|
Network
security projects
Sensor
Network Security
- PIKE: Peer
Intermediaries for Key Establishment in Sensor Networks PS,
PDF,
BIB.
With Haowen Chan. Appears at IEEE Infocom 2005.
- FIT: Fast
Internet Traceback PS,
PDF,
BIB.
With Avi Yaar and Dawn
Song. Appears at IEEE
Infocom 2005.
- SPV: Secure Path
Vector Routing for Securing BGP PS,
PDF,
BIB.
With Yih-Chun Hu and Marvin
Sirbu. Appears in ACM SIGCOMM 2004.
- Key Infection:
Smart Trust for Smart Dust PS,
PDF, BIB. With Ross Anderson and Haowen Chan. Appears in IEEE International Conference on
Network Protocols (ICNP 2004).
- SWATT:
SoftWare-based ATTestation for Embedded Devices PS, PDF,
BIB. With Arvind Seshadri, Leendert van Doorn, and
Pradeep
Khosla. Appears in 2004 IEEE
Symposium on Security and Privacy.
- The Sybil Attack
in Sensor Networks: Analysis and Defenses PS,
PDF, BIB. With James Newsome, Elaine
Shi, and Dawn Song.
Appears in Third International
Symposium on Information Processing in Sensor Networks (IPSN 2004).
- ACE: An Emergent
Algorithm for Highly Uniform Cluster Formation PDF, BIB.
With Haowen Chan.
Appears in First European Workshop on
Wireless Sensor Networks (EWSN 2004).
- SIA: Secure
Information Aggregation in Sensor Networks PDF,
BIB. With Bartosz Przydatek and Dawn Song. Appears in ACM SenSys 2003.
- Security and
Privacy in Sensor Networks PDF, BIB. With Haowen Chan. Appears in IEEE Computer Magazine,
October 2003.
- Random Key
Predistribution Schemes for Sensor Networks PS, PDF,
BIB. With Haowen Chan and Dawn Song. Appears in IEEE Symposium on
Security and Privacy 2003.
- SPINS: Security
Protocols for Sensor Networks PS, PDF, BIB, with Robert Szewczyk, Victor Wen, David Culler, and Doug Tygar, in Wireless Networks
Journal (WINE), September 2002.
- SPINS: Security
Protocols for Sensor Networks PS,
PDF, PPT, PS.GZ, HTML, BIB, with Robert Szewczyk, Victor Wen, David Culler, and Doug Tygar, in
Proceedings of Seventh Annual International Conference on Mobile
Computing and Networks MOBICOM
2001, July 2001.
Authentication
and signature of broadcast streams
- Distillation
Codes and Applications to DoS Resistant Multicast Authentication PS, PDF, BIB. With Chris Karlof, Naveen Sastry, Yaping
Li, and Doug Tygar.
Appears in Network
and Distributed System Security Symposium (NDSS 2004).
- The TESLA
Broadcast Authentication ProtocolPS, PDF, PS.GZ, HTML, BIB, with
Ran Canetti, Dawn Song,
and Doug Tygar, in RSA Cryptobytes,
Summer 2002.
- The BiBa One-Time
Signature and Broadcast Authentication Protocol PS, PDF,
PS.GZ, HTML, BIB, in Proceedings of the ACM
Conference on Computer and Communications Security CCS 2001, November
2001.
- Efficient and
Secure Source Authentication for MulticastPS, PDF, PS.GZ, HTML, BIB, with Ran Canetti, Dawn Song, and Doug Tygar, in
Proceedings of Network and Distributed System Security Symposium NDSS 2001, February 2001.
- Efficient
Authentication and Signing of Multicast Streams over Lossy Channels PS, PDF, PS.GZ, HTML, BIB, with Ran Canetti, Dawn Song, and Doug Tygar, in Proc. of
IEEE Security and Privacy Symposium S&P2000,
May 2000.
- TESLA: Multicast
Source Authentication Transform Introduction draft-ietf-msec-tesla-intro-03.txt,
with Ran Canetti, Bob Briscoe, Dawn Song, and Doug Tygar, proposed
IETF draft.
- TESLA: Multicast
Source Authentication Transform Specification draft-ietf-msec-tesla-spec-00.txt,
Adrian Perrig, Ran Canetti, and Bram Whillock, proposed IETF draft.
- Bram Whillock
implemented the TESLA specification. The code
is available here, use it at your own risk.
Key
distribution and agreement of dynamic groups
- ELK, a New
Protocol for Efficient Large-Group Key Distribution. PS, PDF,
and PS.GZ, BIB, with Dawn Song, and Doug Tygar, in Proc. of
IEEE Security and Privacy Symposium S&P2001,
May 2001.
- Simple and
Fault-Tolerant Key Agreement for Dynamic Collaborative Groups PS, PS.GZ, PDF, HTML, BIB, with Yongdae Kim and Gene Tsudik, 7th ACM
Conference on Computer and Communication Security CCS 2000.
