Filter by type:

Sort by year:

Vale: Verifying High-Performance Cryptographic Assembly Code

Barry Bond, Chris Hawblitzel, Manos Kapritsos, K. Rustan M. Leino, Jacob R. Lorch, Bryan Parno, Ashay Rane, Srinath Setty, and Laure Thompson
Proceedings of the USENIX Security Symposium, August, 2017
Conference
@inproceedings{vale,
  author    = {Bond, Barry and Hawblitzel, Chris and Kapritsos, Manos and Leino, K. Rustan M. and Lorch, Jacob R. and Parno, Bryan and Rane, Ashay and Setty, Srinath and Thompson, Laure},
  booktitle = {Proceedings of the USENIX Security Symposium},
  month     = {August},
  title     = {Vale: Verifying High-Performance Cryptographic Assembly Code},
  year      = {2017}
}

IronFleet: Proving Practical Distributed Systems Correct

Chris Hawblitzel, Jon Howell, Manos Kapritsos, Jacob R. Lorch, Bryan Parno, Michael L. Roberts, Srinath Setty, and Brian Zill
Communications of the ACM, Vol. 60(7), July, 2017
Research Highlight
Journal Award
@article{ironfleetCACM,
  author    = {Hawblitzel, Chris and Howell, Jon and Kapritsos, Manos and Lorch, Jacob R. and Parno, Bryan and Roberts, Michael L. and Setty, Srinath and Zill, Brian},
  journal   = {Communications of the ACM},
  month     = {July},
  number    = {7},
  title     = {{IronFleet}: Proving Practical Distributed Systems Correct},
  volume    = {60},
  year      = {2017}
}

Everest: Towards a Verified, Drop-In Replacement of HTTPS

Karthikeyan Bhargavan, Barry Bond, Antoine Delignat-Lavaud, Cédric Fournet, Chris Hawblitzel, Catalin Hritcu, Samin Ishtiaq, Markulf Kohlweiss, Rustan Leino, Jay Lorch, Kenji Maillard, Jinyang Pang, Bryan Parno, Jonathan Protzenko, Tahina Ramananandro, Ashay Rane, Aseem Rastogi, Nikhil Swamy, Laure Thompson, Peng Wang, Santiago Zanella-Beguelin, and Jean-Karim Zinzindohoué
Summit on Advances in Programming Languages (SNAPL), May, 2017
Conference
@inproceedings{everest-snapl,
  author    = {Bhargavan, Karthikeyan and Bond, Barry and Delignat-Lavaud, Antoine and Fournet, Cédric and Hawblitzel, Chris and Hritcu, Catalin and Ishtiaq, Samin and Kohlweiss, Markulf and Leino, Rustan and Lorch, Jay and Maillard, Kenji and Pang, Jinyang and Parno, Bryan and Protzenko, Jonathan and Ramananandro, Tahina and Rane, Ashay and Rastogi, Aseem and Swamy, Nikhil and Thompson, Laure and Wang, Peng and Zanella-Beguelin, Santiago and Zinzindohoué, Jean-Karim},
  booktitle = {Summit on Advances in Programming Languages (SNAPL)},
  month     = {May},
  title     = {Everest: Towards a Verified, Drop-In Replacement of {HTTPS}},
  year      = {2017}
}

Hash First, Argue Later: Adaptive Verifiable Computations on Outsourced Data

Dario Fiore, Cedric Fournet, Esha Ghosh, Markulf Kohlweiss, Olya Ohrimenko, and Bryan Parno
Proceedings of the ACM Conference on Computer and Communications Security (CCS), October, 2016
Full version on the Cryptology ePrint Archive, Report 2016/985
Conference
@inproceedings{hashArgue,
  author    = {Fiore, Dario and Fournet, Cedric and Ghosh, Esha and Kohlweiss, Markulf and Ohrimenko, Olya and Parno, Bryan},
  booktitle = {Proceedings of the ACM Conference on Computer and Communications Security (CCS)},
  month     = {October},
  title     = {Hash First, Argue Later: Adaptive Verifiable Computations on Outsourced Data},
  year      = {2016}
}

Cinderella: Turning Shabby X.509 Certificates into Elegant Anonymous Credentials with the Magic of Verifiable Computation

