default search action
Marten van Dijk
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j42]Zheng Yang, Chenglu Jin, Xuelian Cao, Marten van Dijk, Jianying Zhou:
Optimizing Proof of Aliveness in Cyber-Physical Systems. IEEE Trans. Dependable Secur. Comput. 21(4): 3610-3628 (2024) - [c79]Chenglu Jin, Chao Yin, Marten van Dijk, Sisi Duan, Fabio Massacci, Michael K. Reiter, Haibin Zhang:
PG: Byzantine Fault-Tolerant and Privacy-Preserving Sensor Fusion with Guaranteed Output Delivery. CCS 2024: 3272-3286 - [c78]Zachary DiMeglio, Jenna Bustami, Deniz Gurevin, Chenglu Jin, Marten van Dijk, Omer Khan:
Masked Memory Primitive for Key Insulated Schemes. HOST 2024: 293-303 - [c77]Marten van Dijk, Nhuong V. Nguyen, Toan N. Nguyen, Lam M. Nguyen, Phuong Ha Nguyen:
Proactive DP: A Multiple Target Optimization Framework for DP-SGD. ICML 2024 - [i70]Chaoyi Zhu, Jiayi Tang, Hans Brouwer, Juan F. Pérez, Marten van Dijk, Lydia Y. Chen:
Quantifying and Mitigating Privacy Risks for Tabular Generative Models. CoRR abs/2403.07842 (2024) - [i69]Chenglu Jin, Marten van Dijk:
A Framework for the Analysis of Physical Unclonable Function Interfaces. ERCIM News 139(138) (2024) - 2023
- [j41]Marten van Dijk, Chenglu Jin:
A Theoretical Framework for the Analysis of Physical Unclonable Function Interfaces and Its Relation to the Random Oracle Model. J. Cryptol. 36(4): 35 (2023) - [i68]Marten van Dijk, Phuong Ha Nguyen:
Considerations on the Theory of Training Models with Differential Privacy. CoRR abs/2303.04676 (2023) - [i67]Toan N. Nguyen, Phuong Ha Nguyen, Lam M. Nguyen, Marten van Dijk:
Batch Clipping and Adaptive Layerwise Clipping for Differential Private Stochastic Gradient Descent. CoRR abs/2307.11939 (2023) - [i66]Niloufar Sayadi, Phuong Ha Nguyen, Marten van Dijk, Chenglu Jin:
Breaking XOR Arbiter PUFs without Reliability Information. CoRR abs/2312.01256 (2023) - [i65]Reza Rahaeimehr, Marten van Dijk:
Recursive Augmented Fernet (RAF) Token: Alleviating the Pain of Stolen Tokens. CoRR abs/2312.08086 (2023) - 2022
- [j40]Kaleel Mahmood, Rigel Mahmood, Ethan Rathbun, Marten van Dijk:
Back in Black: A Comparative Evaluation of Recent State-Of-The-Art Black-Box Attacks. IEEE Access 10: 998-1019 (2022) - [j39]Kaleel Mahmood, Phuong Ha Nguyen, Lam M. Nguyen, Thanh Nguyen, Marten van Dijk:
Besting the Black-Box: Barrier Zones for Adversarial Example Defense. IEEE Access 10: 1451-1474 (2022) - [j38]Lam M. Nguyen, Marten van Dijk, Dzung T. Phan, Phuong Ha Nguyen, Tsui-Wei Weng, Jayant R. Kalagnanam:
Finite-sum smooth optimization with SARAH. Comput. Optim. Appl. 82(3): 561-593 (2022) - [j37]Chenglu Jin, Wayne P. Burleson, Marten van Dijk, Ulrich Rührmair:
Programmable access-controlled and generic erasable PUF design and its applications. J. Cryptogr. Eng. 12(4): 413-432 (2022) - [j36]Yansong Gao, Marten van Dijk, Lei Xu, Wei Yang, Surya Nepal, Damith C. Ranasinghe:
