Security and Applied Cryptography
-
- M. Sridhar, H. Xiao, and S. Devadas,
"PAC-Private Algorithms", IEEE Symposium on Security and Privacy, May 2025.
-
- G. Couteau, L. Devadas, S. Devadas, A. Koch, S. Servan-Schreiber,
"Lightweight Oblivious Transfer with a Public-Key Setup", Proceedings of the Asiacrypt conference, December 2024.
-
- N. Samardzic, S. Langowski, S. Devadas, and D. Sanchez,
"Accelerating Zero-Knowledge Proofs Through Hardware-Algorithm Co-Design", Proceedings of the 57th International Symposium on Microarchitecture (MICRO), November 2024. Nominated for the Best Paper Award.
- H. Xiao, G. E. Suh, and S. Devadas, "Formal Privacy Proof of Heuristic Encoding: The Possibility and Impossibility of Learnable Obfuscation", Proceedings of the Computer and Communications Security (CCS) Conference, October 2024.
-
- A. Krastev, N. Samardzic, S. Langowski, S. Devadas, and Daniel Sanchez, "A Tensor Compiler with Automatic Data Packing for Simple and Efficient Fully Homomorphic Encryption", Proceedings of the Programming Language Design and Implementation (PLDI) Conference, June 2024.
-
- M. Sridhar, and S. Devadas, "Robust Near-Optimal Arm Identification With Strongly-Adaptive Adversaries", IEEE Transactions on Signal Processing, Volume 71, 2023.
-
- H. Xiao, J. Wan, and S. Devadas, "Geometry of Sensitivity: Twice Sampling and Hybrid Clipping in Differential Privacy with Optimal Gaussian Noise and Application to Deep Learning", Proceedings of the Computer and Communication Security Conference , November 2023.
-
- H. Xiao, and S. Devadas,
"PAC Privacy: Automatic Privacy Measurement and Control of Data Processing", Advances in Cryptology -- CRYPTO 2023, August 2023.
-
- H. Liu, J. Xing, Y. Huang, D. Zhuo, S. Devadas, and A. Chen,
"Remote Direct Memory Introspection", Proceedings of the 32nd Usenix Security Symposium, August 2023. Distinguished Paper Award.
-
- H. Xiao, Z. Xiang, D. Wang, and S. Devadas,
"A Theory to Instruct Differentially-Private Learning via Clipping Bias Reduction", Proceedings of the 44th IEEE Symposium on Security and Privacy, May 2023.
-
- S. Langowski, S. Servan-Schreiber, and S. Devadas,
"Trellis: Robust and Scalable Metadata-private Anonymous Broadcast", Proceedings of the Network and Distributed System Security Symposium, February 2023.
-
- S. Devadas, S. Langowski, N. Samardzic, S. Servan-Schreiber, and D. Sanchez,
"Designing Hardware for Cryptography and Cryptography for Hardware", Proceedings of the Computer and Communication Security Conference , November 2022. Invited Keynote Slides.
-
- N. Samardzic, A. Feldmann, A. Krastev, N. Manohar, N. Genise, S. Devadas, K. Eldafrawy, C. Peikert, and D. Sanchez,
"CraterLake: A Hardware Accelerator for Efficient
Unbounded Computation on Encrypted Data", Proceedings of the 49th International Symposium on Computer Architecture, June 2022.
-
-
Y. Xia, X. Yu, M. Butrovich, A. Pavlo, and S. Devadas,
"Litmus: Towards a Practical Database Management System with Verifiable ACID Properties and Transaction Correctness",
Proceedings of the SIGMOD Conference, June 2022.
-
- K. Hogan, S. Servan-Schreiber, Z. Newman, B. Weintraub, C. Nita-Rotaru, and S. Devadas,
"ShorTor: Improving Tor Network Latency via Multi-hop Overlay Routing", Proceedings of the 43rd IEEE Symposium on Security and Privacy, May 2022.
-
- S. Servan-Schreiber, S. Langowski, and S. Devadas,
"Private Similarity Search with Sublinear Communication", Proceedings of the 43rd IEEE Symposium on Security and Privacy, May 2022.
