Stanford Secure Internet of Things Project

Publications

2019

  1. Emma Dauterman, Henry Corrigan-Gibbs, David Mazières, Dan Boneh, and Dominic Rizzo. True2f: Backdoor-resistant authentication tokens. In Proceedings of the IEEE Symposium on Security and Privacy, 2019.
  2. Dan Boneh, Elette Boyle, Henry Corrigan-Gibbs, Niv Gilboa, and Yuval Ishai. Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs. In Proceedings of CRYPTO 2019.
  3. David Adrian, Karthikeyan Bhargavan, Zakir Durumeric, Pierrick Gaudry, Matthew Green, J. Alex Halderman, Nadia Heninger, Drew Springall, Emmanuel Thomé, Luke Valenta, Benjamin VanderSloot, Eric Wustrow, Santiago Zanella Béguelin, Paul Zimmermann. Imperfect forward secrecy: how Diffie-Hellman fails in practice. In Communications of the ACM, Vol 62(1), 2019.
  4. Luke Hsiao, Sen Wu, Nicholas Chiang, Christopher Ré and Philip Levis. Automating the Generation of Hardware Component Knowledge Bases. In Proceedings of the 20th ACM SIGPLAN/SIGBED Conference on Languages, Compilers, and Tools for Embedded Systems (LCTES ’19), 2019.
  5. Richard Lin, Rohit Ramesh, Antonio Iannopollo, Alberto L. Sangiovanni-Vincentelli, Prabal Dutta, Elad Alon, Björn Hartmann. Beyond Schematic Capture: Meaningful Abstractions for Better Electronics Design Tools. In Proceedings of CHI, 2019
  6. Neal Jackson, Joshua Adkins, Prabal Dutta. Capacity over capacitance for reliable energy harvesting sensors. In Proceedings of IPSN, 2019.
  7. ByongChan Lim, Mark Horowitz. An Analog Model Template Library: Simplifying Chip-Level, Mixed-Signal Design Verification. In IEEE Transactions on VLSI Systems 27(1), 2019.