Antoine Delignat-Lavaud, Cédric Fournet, Markulf Kohlweiss, and Bryan Parno
Proceedings of the IEEE Symposium on Security and Privacy (Oakland), May, 2016
Conference
@inproceedings{cinderella,
  author    = {Delignat-Lavaud, Antoine and Fournet, Cédric and Kohlweiss, Markulf and Parno, Bryan},
  booktitle = {Proceedings of the IEEE Symposium on Security and Privacy (Oakland)},
  month     = {May},
  title     = {Cinderella: Turning Shabby {X.509} Certificates into Elegant Anonymous Credentials with the Magic of Verifiable Computation},
  year      = {2016}
}

Pinocchio: Nearly Practical Verifiable Computation

Bryan Parno, Craig Gentry, Jon Howell, and Mariana Raykova
Communications of the ACM, Vol. 59(2), February, 2016
Research Highlight
Journal Award
@article{pinocchioCACM,
  author    = {Parno, Bryan and Gentry, Craig and Howell, Jon and Raykova, Mariana},
  journal   = {Communications of the ACM},
  month     = {February},
  number    = {2},
  title     = {Pinocchio: Nearly Practical Verifiable Computation},
  volume    = {59},
  year      = {2016}
}

IronFleet: Proving Practical Distributed Systems Correct

Chris Hawblitzel, Jon Howell, Manos Kapritsos, Jacob R. Lorch, Bryan Parno, Michael L. Roberts, Srinath Setty, and Brian Zill
Proceedings of the ACM Symposium on Operating Systems Principles (SOSP), October, 2015
Conference
@inproceedings{hawblitzel2015ironfleet,
  author    = {Hawblitzel, Chris and Howell, Jon and Kapritsos, Manos and Lorch, Jacob R. and Parno, Bryan and Roberts, Michael L. and Setty, Srinath and Zill, Brian},
  booktitle = {Proceedings of the ACM Symposium on Operating Systems Principles (SOSP)},
  month     = {October},
  title     = {{IronFleet}: Proving Practical Distributed Systems Correct},
  year      = {2015}
}

Geppetto: Versatile Verifiable Computation

Craig Costello, Cedric Fournet, Jon Howell, Markulf Kohlweiss, Benjamin Kreuter, Michael Naehrig, Bryan Parno, and Samee Zahur
Proceedings of the IEEE Symposium on Security and Privacy (Oakland), May, 2015
Conference
@inproceedings{costello2015geppetto,
  author    = {Costello, Craig and Fournet, Cedric and Howell, Jon and Kohlweiss, Markulf and Kreuter, Benjamin and Naehrig, Michael and Parno, Bryan and Zahur, Samee},
  booktitle = {Proceedings of the IEEE Symposium on Security and Privacy (Oakland)},
  month     = {May},
  title     = {Geppetto: Versatile Verifiable Computation},
  year      = {2015}
}

A Note on the Unsoundness of vnTinyRAM's SNARK

Bryan Parno
ePrint 2015/437, May, 2015
Tech Report
@techreport{vnTinyRAMnote,
  author      = {Parno, Bryan},
  institution = {ePrint},
  month       = {May},
  number      = {2015/437},
  title       = {A Note on the Unsoundness of vnTinyRAM's SNARK},
  year        = {2015}
}

Network Adversary Attacks against Secure Encryption Schemes

Virgil D. Gligor, Bryan Parno, and Ji Sun Shin
IEICE Transactions on Communications, Vol. E98.B(2), February, 2015
Journal
@article{networkAdversary2015,
  author    = {Gligor, Virgil D. and Parno, Bryan and Shin, Ji Sun},
  journal   = {IEICE Transactions on Communications},
  month     = {February},
  number    = {2},
  title     = {Network Adversary Attacks against Secure Encryption Schemes},
  volume    = {E98.B},
  year      = {2015}
}

Ironclad Apps: End-to-End Security via Automated Full-System Verification

Chris Hawblitzel, Jon Howell, Jacob R. Lorch, Arjun Narayan, Bryan Parno, Danfeng Zhang, and Brian Zill
Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI), October, 2014
Conference
@inproceedings{ironclad,
  author    = {Hawblitzel, Chris and Howell, Jon and Lorch, Jacob R. and Narayan, Arjun and Parno, Bryan and Zhang, Danfeng and Zill, Brian},
  booktitle = {Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI)},
  month     = {October},
  title     = {Ironclad {Apps}: End-to-End Security via Automated Full-System Verification},
  year      = {2014}
}