-
- N. Samardzic, A. Feldmann, A. Krastev, S. Devadas, R. Dreslinski, C. Peikert, and D. Sanchez,
"An Architecture to Accelerate Computation on Encrypted Data", IEEE Micro Top Picks in Computer Architecture, April/May 2022.
-
- Z. Newman, S. Servan-Schreiber, and S. Devadas,
"Spectrum: High-Bandwidth Anonymous Broadcast", Proceedings of the 19th USENIX Symposium on Networked Systems Design and Implementation, April 2022.
-
- N. Samardzic, A. Feldmann, A. Krastev, S. Devadas, R. Dreslinski, C. Peikert, and D. Sanchez,
"F1: A Fast and Programmable Accelerator for Fully Homomorphic Encryption", Proceedings of the 54th Symposium on Microarchitecture, October 2021. IEEE Micro Top Picks 2022.
-
- J. Wan, H. Xiao, E. Shi, and S. Devadas,
"Expected Constant Round Byzantine Broadcast under Dishonest Majority", Proceedings of the Theory of Cryptography Conference (TCC), November 2020.
-
- J. Wan, H. Xiao, S. Devadas, and E. Shi,
"Round-Efficient Byzantine Broadcast under Strongly Adaptive and Majority Corruptions", Proceedings of the Theory of Cryptography Conference (TCC), November 2020.
-
- D. Wang, H. Xiao, S. Devadas and J. Xu,
"On Differentially Private Stochastic Convex Optimization with Heavy-tailed Data",
Proceedings of the 37th Conference on Machine Learning (ICML), July 2020.
-
- A. Tomescu, R. Chen, Y. Zheng,
I. Abraham, B. Pinkas, G. Golan-Gueta, and S. Devadas,
"Towards Scalable Threshold Cryptosystems", Proceedings of the 41st IEEE Symposium on Security and Privacy, May 2020.
-
- A. Kwon, D. Lu, and S. Devadas,
"XRD: Scalable Messaging System with Cryptographic Privacy", Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation, February 2020.
-
- A. Tomescu, V. Bhupatiraju, D. Papadopoulos, C. Papamanthou, N. Triandopoulos, and S. Devadas,
"Transparency Logs Using Append Only Authenticated Dictionaries", Proceedings of the 26th ACM Conference on Computer and Communication Security, November 2019.
-
- T. Bourgeat, I. Lebedev, A. Wright, S. Zhang, Arvind, and S. Devadas,
"MI6: Secure Enclaves in a
Speculative Out-of-Order Processor", Proceedings of the 52nd Symposium on Microarchitecture, October 2019.
-
- S. Bhat, D. Lu, A. Kwon, and S. Devadas,
"Var-CNN: A Data-Efficient Website Fingerprinting Attack Based on Deep Learning", Proceedings of the 19th Privacy Enhancing Technologies Symposium, July 2019. Result of an MIT PRIMES project.
-
- I. Lebedev, K. Hogan, J. Drean, D. Kohlbrenner, D. Lee, K. Asanovic, D. Song and S. Devadas,
"Sanctorum: A Lightweight Monitor for Secure Enclaves", Proceedings of the Design Automation and Test in Europe (DATE) Symposium, March 2019.
-
- I. Abraham, S. Devadas, D. Dolev, K. Nayak and L. Ren,
"Synchronous Byzantine
Agreement with Expected O(n 2) Communication,
Expected O(1) Rounds, and Optimal Resilience", Proceedings of the Financial Cryptography and Data Security Conference, February 2019.
-
- V. Kiriansky, I. Lebedev, S. Amarasinghe, S. Devadas, and J. Emer,
"DAWG: A Defense Against Cache Timing Attacks in Speculative Execution Processors", Proceedings of the 51st Symposium on Microarchitecture, October 2018.
-
- D. Lu, S. Bhat, A. Kwon, and S. Devadas,
"DynaFlow: An Efficient Website Fingerprinting Defense Based
on Dynamically-Adjusting Flows", Proceedings of the 17th
Workshop on Privacy in the Electronic Society, October 2018. Result of an MIT PRIMES project.
-
- I. Lebedev, K. Hogan, and S. Devadas,
"Secure Boot and Remote Attestation in the Sanctum Processor", Proceedings of the 31st Computer Security Foundations Symposium, July 2018. Invited Keynote.