2018

  1. Rishabh Poddar, Chang Lan, Raluca Ada Popa, and Sylvia Ratnasamy. SafeBricks: Shielding Network Functions in the Cloud. In Proceedings of NSDI, 2018.
  2. Pratyush Mishra, Rishabh Poddar, Jerry Chen, Alessandro Chiesa, Raluca Ada Popa: Oblix: An Efficient Oblivious Search Index. In Proceedings of The IEEE Symposium on Security and Privacy, 2018.
  3. Howard Wu, Wenting Zheng, Alessandro Chiesa, Raluca Ada Popa, Ion Stoica: DIZK: A Distributed Zero Knowledge Proof System. In Proceedings of the USENIX Security Symposium, 2018.
  4. Kalev Alpernas, Cormac Flanagan, Sadjad Fouladi, Leonid Ryzhyk, Mooly Sagiv, Thomas Schmitz, Keith Winstein. Secure serverless computing using dynamic information flow control. In Proceedings of PACMPL 2(OOPSLA), 2018.
  5. Henry Corrigan-Gibbs and Dmitry Kogan. The Discrete-Logarithm Problem with Preprocessing. In Proceedings of EUROCRYPT 2018.
  6. Yuichi Hanada, Luke Hsiao, Philip Levis. Smart Contracts for Machine-to-Machine Communication: Possibilities and Limitations. In Proceedings of IOTAIS 2018.
  7. Dan Boneh, Yuval Ishai, Alain Passelègue, Amit Sahai, and David J. Wu. Exploring Crypto Dark Matter: - New Simple PRF Candidates and Their Applications. In Proceedings of Theory of Cryprography Conference (TCC), 2018.
  8. B. Bünz, J. Bootle, D. Boneh, A. Poelstra, P. Wuille, and G. Maxwell. Bulletproofs: Efficient Range Proofs for Confidential Transactions. In Proceedings of IEEE S&P 2018.
  9. D. Boneh, Y. Ishai, A. Sahai, and D. Wu Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs. In Proceeings of Eurocrypt 2018.
  10. Sen Wu, Luke Hsiao, Xiao Cheng, Braden Hancock, Theodoros Rekatsinas, Philip Levis, and Christopher Ré. Fonduer: Knowledge Base Construction from Richly Formatted Data. In Proceedings of 2018 ACM SIGMOD/PODS Conference on the Management of Data (SIGMOD), 2018.
  11. Francis Y. Yan, Jestin Ma, Greg D. Hill, Deepti Raghavan, Riad S. Wahby, Philip Levis, Keith Winstein. Pantheon: the training ground for Internet congestion-control research. In Proceedings of theUSENIX Annual Technical Conference, 2018.
  12. Holly Chiang, James Hong, Kevin Kiningham, Laurynas Riliskis, Philip Levis, and Mark Horowitz. Tethys: Collecting Sensor Data Without Infrastructure or Trust. In Proceedings of the 3rd ACM/IEEE International Conference on Internet of Things Design and Implementation (IoTDI), 2018.
  13. James Hong, Amit Levy, Laurynas Riliskis, and Philip Levis. Don’t Talk Unless I Say So! Securing the Internet of Things With Default-Off Networking. In Proceedings of the 3rd ACM/IEEE International Conference on Internet of Things Design and Implementation (IoTDI), 2018.
  14. Pat Pannuto, Benjamin Kempke, Li-Xuan Chuo, David Blaauw, and Prabal Dutta, Harmonium: UWB Pulse Generation with Bandstitched Recovery for Fast, Accurate, and Robust Localization. In Transactions on Sensor Networks (TOSN'18), 2018.
  15. Bradford Campbell, Ye-Sheng Kuo, and Prabal Dutta, From Energy Audits to Monitoring Megawatt Loads: A Flexible and Deployable Power Metering System. In Proceedings of the 3rd ACM/IEEE International Conference on Internet-of-Things Design and Implementation (IoTDI'18), 2018.
  16. Pat Pannuto, Benjamin Kempke, and Prabal Dutta, Slocalization: Sub-uW, Ultra Wideband Backscatter Localization. In Proceedings of the 17th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN'18), , 2018. Best Paper Runner-Up.
  17. Joshua Adkins, Bradford Campbell, Branden Ghena, Neal Jackson, Pat Pannuto, Samuel Rohrer, and Prabal Dutta, The Signpost Platform for City-Scale Sensing. In Proceedings of the 17th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN'18), 2018.

2017

  1. Dan Boneh, Sam Kim, and Valeria Nikolaenko. Lattice-Based DAPS and Generalizations: Self-enforcement in Signature Schemes. In Proceedings of ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), 2017.
  2. Dan Boneh and Mark Zhandry. Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation. In Algorithmica 79(4), 2017.
  3. Dmitry Kogan, Nathan Manohar, and Dan Boneh. T/Key: Second-Factor Authentication From Secure Hash Chains. In Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2017.
  4. Ben Fisch, Dhinakaran Vinayagamurthy, Dan Boneh, and Sergey Gorbunov. IRON:Functional Encryption using Intel SGX. In Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2017.
  5. Dmitry Kogan, Henri Stern, Ashley Tolbert, David Mazières, and Keith Winstein. The Case For Secure Delegation. In Proceedings of The Sixteenth ACM Workshop on Hot Topics in Networks (HotNets), 2017.
  6. Zhixiong Niu, Hong Xu, Dongsu Han, Peng Cheng, Yongqiang Xiong, Guo Chen, Keith Winstein. Network Stack as a Service in the Cloud. In Proceedings of The Sixteenth ACM Workshop on Hot Topics in Networks (HotNets), 2017.
  7. David A. Mellis, Ben Zhang,Audrey Leung, Björn Hartmann. Machine Learning for Makers: Interactive Sensor Data Classification Based on Augmented Code Examples. In Proceedings of the ACM CHI Conference on Designing Interactive Systems (DIS), 2017.