Missive: Fast Application Launch From an Untrusted Buffer Cache

Jon Howell, Jeremy Elson, Bryan Parno, and John R. Douceur
Proceedings of the USENIX Annual Technical Conference (ATC), June, 2014
Conference
@inproceedings{howell2013missive,
  author    = {Howell, Jon and Elson, Jeremy and Parno, Bryan and Douceur, John R.},
  booktitle = {Proceedings of the USENIX Annual Technical Conference (ATC)},
  month     = {June},
  title     = {Missive: Fast Application Launch From an Untrusted Buffer Cache},
  year      = {2014}
}

Permacoin: Repurposing Bitcoin Work for Data Preservation

Andrew Miller, Elaine Shi, Ari Juels, Bryan Parno, and Jonathan Katz
Proceedings of the IEEE Symposium on Security and Privacy, May, 2014
Conference
@inproceedings{permacoin2014,
  author    = {Miller, Andrew and Shi, Elaine and Juels, Ari and Parno, Bryan and Katz, Jonathan},
  booktitle = {Proceedings of the IEEE Symposium on Security and Privacy},
  month     = {May},
  title     = {Permacoin: Repurposing Bitcoin Work for Data Preservation},
  year      = {2014}
}

Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers

Bryan Parno
ACM, 2014
Book
@book{thesisBook,
  author    = {Parno, Bryan},
  publisher = {ACM},
  title     = {Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers},
  year      = {2014}
}

Pinocchio Coin: Building Zerocoin from a Succinct Pairing-based Proof System

George Danezis, Cedric Fournet, Markulf Kohlweiss, and Bryan Parno
ACM PETShop, November, 2013
Conference
@inproceedings{pinocchioCoin,
  author    = {Danezis, George and Fournet, Cedric and Kohlweiss, Markulf and Parno, Bryan},
  booktitle = {ACM PETShop},
  month     = {November},
  title     = {Pinocchio Coin: Building {Zerocoin} from a Succinct Pairing-based Proof System},
  year      = {2013}
}

How to Run POSIX Apps in a Minimal Picoprocess

Jon Howell, Bryan Parno, and John R. Douceur
Proceedings of the USENIX Annual Technical Conference (ATC), June, 2013
Conference
@inproceedings{howell2013posix,
  author    = {Howell, Jon and Parno, Bryan and Douceur, John R.},
  booktitle = {Proceedings of the USENIX Annual Technical Conference (ATC)},
  month     = {June},
  title     = {How to Run {POSIX} Apps in a Minimal Picoprocess},
  year      = {2013}
}

Pinocchio: Nearly Practical Verifiable Computation

Bryan Parno, Craig Gentry, Jon Howell, and Mariana Raykova
Proceedings of the IEEE Symposium on Security and Privacy, May, 2013
Best Paper Award
Conference Award
@inproceedings{parno2013pinocchio,
  author    = {Parno, Bryan and Gentry, Craig and Howell, Jon and Raykova, Mariana},
  booktitle = {Proceedings of the IEEE Symposium on Security and Privacy},
  month     = {May},
  title     = {Pinocchio: Nearly Practical Verifiable Computation},
  year      = {2013}
}

Quadratic Span Programs and Succinct NIZKs without PCPs

Rosario Gennaro, Craig Gentry, Bryan Parno, and Mariana Raykova
Proceedings of the IACR EuroCrypt Conference, May, 2013
Originally published as Cryptology ePrint Archive, Report 2012/215, April, 2012
Conference
@inproceedings{GGPR2013,
  author    = {Gennaro, Rosario and Gentry, Craig and Parno, Bryan and Raykova, Mariana},
  booktitle = {Proceedings of the IACR EuroCrypt Conference},
  month     = {May},
  title     = {Quadratic Span Programs and Succinct {NIZKs} without {PCPs}},
  year      = {2013}
}