-
-
E. Stefanov, M. van Dijk, E. Shi, T-H. H. Chan, C. Fletcher, L. Ren, X. Yu, and S. Devadas,
"Path ORAM: An Extremely Simple Oblivious RAM Protocol",
Journal of the ACM, April 2018.
-
- C. Jin, C. Herder, L. Ren, P. H. Nguyen, B. Fuller, S. Devadas, and M. van Dijk,
"FPGA Implementation of a Cryptographically-Secure PUF Based on Learning Parity with Noise", Cryptography, 2017.
-
- L. Ren and S. Devadas,
"Bandwidth Hard Functions for ASIC Resistance", Proceedings of the Theory of Cryptography Conference (TCC), November 2017.
-
- S. Devadas, L. Ren, and H. Xiao,
"On Iterative Collision Search for LPN and Subset Sum", Proceedings of the Theory of Cryptography Conference (TCC), November 2017.
-
- A. Kwon, H. Corrigan-Gibbs, S. Devadas and B. Ford,
"Atom: Horizontally Scaling Strong Anonymity", Proceedings of the Symposium on Operating Systems Principles, October 2017.
-
- I. Abraham, S. Devadas, K. Nayak, and L. Ren,
"Brief Announcement: Practical Synchronous Byzantine Consensus", Proceedings of the Int'l Symposium on Distributed Computing, October 2017. Extended Version.
-
- P. Subramanyan, R. Sinha, I. Lebedev, S. Devadas and S. Seshia,
"A Formal Foundation for Secure Remote Execution of Enclaves", Proceedings of the 24th ACM Conference on Computer and Communication Security, October 2017. Best Paper Award.
-
- V. Costan, I. Lebedev, and S. Devadas,
"Secure Processors Part II: Intel SGX Security Analysis and MIT Sanctum Architecture", Foundations and Trends in Electronic Design Automation, Volume 11, Number 3, July 2017.
-
- V. Costan, I. Lebedev, and S. Devadas,
"Secure Processors Part I: Background, Taxonomy for Secure Enclaves and Intel SGX Architecture", Foundations and Trends in Electronic Design Automation, Volume 11, Number 1-2, July 2017.
-
- A. Tomescu, and S. Devadas,
"Catena: Efficient Non-equivocation via Bitcoin", Proceedings of the IEEE Symposium on Security and Privacy, May 2017.
-
- M. Yu, and S. Devadas,
"Pervasive, Dynamic Authentication of Physical Items", Communications of the ACM, April 2017.
-
- L. Ren, C. Fletcher, A. Kwon, M. van Dijk, and S. Devadas,
"Design and Implementation of the Ascend Secure Processor", IEEE Transactions on Dependable and Secure Computing, online publication, March 2017. Appeared in the March/April 2019 issue.
-
- L. Ren, and S. Devadas,
"Proof of Space from Stacked Expanders", Proceedings of the Theory of Cryptography Conference (TCC), November 2016.
-
- V. Costan, I. Lebedev, and S. Devadas,
"Sanctum: Minimal Hardware Extensions for Strong Software Isolation", Proceedings of the 25th Usenix Security Symposium, August 2016. Slides with notes.
-
- M. Yu, M. Hiller, J. Delvaux, R. Sowell, S. Devadas, and I. Verbauwhede,
"A Lockdown Technique to Prevent Machine Learning on PUFs for Lightweight Authentication", IEEE Transactions on Multi-Scale Computing, April 2016. IEEE Xplore.
-
- C. Herder, L. Ren, M. van Dijk, M. Yu, and S. Devadas,
"Trapdoor Computational Fuzzy Extractors and Stateless Cryptographically-Secure Physical Unclonable Functions", IEEE Transactions on Dependable and Secure Systems, January 2017 (published online March 2016).
-
- A. Kwon, D. Lazar, S. Devadas, and B. Ford,
"Riffle: An Efficient Communication System with Strong Anonymity", Proceedings of the 16th Privacy Enhancing Technologies Symposium (PETS), July 2016.
-
- S. Devadas, M. van Dijk, C. Fletcher, L. Ren, E. Shi and D. Wichs,
"Onion ORAM: A Constant Bandwidth Blowup Oblivious RAM", Proceedings of the Theory of Cryptography Conference (TCC), January 2016.