  8. Meghan Clark, Mark W. Newman, Prabal Dutta. Devices and Data and Agents, Oh My: How Smart Home Abstractions Prime End-User Mental Models. IMWUT 1(3): 44:1-44:26 (2017).
  9. Fraser Brown and Shravan Narayan and Riad S. Wahby and Dawson R. Engler and Ranjit Jhala and Deian Stefan. Finding and Preventing Bugs in JavaScript Bindings. In Proceedings of the 2017 IEEE Symposium on Security and Privacy, (SP 2017).
  10. Amit Levy and Bradford Campbell and Branden Ghena and Daniel Giffin and Pat Pannuto and Prabal Dutta and Philip Levis. Multiprogramming a 64 kB Computer Safely and Efficiently. In Proceedings of the 26th ACM Symposium on Operating Systems Principles (SOSP), 2017.
  11. Ramesh, Rohit and Lin, Richard and Iannopollo, Antonio and Sangiovanni-Vincentelli, Alberto and Hartmann, Bjorn and Dutta, Prabal. Turning Coders into Makers: The Promise of Embedded Design Generation. In Proceedings of the 1st Annual ACM Symposium on Computational Fabrication, 2017.
  12. Amit Levy, Bradford Campbell, Branden Ghena, Pat Pannuto, Prabal Dutta, and Philip Levis. The Case for Writing a Kernel in Rust. In Proceedings of the 8th Asia-Pacific Workshop on Systems (APSys), 2017.
  13. William McGrath, Daniel Drew, Jeremy Warner, Majeed Kazemitabaar, Mitchell Karchemsky, David Mellis, Bjorn Hartmann. Bifrost : Visualizing and Checking Behavior of Embedded Systems across Hardware and Software. In Proceedings of the 29th Annual ACM Symposium on User Interface Software and Technology (UIST), 2017.
  14. Henry Corrigan-Gibbs and Dan Boneh. Prio: Private, Robust, and Scalable Computation of Aggregate Statistics. In Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation, (NSDI), 2017, p. 259--282. 2017.
  15. Dan Boneh and Shay Gueron. Surnaming Schemes, Fast Verification, and Applications to SGX Technology. In Topics in Cryptology - CT-RSA 2017, p. 149--164. 2017.
  16. Wenting Zheng and Frank Li and Raluca Ada Popa and Ion Stoica and Rachit Agarwal. MiniCrypt: Reconciling Encryption and Compression for Big Data Stores. In Proceedings of the Twelfth European Conference on Computer Systems (EuroSys), 2017.
  17. Wenting Zheng and Ankur Dave and Jethro Beekman and Raluca Ada Popa and Joseph Gonzalez and Ion Stoica. Opaque: An Oblivious and Encrypted Distributed Analytics Platform. In Proceedings of the 14th USENIX Symposium of Networked Systems Design and Implementation (NSDI), 2017.
  18. Judson Wilson and Riad S. Wahby and Henry Corrigan-Gibbs and Dan Boneh and Philip Levis and Keith Winstein. Trust but Verify: Auditing Secure Internet of Things Devices. In Proceedings of the The 15th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys 2017), 2017.
  19. Carmelo Di Franco and Amanda Prorok and Nikolay Atanasov and Benjamin P. Kempke and Prabal Dutta and Vijay Kumar and George J. Pappas. Calibration-free network localization using non-line-of-sight ultra-wideband measurements. In Proceedings of the 16th ACM/IEEE International Conference on Information Processing in Sensor Networks, (IPSN), 2017.