Embassies: Radically Refactoring the Web

Jon Howell, Bryan Parno, and John R. Douceur
Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI), April, 2013
Best Paper Award
Conference Award
@inproceedings{howell2013embassies,
  author    = {Howell, Jon and Parno, Bryan and Douceur, John R.},
  booktitle = {Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI)},
  month     = {April},
  title     = {Embassies: Radically Refactoring the Web},
  year      = {2013}
}

Resolving the conflict between generality and plausibility in verified computation

Srinath Setty, Ben Braun, Victor Vu, Andrew J. Blumberg, Bryan Parno, and Michael Walfish
Proceedings of the ACM European Conference on Computer Systems (EuroSys), April, 2013
Conference
@inproceedings{setty13resolving,
  author    = {Setty, Srinath and Braun, Ben and Vu, Victor and Blumberg, Andrew J. and Parno, Bryan and Walfish, Michael},
  booktitle = {Proceedings of the ACM European Conference on Computer Systems (EuroSys)},
  month     = {April},
  title     = {Resolving the conflict between generality and plausibility in verified computation},
  year      = {2013}
}

Shroud: Enabling Private Access to Large-Scale Data in the Data Center

Jacob R. Lorch, Bryan Parno, James Mickens, Mariana Raykova, and Joshua Schiffman
Proceedings of the USENIX Conference on File and Storage Technologies (FAST), February, 2013
Conference
@inproceedings{shroud,
  author    = {Lorch, Jacob R. \ and Parno, Bryan and Mickens, James and Raykova, Mariana and Schiffman, Joshua},
  booktitle = {Proceedings of the USENIX Conference on File and Storage Technologies (FAST)},
  month     = {February},
  title     = {Shroud: Enabling Private Access to Large-Scale Data in the Data Center},
  year      = {2013}
}

The Web Interface Should Be Radically Refactored

John R. Douceur, Jon Howell, Bryan Parno, Michael Walfish, and Xi Xiong
Proceedings of the Workshop on Hot Topics in Networks (HotNets), November, 2012
Workshop
@inproceedings{refactored2012,
  author    = {Douceur, John R. and Howell, Jon and Parno, Bryan and Walfish, Michael and Xiong, Xi},
  booktitle = {Proceedings of the Workshop on Hot Topics in Networks (HotNets)},
  month     = {November},
  title     = {The Web Interface Should Be Radically Refactored},
  year      = {2012}
}

Using Trustworthy Host-Based Information in the Network

Bryan Parno, Zongwei Zhou, and Adrian Perrig
Proceedings of the Workshop on Scalable Trusted Computing (STC), October, 2012
Invited Paper
Workshop Award
@inproceedings{host2012,
  author    = {Parno, Bryan and Zhou, Zongwei and Perrig, Adrian},
  booktitle = {Proceedings of the Workshop on Scalable Trusted Computing (STC)},
  month     = {October},
  title     = {Using Trustworthy Host-Based Information in the Network},
  year      = {2012}
}

Lockdown: A Safe and Practical Environment for Security Applications

Amit Vasudevan, Bryan Parno, Ning Qu, Virgil D. Gligor, and Adrian Perrig
Proceedings of the Conference on Trust and Trustworthy Computing (TRUST), June, 2012
Conference
@inproceedings{lockdown,
  author    = {Vasudevan, Amit and Parno, Bryan and Qu, Ning and Gligor, Virgil D. and Perrig, Adrian},
  booktitle = {Proceedings of the Conference on Trust and Trustworthy Computing (TRUST)},
  month     = {June},
  title     = {Lockdown: A Safe and Practical Environment for Security Applications},
  year      = {2012}
}

Trust Extension for Commodity Computers

Bryan Parno
Communications of the ACM, Vol. 55(6), June, 2012
Journal
@article{thesisCACM,
  author    = {Parno, Bryan},
  journal   = {Communications of the ACM},
  month     = {June},
  number    = {6},
  title     = {Trust Extension for Commodity Computers},
  volume    = {55},
  year      = {2012}
}

User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems

Franziska Roesner, Tadayoshi Kohno, Alexandee Moshchuk, Bryan Parno, Helen J. Wang, and Crispin Cowan
Proceedings of the IEEE Symposium on Security and Privacy (Oakland), May, 2012
Best Practical Paper Award
Conference Award
@inproceedings{roesner2012udac,
  author    = {Roesner, Franziska and Kohno, Tadayoshi and Moshchuk, Alexandee and Parno, Bryan and Wang, Helen J. and Cowan, Crispin},
  booktitle = {Proceedings of the IEEE Symposium on Security and Privacy (Oakland)},
  month     = {May},
  title     = {User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems},
  year      = {2012}
}

Monetary Forgery in the Digital Age: Will Physical-Digital Cash Be a Solution?