-
- A. Kwon, M. AlSabah, D. Lazar, M. Dacier and S. Devadas,
"Circuit Fingerprinting Attacks:
Passive Deanonymization of Tor Hidden Services", Proceedings of the 24th Usenix Security Symposium, August 2015.
-
- L. Ren, C. W. Fletcher, A. Kwon, E. Stefanov, E. Shi, M. van Dijk and S. Devadas,
"Constants Count: Practical Improvements for Oblivious RAM", Proceedings of the 24th Usenix Security Symposium, August 2015.
-
- X. Yu, S. K. Haidar, L. Ren, C. Fletcher, A. Kwon, M. van Dijk, and S. Devadas,
"PrORAM: Dynamic Prefetcher for Oblivious RAM", International Symposium on Computer Architecture (ISCA), June 2015.
-
-
M. Yu, M. Hiller, and S. Devadas, "Maximum-Likelihood Decoding of Device-Specific Multi-Bit Symbols for Reliable Key Generation", Hardware-Oriented Security and Trust (HOST) Symposium, May 2015.
-
-
C. Fletcher, L. Ren, A. Kwon, M. van Dijk, E. Stefanov, D. Serpanos, and S. Devadas,"A Low-Latency, Low-Area Hardware ORAM Controller", Symposium on Field-Programmable Custom Computing Machines (FCCM), May 2015.
-
-
C. . Fletcher, L. Ren, A. Kwon, M. van Dijk, S. Devadas,
"Freecursive ORAM: [Nearly] Free Recursion and
Integrity Verification for Position-based Oblivious RAM",
Architectural Support for Programming Languages and Operating Systems (ASPLOS), March 2015.
-
-
M. Yu, D. M'raihi, I. Verbauwhede, and S. Devadas,
"A Noise Bifurcation Architecture for Linear Additive Physical Functions",
IEEE International Symposium on Hardware-Oriented Security and Trust,
May 2014. Mandel Yu received the Best Student Presentation Award.
-
-
C. Fletcher, L. Ren, X. Yu, M. van Dijk, O. Khan, and S. Devadas,
"Suppressing the Oblivious RAM Timing Channel
While Making Information Leakage and Program Efficiency Trade-offs",
Proceedings of the Int'l Symposium on High Peformance Computer Architecture (HPCA),
February 2014.
-
-
E. Stefanov, M. van Dijk, E. Shi, C. Fletcher, L. Ren, X. Yu, and S. Devadas,
"Path ORAM: An Extremely Simple Oblivious RAM Protocol",
Proceedings of the 20th ACM Conference on Computer and Communication Security (CCS), November 2013. Best Student Paper Award. 2018 Top Pick in Hardware and Embedded Security. 2023 CCS Test of Time Award.
-
-
X. Yu, C. Fletcher, L. Ren, M. Van Dijk, and S. Devadas,
"Generalized External Interaction with Tamper-Resistant Hardware with Bounded Information Leakage",
Proceedings of the Cloud Computing Security Workshop (CCSW), November 2013.
-
-
H-J. Yang, V. Costan, N. Zeldovich, and S. Devadas,
"Authenticated Storage Using Small Trusted Hardware", Proceedings of the Cloud Computing Security Workshop (CCSW), November 2013.
-
-
L. Ren, C. Fletcher, X. Yu, M. van Dijk, and S. Devadas,
"Integrity Verification for Path Oblivious-RAM",
Proceedings of the 17th IEEE High Performance Extreme Computing Conference (HPEC), September 2013.
-
-
L. Ren, X. Yu, C. Fletcher, M. van Dijk, and S. Devadas,
"Design Space Exploration and Optimization of Path Oblivious RAM in Secure Processors",
Proceedings of the Int'l Symposium on Computer Architecture (ISCA),
June 2013.
-
-
C. Fletcher, M. van Dijk, and S. Devadas,
"Let's Stop Trusting Software With Our Sensitive Data", IEEE Design and Test of ICs, March/April 2013. The Last Byte.
-
-
M. Yu, D. M'raihi, S. Devadas, and I. Verbauwhede,
"Security and Reliability Properties of Syndrome Coding Techniques
Used in PUF Key Generation",
GOMACTech-13 Conference, March 2013.