TREVERSE: TRial-and-Error Lightweight Secure ReVERSE Authentication With Simulatable PUFs. IEEE Trans. Dependable Secur. Comput. 19(1): 419-437 (2022) - [c76]Marten van Dijk:
Towards Remote Verifiable Computation without Digital Secrets. ASHES@CCS 2022: 1 - [c75]Marten van Dijk, Francesco Regazzoni:
CCSW '22: The 2022 Cloud Computing Security Workshop. CCS 2022: 3541-3542 - [e2]Francesco Regazzoni, Marten van Dijk:
Proceedings of the 2022 on Cloud Computing Security Workshop, CCSW 2022, Los Angeles, CA, USA, 7 November 2022. ACM 2022, ISBN 978-1-4503-9875-6 [contents] - [i64]Deniz Gurevin, Chenglu Jin, Phuong Ha Nguyen, Omer Khan, Marten van Dijk:
Secure Remote Attestation with Strong Key Insulation Guarantees. CoRR abs/2201.01834 (2022) - [i63]Lam M. Nguyen, Trang H. Tran, Marten van Dijk:
Finite-Sum Optimization: A New Perspective for Convergence to a Global Solution. CoRR abs/2202.03524 (2022) - [i62]Ethan Rathbun, Kaleel Mahmood, Sohaib Ahmad, Caiwen Ding, Marten van Dijk:
Game Theoretic Mixed Experts for Combinational Adversarial Machine Learning. CoRR abs/2211.14669 (2022) - [i61]Marten van Dijk, Phuong Ha Nguyen, Toan N. Nguyen, Lam M. Nguyen:
Generalizing DP-SGD with Shuffling and Batching Clipping. CoRR abs/2212.05796 (2022) - [i60]Marten van Dijk, Chenglu Jin:
A Theoretical Framework for the Analysis of Physical Unclonable Function Interfaces and its Relation to the Random Oracle Model. IACR Cryptol. ePrint Arch. 2022: 1069 (2022) - 2021
- [j35]Kaleel Mahmood, Deniz Gurevin, Marten van Dijk, Phuoung Ha Nguyen:
Beware the Black-Box: On the Robustness of Recent Defenses to Adversarial Examples. Entropy 23(10): 1359 (2021) - [j34]Lam M. Nguyen, Quoc Tran-Dinh, Dzung T. Phan, Phuong Ha Nguyen, Marten van Dijk:
A Unified Convergence Analysis for Shuffling-Type Gradient Methods. J. Mach. Learn. Res. 22: 207:1-207:44 (2021) - [c74]Nhuong V. Nguyen, Toan N. Nguyen, Phuong Ha Nguyen, Quoc Tran-Dinh, Lam M. Nguyen, Marten van Dijk:
Hogwild! over Distributed Local Data Sets with Linearly Increasing Mini-Batch Sizes. AISTATS 2021: 1207-1215 - [c73]Kaleel Mahmood, Rigel Mahmood, Marten van Dijk:
On the Robustness of Vision Transformers to Adversarial Examples. ICCV 2021: 7818-7827 - [e1]Yinqian Zhang, Marten van Dijk:
CCSW@CCS '21: Proceedings of the 2021 on Cloud Computing Security Workshop, Virtual Event, Republic of Korea, 15 November 2021. ACM 2021, ISBN 978-1-4503-8653-1 [contents] - [i59]Marten van Dijk, Nhuong V. Nguyen, Toan N. Nguyen, Lam M. Nguyen, Phuong Ha Nguyen:
Differential Private Hogwild! over Distributed Local Data Sets. CoRR abs/2102.09030 (2021) - [i58]Kaleel Mahmood, Rigel Mahmood, Marten van Dijk:
On the Robustness of Vision Transformers to Adversarial Examples. CoRR abs/2104.02610 (2021) - [i57]Kaleel Mahmood, Rigel Mahmood, Ethan Rathbun, Marten van Dijk:
Back in Black: A Comparative Evaluation of Recent State-Of-The-Art Black-Box Attacks. CoRR abs/2109.15031 (2021) - [i56]Marten van Dijk, Deniz Gurevin, Chenglu Jin, Omer Khan, Phuong Ha Nguyen:
Autonomous Secure Remote Attestation even when all Used and to be Used Digital Keys Leak. IACR Cryptol. ePrint Arch. 2021: 602 (2021) - [i55]Marten van Dijk, Deniz Gurevin, Chenglu Jin, Omer Khan, Phuong Ha Nguyen:
Bilinear Map Based One-Time Signature Scheme with Secret Key Exposure. IACR Cryptol. ePrint Arch. 2021: 925 (2021) - 2020
- [j33]Emil Stefanov, Marten van Dijk, Elaine Shi, Christopher W. Fletcher, Ling Ren, Xiangyao Yu, Srinivas Devadas:
A Retrospective on Path ORAM. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 39(8): 1572-1576 (2020) - [j32]Nils Wisiol, Christopher Mühl, Niklas Pirnay, Phuong Ha Nguyen, Marian Margraf, Jean-Pierre Seifert, Marten van Dijk, Ulrich Rührmair:
Splitting the Interpose PUF: A Novel Modeling Attack Strategy. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(3): 97-120 (2020) - [j31]Tara Merin John, Syed Kamran Haider, Hamza Omar, Marten van Dijk:
Connecting the Dots: Privacy Leakage via Write-Access Patterns to the Main Memory. IEEE Trans. Dependable Secur. Comput. 17(2): 436-442 (2020) - [c72]Nhan H. Pham, Lam M. Nguyen, Dzung T. Phan, Phuong Ha Nguyen, Marten van Dijk, Quoc Tran-Dinh:
A Hybrid Stochastic Policy Gradient Algorithm for Reinforcement Learning. AISTATS 2020: 374-385 - [c71]Chenglu Jin, Wayne P. Burleson, Marten van Dijk, Ulrich Rührmair:
Erasable PUFs: Formal Treatment and Generic Design. ASHES@CCS 2020: 21-33 - [c70]Ran Canetti, Marten van Dijk, Hoda Maleki, Ulrich Rührmair, Patrick Schaumont:
Using Universal Composition to Design and Analyze Secure Complex Hardware Systems. DATE 2020: 520-525 - [i54]Lam M. Nguyen, Quoc Tran-Dinh, Dzung T. Phan, Phuong Ha Nguyen, Marten van Dijk:
A Unified Convergence Analysis for Shuffling-Type Gradient Methods. CoRR abs/2002.08246 (2020) - [i53]Nhan H. Pham, Lam M. Nguyen, Dzung T. Phan, Phuong Ha Nguyen, Marten van Dijk, Quoc Tran-Dinh:
A Hybrid Stochastic Policy Gradient Algorithm for Reinforcement Learning. CoRR abs/2003.00430 (2020) - [i52]Kaleel Mahmood, Deniz Gurevin, Marten van Dijk, Phuong Ha Nguyen:
Beware the Black-Box: on the Robustness of Recent Defenses to Adversarial Examples. CoRR abs/2006.10876 (2020) - [i51]Marten van Dijk, Nhuong V. Nguyen, Toan N. Nguyen, Lam M. Nguyen, Quoc Tran-Dinh, Phuong Ha Nguyen:
Asynchronous Federated Learning with Reduced Number of Rounds and with Differential Privacy from Less Aggregated Gaussian Noise. CoRR abs/2007.09208 (2020) - [i50]Marten van Dijk, Nhuong V. Nguyen, Toan N. Nguyen, Lam M. Nguyen, Quoc Tran-Dinh, Phuong Ha Nguyen:
Hogwild! over Distributed Local Data Sets with Linearly Increasing Mini-Batch Sizes. CoRR abs/2010.14763 (2020)
2010 – 2019