2016

  1. Ben Lampert, Riad S. Wahby, Shane Leonard, and Philip Levis. Robust, low-cost, auditable random number generation for embedded system security. In Proceedings of the 14th ACM Conference on Embedded Networked Sensor Systems (SenSys 2016).
  2. Pat Pannuto, Yoonymung Lee, Ye-Sheng Kuo, and ZhuYoong Foo, Benjamin Kempke, Gyouho Kim, Ronald Dreslinski, David Blaauw, and Prabal Dutta. MBus: The Missing Interconnect that Enables the Module Millimeter-Scale Computing Class and Connects the World's Smallest Computers. In IEEE Micro: Special Issue on Top Picks from Computer Architecture Conferences.
  3. Benjamin Kempke, Pat Pannuto, and Prabal Dutta. Harmonium: Asymmetric, Bandstitched UWB for Fast, Accurate, and Robust Indoor Localization. In Proceedings of the 15th International Conference on Information Processing in Sensor Networks.
  4. Bradford Campbell, Joshua Adkins, and Prabal Dutta. Cinamin: A Perpetual and Nearly Invisible BLE Beacon. In Proceedings of the 2016 International Conference on Embedded Wireless Systems and Networks.
  5. Thomas Zachariah, Joshua Adkins, and Prabal Dutta. Browsing the Web of Things with Summon. In Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems.
  6. Rishabh Poddar, Tobias Boelter and Raluca Ada Popa. Arx: A Strongly Encrypted Database System. In Cryptology ePrint Archive, Report 2016/591.
  7. Chang Lan, Justine Sherry, Raluca Ada Popa and Sylvia Ratnasamy. Embark: Securely Outsourcing Middleboxes to the Cloud. In USENIX Symposium on Networked Design and Implementation (NSDI).
  8. Nikolaos Karapanos, Alexandros Filios, Raluca Ada Popa, Srdjan Capkun. Verena: End-to-End Integrity Protection for Web Applications. In IEEE Symposium of Security and Privacy (Oakland).
  9. Pablo Paredes, Ryuka Ko, Eduardo Calle-Ortiz, John Canny, Björn Hartmann and Greg Niemeyer. Fiat-Lux: Interactive Urban Lights for Combining Positive Emotion and Efficiency. In Proceedings of the 2016 ACM Conference on Designing Interactive Systems.
  10. David A. Mellis, Leah Buechley, Mitchel Resnick, and Björn Hartmann. Engaging Amateurs in the Design, Fabrication, and Assembly of Electronic Devices. In Proceedings of the 2016 ACM Conference on Designing Interactive Systems.
  11. Pei-Yu (Peggy) Chi, Yang Li and Björn Hartmann. Enhancing Cross-Device Interaction Scripting with Interactive Illustrations. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems.
  12. Schoop, Eldon and Nguyen, Michelle and Lim, Daniel and Savage, Valkyrie and Follmer, Sean and Hartmann, Björn, Drill Sergeant: Supporting Physical Construction Projects Through an Ecosystem of Augmented Tools. In Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems.
  13. Daniel Drew, Julie Newcomb, William McGrath, Filip Maksimovic, David Mellis, Björn Hartmann, The Toastboard: Ubiquitous Instrumentation and Automated Checking of Breadboarded Circuits In Proceedings of the 28th Annual ACM Symposium on User Interface Software and Technology.
  14. Amit Levy and James Hong and Laurynas Riliskis and Philip Levis and Keith Winstein. Beetle: Flexible Communication for Bluetooth Low Energy. In Proceedings of the 14th International Conference on Mobile Systems, Applications and Services (MobiSys).
  15. Kevin Kiningham and Mark Horowitz and Philip Levis and Dan Boneh. CESEL: Securing a Mote for 20 Years. In Proceedings of the 13th European conference on Wireless sensor networks (EWSN 2016).
  16. Brown, Fraser and Nötzli, Andres and Engler, Dawson, How to Build Static Checking Systems Using Orders of Magnitude Less Code. In Proceedings of the Twenty-First International Conference on Architectural Support for Programming Languages and Operating Systems.
  17. David J. Wu and Ankur Taly and Asim Shankar and Dan Boneh, Privacy, Discovery, and Authentication for the Internet of Things. In European Symposium on Research in Computer Security (ESORICS).