-
-
C. Fletcher, M. van Dijk, and S. Devadas,
"A Secure Processor Architecture for Encrypted Computation on Untrusted Programs",
ACM Scalable Trusted Computing Workshop (STC), October 2012.
-
-
C. Fletcher, M. van Dijk, and S. Devadas,
"Towards a Interpreter for Efficient Encrypted Computation",
ACM Cloud Computing Security Workshop (CCSW), October 2012.
-
-
M. Yu, A. Singh, R. Sowell, D. M'raihi and S. Devadas,
"Performance Metrics and Empirical Results of a PUF Cryptographic Key Generation ASIC",
IEEE International Symposium on Hardware-Oriented Security and Trust,
June 2012. Best Paper Award.
-
-
M. Yu, D. M'Raihi, R. Sowell and S. Devadas,
"Lightweight and Secure PUF Key Storage Using Limits of Machine Learning",
Workshop on Cryptographic Hardware and Embedded Systems,
September 2011.
-
-
M. Majzoobi, F. Koushanfar, and S. Devadas,
"FPGA-based True Random Number Generation using Circuit Metastability with Adaptive Feedback Control",
Workshop on Cryptographic Hardware and Embedded Systems,
September 2011.
-
-
V. Costan and S. Devadas,
"Security Challenges and Opportunities in Adaptive and Reconfigurable Hardware",
IEEE International Symposium on Hardware-Oriented Security and Trust,
June 2011. Invited Keynote.
-
-
Z. Paral and S. Devadas,
"Reliable and Efficient PUF-based Key Generation Using Pattern Matching",
IEEE International Symposium on Hardware-Oriented Security and Trust,
June 2011. Best Paper Award.
-
-
M. Majzoobi, S. Devadas and F. Koushanfar,
"FPGA PUF Using Programmable Delay Lines",
2010 IEEE International Workshop on Information Forensics and Security,
December 2010.
-
-
U. Ruhrmair, F. Sehnke, J. Soelter, G. Dror, S. Devadas and J. Schmidhuber,
"Modeling Attacks on Physical Unclonable Functions",
Proceedings of the 17th ACM Conference on Computer and Communication Security,
October 2010.
-
-
M. Yu and S. Devadas,
"Recombination of Physical Unclonable Functions",
GOMACTech-10 Conference,
March 2010.
-
-
M. Yu and S. Devadas,
"Secure and Robust Error Correction for Physical Unclonable Functions",
IEEE Design and Test Magazine,
January 2010.
-
-
V. Costan, L. Sarmenta, M. van Dijk, and S. Devadas,
"The Trusted Execution Module: Commodity General-Purpose Trusted Computing",
Eighth Smart Card Research and Advanced Application Conference,
August 2008.
-
-
S. Devadas, E. Suh, S. Paral, R. Sowell, T. Ziola, V. Khandelwal,
"Design and Implementation of `Unclonable' RFID ICs for Anti-Counterfeiting and Security Applications,
IEEE International Conference on RFID, May 2008.
-
-
L. Sarmenta, M. van Dijk, J. Rhodes and S. Devadas,
"Offline Count-Limited Certificates",
Symposium on Applied Computing (Security Track),
March 2008.
-
-
B. Gassend, D. Clarke, M. van Dijk, E. Torlak, P. Tuyls, and S. Devadas,
"Controlled Physical Random Functions and Applications",
ACM Transactions on Information Systems and Security, 2007.
-
-
M. van Dijk, J. Rhodes, L. Sarmenta, and S. Devadas,
"Offline Untrusted Storage with Immediate Detection of Forking
and Replay Attacks" ,
The Second ACM Workshop on Scalable Trusted Computing (STC'07), November 2007.
-
-
G. E. Suh and S. Devadas,
"Physical Unclonable Functions for Device Authentication and
Key Generation" ,
Proceedings of the 44th Design Automation Conference, June 2007.
-
-
L. Sarmenta, M. van Dijk, C. W. O'Donnell, J. Rhodes, and S. Devadas,
"Virtual Monotonic Counters and Count-limited Objects using a TPM without a Trusted OS" ,
The First ACM Workshop on Scalable Trusted Computing (STC'06), November 2006.