Nicolas Christin, Alessandro Acquisti, Bryan Parno, and Adrian Perrig
I/S: A Journal of Law and Policy for the Information Society, Vol. 7(2), 2012
Journal
@article{physicalDigitalCash2012,
  author    = {Christin, Nicolas and Acquisti, Alessandro and Parno, Bryan and Perrig, Adrian},
  journal   = {I/S: A Journal of Law and Policy for the Information Society},
  number    = {2},
  title     = {Monetary Forgery in the Digital Age: Will Physical-Digital Cash Be a Solution?},
  volume    = {7},
  year      = {2012}
}

How to Delegate and Verify in Public: Verifiable Computation from Attribute-based Encryption

Bryan Parno, Mariana Raykova, and Vinod Vaikuntanathan
IACR Theory of Cryptography Conference (TCC), 2012
Conference
@inproceedings{PRV12,
  author    = {Parno, Bryan and Raykova, Mariana and Vaikuntanathan, Vinod},
  booktitle = {IACR Theory of Cryptography Conference (TCC)},
  title     = {How to Delegate and Verify in Public: Verifiable Computation
from Attribute-based Encryption},
  year      = {2012}
}

Memoir: Practical State Continuity for Protected Modules

Bryan Parno, Jacob R. Lorch, John R. Douceur, James Mickens, and Jonathan M. McCune
Proceedings of the IEEE Symposium on Security and Privacy, May, 2011
Conference
@inproceedings{parno2011memoir,
  author    = {Parno, Bryan and Lorch, Jacob R. and Douceur, John R. and Mickens, James and McCune, Jonathan M.},
  booktitle = {Proceedings of the IEEE Symposium on Security and Privacy},
  day       = {22--25},
  location  = {Oakland, CA, USA},
  month     = {May},
  title     = {Memoir: Practical State Continuity for Protected Modules},
  year      = {2011}
}

Memoir---Formal Specs and Correctness Proofs

John R. Douceur, Jacob R. Lorch, Bryan Parno, James Mickens, and Jonathan M. McCune
Microsoft Research MSR-TR-2011-19, February, 2011
Tech Report
@techreport{memoirTR,
  author      = {Douceur, John R. and Lorch, Jacob R. \ and Parno, Bryan and Mickens, James and McCune, Jonathan M.},
  institution = {Microsoft Research},
  month       = {February},
  number      = {MSR-TR-2011-19},
  title       = {Memoir---Formal Specs and Correctness Proofs},
  year        = {2011}
}

Bootstrapping Trust in Modern Computers

Bryan Parno, Jonathan M. McCune, and Adrian Perrig
Springer, 2011
Book
@book{parno2011bootstrapping,
  author    = {Parno, Bryan and McCune, Jonathan M. and Perrig, Adrian},
  publisher = {Springer},
  title     = {Bootstrapping Trust in Modern Computers},
  year      = {2011}
}

Non-Interactive Verifiable Computation: Outsourcing Computation to Untrusted Workers

Rosario Gennaro, Craig Gentry, and Bryan Parno
Proceedings of the IACR CRYPTO Conference, August, 2010
Conference
@inproceedings{GGP2010,
  author    = {Gennaro, Rosario and Gentry, Craig and Parno, Bryan},
  booktitle = {Proceedings of the IACR CRYPTO Conference},
  month     = {August},
  title     = {Non-Interactive Verifiable Computation: Outsourcing Computation to Untrusted Workers},
  year      = {2010}
}

Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers

Bryan Parno
Carnegie Mellon University, May, 2010
ACM Dissertation Award
PhD Thesis Award
@phdthesis{parno2010thesis,
  author    = {Parno, Bryan},
  month     = {May},
  school    = {Carnegie Mellon University},
  title     = {Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers},
  year      = {2010}
}