- Communication-Efficient
Group Key AgreementPS, PS.GZ, PDF, HTML,
BIB, with Yongdae Kim and Gene Tsudik, International
Federation for Information Processing IFIP SEC 2001.
- Efficient
Collaborative Key Management Protocols for Secure Autonomous Group
Communication, BIB,
International Workshop on Cryptographic Techniques and E-Commerce CrypTEC '99.
DDoS
Attacks Defense
- SIFF: A Stateless
Internet Flow Filter to Mitigate DDoS Flooding Attacks PS, PDF, BIB. With Avi Yaar and Dawn Song. Appears in 2004 IEEE
Symposium on Security and Privacy.
- Taming IP Packet
Flooding Attacks PS, PDF, BIB. With Daniel Adkins, Karthik Lakshminarayanan,
and Ion Stoica.
Appears in Workshop on
Hot Topics in Networks (HotNets-II).
- Pi: A Path
Identification Mechanism to Defend against DDoS Attacks PS, PDF, BIB. With Avi Yaar and Dawn Song. Appears in IEEE Symposium on
Security and Privacy 2003.
-
Advanced and
Authenticatd Marking Schemes for IP Traceback PS, PS.GZ, PDF, with Dawn Song. Published at IEEE Infocom 2001
-
Advanced and
Authenticatd Marking Schemes for IP Traceback PS, PS.GZ, PDF, with Dawn Song. Technical
Report No. UCB/CSD-00-1107.
Secure
Routing Protocols
- SPV: Secure Path
Vector Routing for Securing BGP PS, PDF, BIB.
With Yih-Chun Hu and Marvin
Sirbu. Appears in ACM SIGCOMM 2004.
- (SuperSEAD
journal paper) SEAD: Secure Efficient Distance Vector Routing for
Mobile Wireless Ad Hoc Networks PDF, BIB. Appears in Ad Hoc Networks Journal,
1(2003), pages 175-192.
- Efficient
Security Mechanisms for Routing Protocols PS, PDF, PS.GZ, BIB. With Yih-Chun Hu and Dave Johnson. Appears in the
proceedings of the Tenth Annual
Network and Distributed System Security Symposium (NDSS 2003).
- Rushing Attacks
and Defense in Wireless Ad Hoc Network Routing Protocols PS, PDF, PS.GZ, BIB. With Yih-Chun Hu and Dave Johnson. In ACM Workshop on
Wireless Security (WiSe 2003).
- Packet Leashes: A
Defense against Wormhole Attacks in Wireless Networks PS, PDF, PS.GZ, BIB. With Yih-Chun Hu and Dave Johnson. In IEEE Infocom 2003.
- Ariadne: A Secure
On-Demand Routing Protocol for Ad Hoc Networks PS, PDF, PS.GZ, BIB. With Yih-Chun Hu and Dave Johnson. Appears in Mobicom 2002.
- SEAD: Secure
Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks PS, PDF, PS.GZ, BIB. With Yih-Chun Hu and Dave Johnson. In Fourth IEEE Workshop on Mobile
Computing Systems and Applications (WMCSA '02), June 2002.
Automatic
Security Protocol Generation and Verification
- A First Step
towards the Automatic Generation of Security Protocols PS, PS.GZ, PDF, HTML, BIB, with Dawn Song. In Proc. of
Network and Distributed System Security NDSS 2000, February 2000.
- Looking for
diamonds in the desert: Automatic security protocol generation for
three-party authentication and key distribution PS, PS.GZ, PDF, HTML, BIB, with Dawn Song. In Proc. of
IEEE Computer Security Foundations Workshop CSFW 13,
July 2000.
- AGVI ---
Automatic Generation, Verification, and Implementation of Security
ProtocolsPS, PS.GZ, PDF, HTML, BIB, with Dawn Song and Doantam
Phan. In Proceedings of 13th Conference on Computer Aided Verification CAV 2001, July 2001.
Applied
Cryptography
Search
on Encrypted Data
- The BiBa One-Time
Signature and Broadcast Authentication Protocol PS, PDF,
PS.GZ, HTML, BIB, in Proceedings of the ACM
Conference on Computer and Communications Security CCS 2001, November
2001.
- Practical
Techniques for Searches on Encrypted Data PS,
PS.GZ, PDF, HTML,
BIB, with Dawn Song and David Wagner. In Proc. of
IEEE Security and Privacy Symposium S&P2000,
May 2000.
Human
Factors in Computer Security
Hash
Visualization and User Authentication through Image Recognition
- Hash
Visualization: a New Technique to Improve Real-World Security PS, PS.GZ, PDF, HTML, BIB, with Dawn Song. International
Workshop on Cryptographic Techniques and E-Commerce CrypTEC '99.
- Déjà
Vu: A User Study Using Images for Authentication PS, PS.GZ, PDF, HTML, BIB, with Rachna Dhamija, 9th Usenix Security
Symposium, August 2000.
|