-
-
G. E. Suh, C. W. O'Donnell, I. Sachdev, and S. Devadas,
"Design and Implementation of the AEGIS Secure Processor Using Physical Random Functions" ,
Proceedings of the Int'l Symposium on Computer Architecture, June 2005.
-
-
D. Clarke, G. E. Suh, B. Gassend, A. Sudan, M. van Dijk and S. Devadas,
"Toward Constant Bandwidth Overhead Memory Integrity Verification",
Proceedings of the IEEE Symposium on Security and Privacy,
May 2005.
-
-
G. E. Suh, J-W. Lee, D. Zhang, and S. Devadas,
"Secure program execution via dynamic information flow tracking",
Proceedings of ASPLOS 2004,
October 2004. Most Influential Paper Award (2014).
-
-
J. Lee, D. Lim, B. Gassend, G. E. Suh, M. van Dijk and S. Devadas,
"A Technique to Build a Secret Key in Integrated Circuits for Identification and Authentication Applications" ,
Proceedings of the VLSI Circuits Symposium,
June 2004. Most Frequently Cited Paper Award in 30 years of Symposia (2017).
-
-
D. Clarke, S. Devadas, B. Gassend, M. van Dijk, and G. E. Suh,
"Incremental Multiset Hash Functions and Their Application
to Memory Integrity Checking",
Proceedings of the 2003 Asiacrypt Conference,
November 2003.
-
-
E. Suh, D. Clarke, B. Gassend, M. van Dijk, and S. Devadas,
"Efficient Memory Integrity Verification and
Encryption for Secure Processors",
Proceedings of the 36th International Symposium on Microarchitecture (MICRO),
December 2003.
-
-
E. Suh, D. Clarke, B. Gassend, M. van Dijk, and S. Devadas,
"AEGIS: Architecture for Tamper-Evident and Tamper-Resistant
Processing",
Proceedings of the 17th International Conference on Supercomputing,
June 2003. Selected for inclusion in "25 Years of the International Conference on Supercomputing", 2014. Inaugural Intel Hardware Security Test of Time Award, 2022.
-
-
B. Gassend, D. Lim, D. Clarke, M. van Dijk, and S. Devadas,
"Delay-Based Circuit Authentication and Applications",
Proceedings of the 18th Symposium on Applied Computing (Extended
Version in Concurrency and Computation: Practice and Experience), March 2003.
-
-
S. Raman, D. Clarke, M. Burnside, S. Devadas, and R. Rivest,
"Access-Controlled Resource Discovery for Pervasive Networks",
Proceedings of the 18th Symposium on Applied Computing (Extended Version in Concurrency
and Computation: Practice and Experience), March 2003.
-
-
B. Gassend, E. Suh, D. Clarke, M. van Dijk, and S. Devadas,
"Caches and Merkle Trees for Efficient Memory Authentication",
Proceedings of the 9th High Performance Computer Architecture Symposium,
February 2003.
-
-
B. Gassend, D. Clarke, M. van Dijk, and S. Devadas,
"Controlled Physical Random Functions",
Proceedings of the 18th Annual Computer Security Applications Conference,
December 2002. Best Student Paper Award.
-
-
B. Gassend, D. Clarke, M. van Dijk, and S. Devadas,
"Silicon Physical Random Functions",
Proceedings of the 9th ACM Conference on Computer and Communication Security,
November 2002. 2015 ACM/IEEE Richard Newton Technical Impact Award.
-
-
D. Clarke, B. Gassend, T. Kotwal, M. Burnside, S. Devadas, and R. Rivest,
"The Untrusted Computer Problem and Camera-Based
Authentication",
Proceedings of the International Conference on Pervasive Computing(Pervasive2002), August 2002.
-
-
M. Burnside, D. Clarke, A. Maywah, T. Mills, S. Devadas, and R. Rivest,
"Proxy-Based Security Protocols in Networked
Mobile Devices",
Proceedings of the Symposium on Applied Computing (SAC'02),
March 2002.
-
-
T. Mills, M. Burnside, J. Ankcorn, and S. Devadas,
"A Proxy-Based Architecture for Secure
Networked Wearable Devices ", CSG Technical Report ,
May 2001.