Bootstrapping Trust in Commodity Computers

Bryan Parno, Jonathan M. McCune, and Adrian Perrig
Proceedings of the IEEE Symposium on Security and Privacy, May, 2010
Conference
@inproceedings{PaMcPe2010,
  author    = {Parno, Bryan and McCune, Jonathan M. and Perrig, Adrian},
  booktitle = {Proceedings of the IEEE Symposium on Security and Privacy},
  day       = {16--19},
  location  = {Oakland, CA, USA},
  month     = {May},
  title     = {Bootstrapping Trust in Commodity Computers},
  year      = {2010}
}

Don't Talk to Zombies: Mitigating DDoS Attacks via Attestation

Bryan Parno, Zongwei Zhou, and Adrian Perrig
Carnegie Mellon University, CyLab CMU-CyLab-09-009, June, 2009
Tech Report
@techreport{PaZhPe2009,
  author      = {Parno, Bryan and Zhou, Zongwei and Perrig, Adrian},
  institution = {Carnegie Mellon University, CyLab},
  month       = {June},
  number      = {CMU-CyLab-09-009},
  title       = {Don't Talk to Zombies: Mitigating {DDoS} Attacks via Attestation},
  year        = {2009}
}

CLAMP: Practical Prevention of Large-Scale Data Leaks

Bryan Parno, Jonathan M. McCune, Dan Wendlandt, David G. Andersen, and Adrian Perrig
Proceedings of the IEEE Symposium on Security and Privacy, May, 2009
Conference
@inproceedings{PMWAP2009,
  author    = {Parno, Bryan and McCune, Jonathan M. and Wendlandt, Dan and Andersen, David G. and Perrig, Adrian},
  booktitle = {Proceedings of the IEEE Symposium on Security and Privacy},
  day       = {17--20},
  location  = {Oakland, CA, USA},
  month     = {May},
  title     = {{CLAMP}: Practical Prevention of Large-Scale Data Leaks},
  year      = {2009}
}

Bootstrapping Trust in a ``Trusted'' Platform

Bryan Parno
Proceedings of the USENIX Workshop on Hot Topics in Security (HotSec), July, 2008
Workshop
@inproceedings{Parno2008,
  author     = {Parno, Bryan},
  booktitle  = {Proceedings of the USENIX Workshop on Hot Topics in
Security (HotSec)},
  location   = {San Jose, CA},
  month      = {July},
  title      = {Bootstrapping Trust in a ``Trusted'' Platform},
  xbooktitle = {USENIX Workshop on Hot Topics in Security},
  year       = {2008}
}

Unidirectional Key Distribution Across Time and Space with Applications to RFID Security

Ari Juels, Ravikanth Pappu, and Bryan Parno
Proceedings of the USENIX Security Symposium, July, 2008
Conference
@inproceedings{JuPaPa2008,
  author    = {Juels, Ari and Pappu, Ravikanth and Parno, Bryan},
  booktitle = {Proceedings of the USENIX Security Symposium},
  location  = {San Jose, CA},
  month     = {July},
  title     = {Unidirectional Key Distribution Across Time and Space with
Applications to {RFID} Security},
  year      = {2008}
}

Flicker: An Execution Infrastructure for TCB Minimization

Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, and Hiroshi Isozaki
Proceedings of the ACM European Conference on Computer Systems (EuroSys), April, 2008
Conference
@inproceedings{MPPRI2008,
  author    = {McCune, Jonathan M. and Parno, Bryan and Perrig, Adrian and Reiter, Michael K. and Isozaki, Hiroshi},
  booktitle = {Proceedings of the ACM European Conference on Computer Systems (EuroSys)},
  day       = {1--4},
  month     = {April},
  title     = {Flicker: An Execution Infrastructure for {TCB} Minimization},
  year      = {2008}
}

How Low Can You Go? Recommendations for Hardware-Supported Minimal TCB Code Execution

Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, and Arvind Seshadri
Proceedings of the ACM Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), March, 2008
Conference
@inproceedings{MPPRS2008,
  author    = {McCune, Jonathan M. and Parno, Bryan and Perrig, Adrian and Reiter, Michael K. and Seshadri, Arvind},
  booktitle = {Proceedings of the ACM Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS)},
  day       = {1--5},
  month     = {March},
  title     = {How Low Can You Go? {Recommendations} for Hardware-Supported Minimal {TCB} Code Execution},
  year      = {2008}
}

