas, "Lightweight and Secure PUF Key Storage Using Limits of Machine Learning", Workshop on Cryptographic Hardware and Embedded Systems, September 2011.

M. Majzoobi, F. Koushanfar, and S. Devadas, "FPGA-based True Random Number Generation using Circuit Metastability with Adaptive Feedback Control", Workshop on Cryptographic Hardware and Embedded Systems, September 2011.

V. Costan and S. Devadas, "Security Challenges and Opportunities in Adaptive and Reconfigurable Hardware", IEEE International Symposium on Hardware-Oriented Security and Trust, June 2011. Invited Keynote.

Z. Paral and S. Devadas, "Reliable and Efficient PUF-based Key Generation Using Pattern Matching", IEEE International Symposium on Hardware-Oriented Security and Trust, June 2011. Best Paper Award.

M. Majzoobi, S. Devadas and F. Koushanfar, "FPGA PUF Using Programmable Delay Lines", 2010 IEEE International Workshop on Information Forensics and Security, December 2010.

U. Ruhrmair, F. Sehnke, J. Soelter, G. Dror, S. Devadas and J. Schmidhuber, "Modeling Attacks on Physical Unclonable Functions", Proceedings of the Computer and Communication Security Conference, October 2010.

M. Yu and S. Devadas, "Recombination of Physical Unclonable Functions", GOMACTech-10 Conference, March 2010.

M. Yu and S. Devadas, "Secure and Robust Error Correction for Physical Unclonable Functions", IEEE Design and Test Magazine, January 2010.

V. Costan, L. Sarmenta, M. van Dijk, and S. Devadas, "The Trusted Execution Module: Commodity General-Purpose Trusted Computing", Eighth Smart Card Research and Advanced Application Conference, August 2008.

S. Devadas, E. Suh, S. Paral, R. Sowell, T. Ziola, V. Khandelwal, "Design and Implementation of `Unclonable' RFID ICs for Anti-Counterfeiting and Security Applications, IEEE International Conference on RFID, May 2008.

L. Sarmenta, M. van Dijk, J. Rhodes and S. Devadas, "Offline Count-Limited Certificates", Symposium on Applied Computing (Security Track), March 2008.

B. Gassend, D. Clarke, M. van Dijk, E. Torlak, P. Tuyls, and S. Devadas, "Controlled Physical Random Functions and Applications", ACM Transactions on Information Systems and Security, 2007.

M. van Dijk, J. Rhodes, L. Sarmenta, and S. Devadas, "Offline Untrusted Storage with Immediate Detection of Forking and Replay Attacks" , The Second ACM Workshop on Scalable Trusted Computing (STC'07), November 2007.

G. E. Suh and S. Devadas, "Physical Unclonable Functions for Device Authentication and Key Generation" , Proceedings of the 44th Design Automation Conference, June 2007.

L. Sarmenta, M. van Dijk, C. W. O'Donnell, J. Rhodes, and S. Devadas, "Virtual Monotonic Counters and Count-limited Objects using a TPM without a Trusted OS" , The First ACM Workshop on Scalable Trusted Computing (STC'06), November 2006.

G. E. Suh, C. W. O'Donnell, I. Sachdev, and S. Devadas, "Design and Implementation of the AEGIS Secure Processor Using Physical Random Functions" , Proceedings of the Int'l Symposium on Computer Architecture, June 2005.

D. Clarke, G. E. Suh, B. Gassend, A. Sudan, M. van Dijk and S. Devadas, "Toward Constant Bandwidth Overhead Memory Integrity Verification", Proceedings of the IEEE Symposium on Security and Privacy, May 2005.

G. E. Suh, J-W. Lee, D. Zhang, and S. Devadas, "Secure program execution via dynamic information flow tracking", Proceedings of ASPLOS 2004, October 2004. Most Influential Paper Award (2014).

J. Lee, D. Lim, B. Gassend, G. E. Suh, M. van Dijk and S. Devadas, "A Technique to Build a Secret Key in Integrated Circuits for Identification and Authentication Applications" , Proceedings of the VLSI Circuits Symposium, June 2004.

D. Clarke, S. Devadas, B. Gassend, M. van Dijk, and G. E. Suh, "Incremental Multiset Hash Functions and Their Application to Memory Integrity Checking", Proceedings of the 2003 Asiacrypt Conference, November 2003.

E. Suh, D. Clarke, B. Gassend, M. van Dijk, and S. Devadas, "AEGIS: Architectures for Tamper-Evident and Tamper-Resistant Processing", Proceedings of the 17th International Conference on Supercomputing, June 2003. Selected for inclusion in "25 Years of the International Conference on Supercomputing", 2014.

B. Gassend, D. Lim, D. Clarke, M. van Dijk, and S. Devadas, "Delay-Based Circuit Authentication and Applications", Proceedings of the 18th Symposium on Applied Computing (Extended Version in Concurrency and Computation: Practice and Experience), March 2003.

S. Raman, D. Clarke, M. Burnside, S. Devadas, and R. Rivest, "Access-Controlled Resource Discovery for Pervasive Networks", Proceedings of the 18th Symposium on Applied Computing (Extended Version in Concurrency and Computation: Practice and Experience), March 2003.

B. Gassend, E. Suh, D. Clarke, M. van Dijk, and S. Devadas, "Caches and Merkle Trees for Efficient Memory Authentication", Proceedings of the 9th High Performance Computer Architecture Symposium, February 2003.

B. Gassend, D. Clarke, M. van Dijk, and S. Devadas, "Controlled Physical Random Functions", Proceedings of the 18th Annual Computer Security Applications Conference, December 2002. Best Student Paper Award.

B. Gassend, D. Clarke, M. van Dijk, and S. Devadas, "Silicon Physical Random Functions", Proceedings of the Computer and Communication Security Conference, November 2002. 2015 ACM/IEEE Richard Newton Technical Impact Award.

D. Clarke, B. Gassend, T. Kotwal, M. Burnside, S. Devadas, and R. Rivest, "The Untrusted Computer Problem and Camera-Based Authentication", Proceedings of the International Conference on Pervasive Computing(Pervasive2002), August 2002.

M. Burnside, D. Clarke, A. Maywah, T. Mills, S. Devadas, and R. Rivest, "Proxy-Based Security Protocols in Networked Mobile Devices", Proceedings of the Symposium on Applied Computing (SAC'02), March 2002.

T. Mills, M. Burnside, J. Ankcorn, and S. Devadas, "A Proxy-Based Architecture for Secure Networked Wearable Devices ", CSG Technical Report , May 2001.