2015

  1. Laurynas Riliskis and James Hong and Philip Levis, Ravel: Programming IoT Applications as Distributed Models, Views, and Controllers. In Proceedings of the he 2015 International Workshop on Internet of Things towards Applications (IoT-App'15).
  2. Joshua Adkins, Genevieve Flaspohler, and Prabal Dutta. Ving: Bootstrapping the Desktop Area Network with a Vibratory Ping. In 2015 ACM Workshop on Hot Topics in Wireless.
  3. Ali Jose Mashtizadeh, Andrea Bittau, David Mazieres, and Dan Boneh.
    Cryptographically Enforced Control Flow Integrity. In Proceedings of the 22nd ACM Conference on Computer and Communications Security (ACM CCS 2015).
  4. Dan. Boneh, K. Lewi, M. Raykova, A. Sahai, M. Zhandry, and J. Zimmerman.
    Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation. In Proceedings of the 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2015)
  5. Dan. Boneh, D. Gupta, I. Mironov, and A. Sahai.
    Hosting Services on an Untrusted Cloud. In Proceedings of the 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2015)
  6. Justine Sherry, Chang Lan, Raluca Ada Popa, and Sylvia Ratnasamy.
    BlindBox: Deep Packet Inspection for Encrypted Traffic. In Proceedings of SIGCOMM 2015.
  7. Raphael Bost, Raluca Ada Popa, Stephen Tu, and Shafi Goldwasser.
    Machine Learning Classification Over Encrypted Data. In Proceedings of the 2015 Network and Distributed System Security Symposium (NDSS 2015).
  8. Amit Levy, Michael P Andersen, Bradford Campbell, David Culler, Prabal Dutta, Branden Ghena, Philip Levis and Pat Pannuto.
    Ownership is Theft: Experiences Building an Embedded OS in Rust. In Proceedings of the 8th Workshop on Programming Languages and Operating Systems (PLOS 2015).
  9. Valkyrie Savage, Sean Follmer, Jingyi Li, and Björn Hartmann,
    Makers-Marks: Physical Markup for Designing and Fabricating Functional Objects. In Proceedings of UIST 2015: ACM Symposium on User Interface Software and Technology.
  10. Will McGrath, Mozziyar Etemadi, Shuvo Roy and Björn Hartmann.
    fabryq: Using Phones as Gateways to Prototype Internet of Things Applications using Web Scripting. In Proceedings of the 7th ACM SIGCHI Symposium on Engineering Interactive Computing Systems (EICS 2015).
  11. Pat Pannuto, Yoonmyung Lee, Ye-sheng Kuo, Zhi Yoong Foo, Ben Kempke, Gyouho Kim, Ronald Dreslinski Jr., David Blaauw, and Prabal Dutta.
    MBus: An Ultra-Low Power Interconnect Bus for Next Generation Nanopower Systems. In Proceedings of the 42nd International Symposium on Computer Architecture (ISCA '15).
  12. Thomas Zachariah, Noah Klugman, Bradford Campbell, Josh Adkins, Neal Jackson, and Prabal Dutta.
    The Internet of Things has a Gateway Problem. In Proceedings of the 16th International Workshop on Mobile Computing Systems and Applications (HotMobile '15).
  13. Benjamin Kempke, Pat Pannuto, and Prabal Dutta.
    PolyPoint: Guiding Indoor Quadrotors with Ultra-Wideband Localization. In Proceedings of the 2nd ACM Workshop on Hot Topics in Wireless (HotWireless'15).
  14. Meghan Clark and Prabal Dutta.
    The Haunted House: Networking Smart Homes to Enable Casual Long-Distance Social Interactions. In Proceedings of the 2015 International Workshop on Internet of Things towards Applications (IoT-App '15).
  15. Samuel DeBruin, Branden Ghena, Ye-Sheng Kuo, and Prabal Dutta.
    PowerBlade: A Low-Profile, True-Power, Plug-Through Energy Meter. In Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems (Sensys '15).
  16. Byong Chan Lim, J. Maho, Mark Horowitz, Ji-Eun Jang, and Jaeha Kim.
    Digital Analog Design: Enabling Mixed-Signal System Validation. In IEEE Design & Test 32 (1), 44-52, 2015.