SMART: Secure and Minimal Architecture for (Establishing Dynamic) Root of Trust. K Eldefrawy, G Tsudik, A Francillon, D Perito Network and Distributed System Security Symposium (NDSS), 2012 | 484 | 2012 |
System and method for determining reliability of nodes in mobile wireless network GD Holland, MD Howard, TC Lu, K Eldefrawy, MS Keegan, KY Ni US Patent App. 10/003,985, 2018 | 324* | 2018 |
ALARM: Anonymous location-aided routing in suspicious MANETs K Eldefrawy, G Tsudik IEEE Transactions on Mobile Computing 10 (9), 1345-1358, 2011 | 299 | 2011 |
Attacks on physical-layer identification B Danev, H Luecken, S Capkun, K Eldefrawy Proceedings of the third ACM conference on Wireless network security, 89-98, 2010 | 295 | 2010 |
{VRASED}: A verified {Hardware/Software}{Co-Design} for remote attestation IDO Nunes, K Eldefrawy, N Rattanavipanon, M Steiner, G Tsudik 28th USENIX Security Symposium (USENIX Security 19), 1429-1446, 2019 | 158 | 2019 |
Filtering unwanted data traffic via a per-customer blacklist JE Van der Merwe, K Eldefrawy, B Krishnamurthy, ... US Patent 8,161,155, 2012 | 153 | 2012 |
Privacy-preserving location-based on-demand routing in MANETs K Eldefrawy, G Tsudik IEEE journal on selected areas in communications 29 (10), 1926-1934, 2011 | 148 | 2011 |
Craterlake: a hardware accelerator for efficient unbounded computation on encrypted data N Samardzic, A Feldmann, A Krastev, N Manohar, N Genise, S Devadas, ... Proceedings of the 49th Annual International Symposium on Computer …, 2022 | 117 | 2022 |
5PM: Secure pattern matching J Baron, K Eldefrawy, K Minkovich, R Ostrovsky, E Tressler Journal of Computer Security 21 (5), 601-625, 2013 | 101 | 2013 |
BotTorrent: Misusing BitTorrent to Launch DDoS Attacks. K Eldefrawy, M Gjoka, A Markopoulou SRUTI 7, 1-6, 2007 | 95 | 2007 |
LIghtweight Swarm Attestation: A Tale of Two LISAs X Carpent, K Eldefrawy, N Rattanavipanon, G Tsudik 11th ACM Asia Conference on Computer and Communications Security (ASIACCS'17), 2017 | 92 | 2017 |
HYDRA: HYbrid Design for Remote Attestation (Using a Formally Verified Microkernel) K Eldefrawy, N Rattanavipanon, G Tsudik 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017 | 89 | 2017 |
Prism: Privacy-friendly routing in suspicious manets (and vanets) K Eldefrawy, G Tsudik Network Protocols, 2008. ICNP 2008. IEEE International Conference on, 258-267, 2008 | 83 | 2008 |
Non-malleable obfuscator for sparse functions K Eldefrawy, C Cho, DC Apon, J Katz US Patent App. 10/198,584, 2019 | 79* | 2019 |
Efficient, Reusable Fuzzy Extractors from LWE D Apon, C Cho, K Eldefrawy, J Katz International Symposium on Cyber Security Cryptography and Machine Learning …, 2017 | 69 | 2017 |
Communication-Optimal Proactive Secret Sharing for Dynamic Groups J Baron, K Eldefrawy, J Lampkins, R Ostrovsky 13th International Conference on Applied Cryptography and Network Security …, 2015 | 69 | 2015 |
Byzantine Fault Tolerant Software-Defined Networking (SDN) Controllers K Eldefrawy, T Kaczmarek MidCCI: The 2nd IEEE International Workshop on Middleware for Cyber Security …, 2016 | 66 | 2016 |
How to withstand mobile virus attacks, revisited J Baron, K Eldefrawy, J Lampkins, R Ostrovsky Proceedings of the 2014 ACM symposium on Principles of distributed computing …, 2014 | 59 | 2014 |
Verified Architecture for Proofs of Execution on Remote Devices under Full Software Compromise I De Oliveira Nunes, K Eldefrawy, N Rattanavipanon, G Tsudik 29th USENIX Security Symposium, 2020 | 54* | 2020 |
Leveraging social contacts for message confidentiality in delay tolerant networks K Eldefrawy, J Solis, G Tsudik Computer Software and Applications Conference, 2009. COMPSAC'09. 33rd Annual …, 2009 | 49 | 2009 |