SNAPP: Stateless Network-Authenticated Path Pinning

Bryan Parno, Adrian Perrig, and David Andersen
Proceedings of the ACM Symposium on Information, Computer and Communications Security (ASIACCS), March, 2008
Conference
@inproceedings{snapp,
  author    = {Parno, Bryan and Perrig, Adrian and Andersen, David},
  booktitle = {Proceedings of the ACM Symposium on Information, Computer and Communications Security (ASIACCS)},
  month     = {March},
  title     = {SNAPP: Stateless Network-Authenticated Path Pinning},
  year      = {2008}
}

Countermeasures against Government-Scale Monetary Forgery

Alessandro Acquisti, Nicolas Christin, Bryan Parno, and Adrian Perrig
Proceedings of the Financial Cryptography and Data Security Conference (FC), January, 2008
Conference
@inproceedings{forgery2008,
  author    = {Acquisti, Alessandro and Christin, Nicolas and Parno, Bryan and Perrig, Adrian},
  booktitle = {Proceedings of the Financial Cryptography and Data Security Conference (FC)},
  month     = {January},
  title     = {Countermeasures against Government-Scale Monetary Forgery},
  year      = {2008}
}

Portcullis: Protecting Connection Setup from Denial-of-Capability Attacks

Bryan Parno, Dan Wendlandt, Elaine Shi, Adrian Perrig, Bruce Maggs, and Yih-Chun Hu
Proceedings of ACM SIGCOMM, August, 2007
Conference
@inproceedings{PWSPMH2007,
  author    = {Parno, Bryan and Wendlandt, Dan and Shi, Elaine and Perrig, Adrian and Maggs, Bruce and Hu, Yih-Chun},
  booktitle = {Proceedings of ACM SIGCOMM},
  day       = {27--31},
  month     = {August},
  title     = {Portcullis: Protecting Connection Setup from Denial-of-Capability Attacks},
  year      = {2007}
}

Minimal TCB Code Execution (Extended Abstract)

Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, and Arvind Seshadri
Proceedings of the IEEE Symposium on Security and Privacy, May, 2007
Conference
@inproceedings{McPaPeReSe2007,
  author    = {McCune, Jonathan M. and Parno, Bryan and Perrig, Adrian and Reiter, Michael K. and Seshadri, Arvind},
  booktitle = {Proceedings of the IEEE Symposium on Security and
Privacy},
  month     = {May},
  title     = {Minimal {TCB} Code Execution (Extended Abstract)},
  xurl      = {http://www.ece.cmu.edu/~jmmccune/papers/mccune_parno_perrig_reiter_seshadri_mintcb.pdf},
  year      = {2007}
}

Secure Sensor Network Routing: A Clean-Slate Approach

Bryan Parno, Mark Luk, Evan Gaustad, and Adrian Perrig
Proceedings of the Conference on Future Networking Technologies (CoNEXT), December, 2006
Conference
@inproceedings{PaLuGaPe2006,
  author    = {Parno, Bryan and Luk, Mark and Gaustad, Evan and Perrig, Adrian},
  booktitle = {Proceedings of the Conference on Future Networking Technologies (CoNEXT)},
  day       = {4--7},
  location  = {Lisboa, Portugal},
  month     = {December},
  title     = {Secure Sensor Network Routing: A Clean-Slate Approach},
  year      = {2006}
}

Phoolproof Phishing Prevention

Bryan Parno, Cynthia Kuo, and Adrian Perrig
Proceedings of the Financial Cryptography and Data Security Conference, February, 2006
Conference
@inproceedings{PaKuPe2006,
  author    = {Parno, Bryan and Kuo, Cynthia and Perrig, Adrian},
  booktitle = {Proceedings of the Financial Cryptography and Data Security Conference},
  day       = {27},
  location  = {Anguilla, British West Indies},
  month     = {February},
  title     = {Phoolproof Phishing Prevention},
  year      = {2006}
}

Browser Enhancements for Preventing Phishing Attacks

Bryan Parno, Cynthia Kuo, and Adrian Perrig
In Phishing and Counter-Measures: Understanding the Increasing Problem of Electronic Identity Theft, Markus Jakobsson and Steven Myers, Ed. Wiley-Interscience, , 2006
Book Chapter
@incollection{phishing2006,
  author    = {Parno, Bryan and Kuo, Cynthia and Perrig, Adrian},
  booktitle = {Phishing and Counter-Measures: Understanding the Increasing Problem of Electronic Identity Theft},
  editor    = {Markus Jakobsson and Steven Myers},
  publisher = {Wiley-Interscience},
  title     = {Browser Enhancements for Preventing Phishing Attacks},
  year      = {2006}
}

Challenges in Securing Vehicular Networks

Bryan Parno and Adrian Perrig
Proceedings of the Fourth Workshop on Hot Topics in Networks (HotNets), November, 2005
Workshop
@inproceedings{ParPer2005,
  author    = {Parno, Bryan and Perrig, Adrian},
  booktitle = {Proceedings of the Fourth Workshop on Hot Topics in Networks (HotNets)},
  day       = {14--15},
  location  = {College Park, MD, USA},
  month     = {November},
  title     = {Challenges in Securing Vehicular Networks},
  year      = {2005}
}

Distributed Detection of Node Replication Attacks in Sensor Networks

Bryan Parno
Carnegie Mellon University, May, 2005
Masters Thesis
@mastersthesis{parno2005thesis,
  author    = {Parno, Bryan},
  month     = {May},
  school    = {Carnegie Mellon University},
  title     = {Distributed Detection of Node Replication Attacks in Sensor Networks},
  year      = {2005}
}

Distributed Detection of Node Replication Attacks in Sensor Networks

Bryan Parno, Adrian Perrig, and Virgil Gligor
Proceedings of the IEEE Symposium on Security and Privacy, May, 2005
Conference
@inproceedings{PaPeGl2005,
  author    = {Parno, Bryan and Perrig, Adrian and Gligor, Virgil},
  booktitle = {Proceedings of the IEEE Symposium on Security and Privacy},
  month     = {May},
  title     = {Distributed Detection of Node Replication Attacks in Sensor Networks},
  year      = {2005}
}

FANFARE for the Common Flow

Elaine Shi, Bryan Parno, Adrian Perrig, Yih-Chun Hu, and Bruce Maggs
Carnegie Mellon University CMU-CS-05-148, February, 2005
Tech Report
@techreport{SPPHM2005,
  author      = {Shi, Elaine and Parno, Bryan and Perrig, Adrian and Hu, Yih-Chun and Maggs, Bruce},
  institution = {Carnegie Mellon University},
  month       = {February},
  number      = {CMU-CS-05-148},
  title       = {{FANFARE} for the Common Flow},
  year        = {2005}
}

Defending a P2P Digital Preservation System

Bryan Parno and Mema Rousoppoulos
IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), Vol. 1(4), December, 2004
Journal
@article{lockss2004,
  author    = {Parno, Bryan and Rousoppoulos, Mema},
  journal   = {IEEE Transactions on Dependable and Secure Computing (IEEE TDSC)},
  month     = {December},
  number    = {4},
  title     = {Defending a P2P Digital Preservation System},
  volume    = {1},
  year      = {2004}
}

How to Subvert LOCKSS and What the LOCKSSmith Can Do About It

Bryan Parno
Harvard University, April, 2004
Undergraduate Thesis
@mastersthesis{parno2004thesis,
  author    = {Parno, Bryan},
  month     = {April},
  school    = {Harvard University},
  title     = {How to Subvert {LOCKSS} and What the {LOCKSSmith} Can Do About It},
  type      = {bachelor's thesis},
  year      = {2004}
}

An Analysis of Database-Driven Mail Servers

Nick Elprin and Bryan Parno
Proceedings of the Large Installation Systems Administration Conference (LISA), October, 2003
Conference
@inproceedings{lisa2003,
  author    = {Elprin, Nick and Parno, Bryan},
  booktitle = {Proceedings of the Large Installation Systems Administration Conference (LISA)},
  month     = {October},
  title     = {An Analysis of Database-Driven Mail Servers},
  year      = {2003}
}