- 2019
- [j30]Syed Kamran Haider, Marten van Dijk:
Flat ORAM: A Simplified Write-Only Oblivious RAM Construction for Secure Processors. Cryptogr. 3(1): 10 (2019) - [j29]Lam M. Nguyen, Phuong Ha Nguyen, Peter Richtárik, Katya Scheinberg, Martin Takác, Marten van Dijk:
New Convergence Aspects of Stochastic Gradient Algorithms. J. Mach. Learn. Res. 20: 176:1-176:49 (2019) - [j28]Phuong Ha Nguyen, Durga Prasad Sahoo, Chenglu Jin, Kaleel Mahmood, Ulrich Rührmair, Marten van Dijk:
The Interpose PUF: Secure PUF Design against State-of-the-art Machine Learning Attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(4): 243-290 (2019) - [j27]Syed Kamran Haider, Chenglu Jin, Masab Ahmad, Devu Manikantan Shila, Omer Khan, Marten van Dijk:
Advancing the State-of-the-Art in Hardware Trojans Detection. IEEE Trans. Dependable Secur. Comput. 16(1): 18-32 (2019) - [j26]Chenglu Jin, Marten van Dijk:
Secure and Efficient Initialization and Authentication Protocols for SHIELD. IEEE Trans. Dependable Secur. Comput. 16(1): 156-173 (2019) - [j25]Ling Ren, Christopher W. Fletcher, Albert Kwon, Marten van Dijk, Srinivas Devadas:
Design and Implementation of the Ascend Secure Processor. IEEE Trans. Dependable Secur. Comput. 16(2): 204-216 (2019) - [j24]Chip-Hong Chang, Marten van Dijk, Ulrich Rührmair, Mark M. Tehranipoor:
Emerging Attacks and Solutions for Secure Hardware in the Internet of Things. IEEE Trans. Dependable Secur. Comput. 16(3): 373-375 (2019) - [c69]Chenglu Jin, Zheng Yang, Marten van Dijk, Jianying Zhou:
Proof of aliveness. ACSAC 2019: 1-16 - [c68]Saeed Valizadeh, Marten van Dijk:
MalPro: A Learning-based Malware Propagation and Containment Modeling. CCSW 2019: 45-56 - [c67]Marten van Dijk, Lam M. Nguyen, Phuong Ha Nguyen, Dzung T. Phan:
Characterization of Convex Objective Functions and Optimal Expected Convergence Rates for SGD. ICML 2019: 6392-6400 - [c66]Ali Shuja Siddiqui, Geraldine Shirley, Sam Reji Joseph, Yutian Gui, Jim Plusquellic, Marten van Dijk, Fareena Saqib:
Multilayer Camouflaged Secure Boot for SoCs. MTV 2019: 56-61 - [c65]Phuong Ha Nguyen, Lam M. Nguyen, Marten van Dijk:
Tight Dimension Independent Lower Bound on the Expected Convergence Rate for Diminishing Step Sizes in SGD. NeurIPS 2019: 3660-3669 - [c64]Kyle Hogan, Hoda Maleki, Reza Rahaeimehr, Ran Canetti, Marten van Dijk, Jason Hennessey, Mayank Varia, Haibin Zhang:
On the Universally Composable Security of OpenStack. SecDev 2019: 20-33 - [i49]Saeed Valizadeh, Marten van Dijk:
Toward a Theory of Cyber Attacks. CoRR abs/1901.01598 (2019) - [i48]Lam M. Nguyen, Marten van Dijk, Dzung T. Phan, Phuong Ha Nguyen, Tsui-Wei Weng, Jayant R. Kalagnanam:
Optimal Finite-Sum Smooth Non-Convex Optimization with SARAH. CoRR abs/1901.07648 (2019) - [i47]Saeed Valizadeh, Marten van Dijk:
On the Convergence Rates of Learning-based Signature Generation Schemes to Contain Self-propagating Malware. CoRR abs/1905.00154 (2019) - [i46]Phuong Ha Nguyen, Kaleel Mahmood, Lam M. Nguyen, Thanh Nguyen, Marten van Dijk:
BUZz: BUffer Zones for defending adversarial examples in image classification. CoRR abs/1910.02785 (2019) - [i45]Nils Wisiol, Christopher Mühl, Niklas Pirnay, Phuong Ha Nguyen, Marian Margraf, Jean-Pierre Seifert, Marten van Dijk, Ulrich Rührmair:
Splitting the Interpose PUF: A Novel Modeling Attack Strategy. IACR Cryptol. ePrint Arch. 2019: 1473 (2019) - 2018
- [j23]Emil Stefanov, Marten van Dijk, Elaine Shi, T.-H. Hubert Chan, Christopher W. Fletcher, Ling Ren, Xiangyao Yu, Srinivas Devadas:
Path ORAM: An Extremely Simple Oblivious RAM Protocol. J. ACM 65(4): 18:1-18:26 (2018) - [c63]Marten van Dijk, Chenglu Jin, Hoda Maleki, Phuong Ha Nguyen, Reza Rahaeimehr:
Weak-Unforgeable Tags for Secure Supply Chain Management. Financial Cryptography 2018: 80-98 - [c62]Hamza Omar, Syed Kamran Haider, Ling Ren, Marten van Dijk, Omer Khan:
Breaking the Oblivious-RAM Bandwidth Wall. ICCD 2018: 115-122 - [c61]Lam M. Nguyen, Phuong Ha Nguyen, Marten van Dijk, Peter Richtárik, Katya Scheinberg, Martin Takác:
SGD and Hogwild! Convergence Without the Bounded Gradients Assumption. ICML 2018: 3747-3755 - [c60]Chenglu Jin, Saeed Valizadeh, Marten van Dijk:
Snapshotter: Lightweight intrusion detection and prevention system for industrial control systems. ICPS 2018: 824-829 - [i44]Lam M. Nguyen, Phuong Ha Nguyen, Marten van Dijk, Peter Richtárik, Katya Scheinberg, Martin Takác:
SGD and Hogwild! Convergence Without the Bounded Gradients Assumption. CoRR abs/1802.03801 (2018) - [i43]Syed Kamran Haider, Chenglu Jin, Marten van Dijk:
Comments on "Defeating HaTCh: Building Malicious IP Cores". CoRR abs/1804.04783 (2018) - [i42]Yansong Gao, Marten van Dijk, Lei Xu, Surya Nepal, Damith Chinthana Ranasinghe:
TREVERSE: Trial-and-Error Lightweight Secure Reverse Authentication with Simulatable PUFs. CoRR abs/1807.11046 (2018) - [i41]Marten van Dijk, Lam M. Nguyen, Phuong Ha Nguyen, Dzung T. Phan:
Characterization of Convex Objective Functions and Optimal Expected Convergence Rates for SGD. CoRR abs/1810.04100 (2018) - [i40]Phuong Ha Nguyen, Lam M. Nguyen, Marten van Dijk:
Tight Dimension Independent Lower Bound on Optimal Expected Convergence Rate for Diminishing Step Sizes in SGD. CoRR abs/1810.04723 (2018) - [i39]Lam M. Nguyen, Phuong Ha Nguyen, Peter Richtárik, Katya Scheinberg, Martin Takác, Marten van Dijk:
New Convergence Aspects of Stochastic Gradient Algorithms. CoRR abs/1811.12403 (2018) - [i38]Phuong Ha Nguyen, Durga Prasad Sahoo, Chenglu Jin, Kaleel Mahmood, Ulrich Rührmair, Marten van Dijk:
The Interpose PUF: Secure PUF Design against State-of-the-art Machine Learning Attacks. IACR Cryptol. ePrint Arch. 2018: 350 (2018) - [i37]Yansong Gao, Chenglu Jin, Jeeson Kim, Hussein Nili, Xiaolin Xu, Wayne P. Burleson, Omid Kavehei, Marten van Dijk, Damith Chinthana Ranasinghe, Ulrich Rührmair:
Efficient Erasable PUFs from Programmable Logic and Memristors. IACR Cryptol. ePrint Arch. 2018: 358 (2018) - [i36]Kyle Hogan, Hoda Maleki, Reza Rahaeimehr, Ran Canetti, Marten van Dijk, Jason Hennessey, Mayank Varia, Haibin Zhang:
On the Universally Composable Security of OpenStack. IACR Cryptol. ePrint Arch. 2018: 602 (2018) - [i35]Chenglu Jin, Marten van Dijk, Michael K. Reiter, Haibin Zhang:
PwoP: Intrusion-Tolerant and Privacy-Preserving Sensor Fusion. IACR Cryptol. ePrint Arch. 2018: 1171 (2018) - 2017
- [j22]Chenglu Jin, Charles Herder, Ling Ren, Phuong Ha Nguyen, Benjamin Fuller, Srinivas Devadas, Marten van Dijk:
FPGA Implementation of a Cryptographically-Secure PUF Based on Learning Parity with Noise. Cryptogr. 1(3): 23 (2017) - [j21]Charles Herder, Ling Ren, Marten van Dijk, Meng-Day (Mandel) Yu, Srinivas Devadas:
Trapdoor Computational Fuzzy Extractors and Stateless Cryptographically-Secure Physical Unclonable Functions. IEEE Trans. Dependable Secur. Comput. 14(1): 65-82 (2017) - [c59]Hoda Maleki, Reza Rahaeimehr, Marten van Dijk:
SoK: RFID-based Clone Detection Mechanisms for Supply Chains. ASHES@CCS 2017: 33-41 - [c58]Chip-Hong Chang, Marten van Dijk, Farinaz Koushanfar, Ulrich Rührmair, Mark M. Tehranipoor:
ASHES 2017: Workshop on Attacks and Solutions in Hardware Security. CCS 2017: 2623-2625 - [c57]Chenglu Jin, Lingyu Ren, Xubin Liu, Peng Zhang, Marten van Dijk:
Mitigating Synchronized Hardware Trojan Attacks in Smart Grids. SPSR-SG@CPSWeek 2017: 35-40 - [c56]Hoda Maleki, Reza Rahaeimehr, Chenglu Jin, Marten van Dijk:
New clone-detection approach for RFID-based supply chains. HOST 2017: 122-127 - [c55]Tara Merin John, Syed Kamran Haider, Hamza Omar, Marten van Dijk:
Connecting the dots: Privacy leakage via write-access patterns to the main memory. HOST 2017: 170 - [c54]Syed Kamran Haider, Chenglu Jin, Marten van Dijk:
Advancing the state-of-the-art in hardware Trojans design. MWSCAS 2017: 823-826 - [c53]Syed Kamran Haider, Hamza Omar, Ilia A. Lebedev, Srinivas Devadas, Marten van Dijk:
Leveraging Hardware Isolation for Process Level Access Control & Authentication. SACMAT 2017: 133-141 - [i34]Tara Merin John, Syed Kamran Haider, Hamza Omar, Marten van Dijk:
Connecting the Dots: Privacy Leakage via Write-Access Patterns to the Main Memory. CoRR abs/1702.03965 (2017) - [i33]Raihan Sayeed Khan, Nadim Kanan, Chenglu Jin, Jake Scoggin, Nafisa Noor, Sadid Muneer, Faruk Dirisaglik, Phuong Ha Nguyen, Helena Silva, Marten van Dijk, Ali Gokirmak:
Intrinsically Reliable and Lightweight Physical Obfuscated Keys. CoRR abs/1703.07427 (2017) - [i32]Syed Kamran Haider, Marten van Dijk:
Revisiting Definitional Foundations of Oblivious RAM for Secure Processor Implementations. CoRR abs/1706.03852 (2017) - [i31]Charles Herder, Benjamin Fuller, Marten van Dijk, Srinivas Devadas:
Public Key Cryptosystems with Noisy Secret Keys. IACR Cryptol. ePrint Arch. 2017: 210 (2017) - [i30]Phuong Ha Nguyen, Durga Prasad Sahoo, Chenglu Jin, Kaleel Mahmood, Marten van Dijk:
MXPUF: Secure PUF Design against State-of-the-art Modeling Attacks. IACR Cryptol. ePrint Arch. 2017: 572 (2017) - [i29]Marten van Dijk, Chenglu Jin, Hoda Maleki, Phuong Ha Nguyen, Reza Rahaeimehr:
Weak-Unforgeable Tags for Secure Supply Chain Management. IACR Cryptol. ePrint Arch. 2017: 1221 (2017) - 2016
- [c52]Hoda Maleki, Saeed Valizadeh, William Koch, Azer Bestavros, Marten van Dijk:
Markov Modeling of Moving Target Defense Games. MTD@CCS 2016: 81-92 - [c51]Srinivas Devadas, Marten van Dijk, Christopher W. Fletcher, Ling Ren, Elaine Shi, Daniel Wichs:
Onion ORAM: A Constant Bandwidth Blowup Oblivious RAM. TCC (A2) 2016: 145-174 - [i28]Syed Kamran Haider, Chenglu Jin, Marten van Dijk:
Advancing the State-of-the-Art in Hardware Trojans Design. CoRR abs/1605.08413 (2016) - [i27]Syed Kamran Haider, Marten van Dijk:
Flat ORAM: A Simplified Write-Only Oblivious RAM Construction for Secure Processor Architectures. CoRR abs/1611.01571 (2016) - [i26]Hoda Maleki, Reza Rahaeimehr, Marten van Dijk:
LightSource: Ultra Lightweight Clone Detection of RFID Tags from Software Unclonable Responses. IACR Cryptol. ePrint Arch. 2016: 608 (2016) - [i25]Mohammad Hadi Valizadeh, Hoda Maleki, William Koch, Azer Bestavros, Marten van Dijk:
Markov Modeling of Moving Target Defense Games. IACR Cryptol. ePrint Arch. 2016: 741 (2016) - 2015
- [c50]Christopher W. Fletcher, Ling Ren, Albert Kwon, Marten van Dijk, Srinivas Devadas:
Freecursive ORAM: [Nearly] Free Recursion and Integrity Verification for Position-based Oblivious RAM. ASPLOS 2015: 103-116 - [c49]Marten van Dijk:
Hardware Security and its Adversaries. TrustED@CCS 2015: 1-2 - [c48]Christopher W. Fletcher, Ling Ren, Albert Kwon, Marten van Dijk, Emil Stefanov, Dimitrios N. Serpanos, Srinivas Devadas:
A Low-Latency, Low-Area Hardware Oblivious RAM Controller. FCCM 2015: 215-222 - [c47]Viktoria Grindle, Syed Kamran Haider, John Magee, Marten van Dijk:
Virtual Fingerprint - Image-Based Authentication Increases Privacy for Users of Mouse-Replacement Interfaces. HCI (10) 2015: 182-191 - [c46]Syed Kamran Haider, Masab Ahmad, Farrukh Hijaz, Astha Patni, Ethan Johnson, Matthew Seita, Omer Khan, Marten van Dijk:
M-MAP: Multi-factor memory authentication for secure embedded processors. ICCD 2015: 471-474 - [c45]Masab Ahmad, Syed Kamran Haider, Farrukh Hijaz, Marten van Dijk, Omer Khan:
Exploring the performance implications of memory safety primitives in many-core processors executing multi-threaded workloads. HASP@ISCA 2015: 6:1-6:8 - [c44]Xiangyao Yu, Syed Kamran Haider, Ling Ren, Christopher W. Fletcher, Albert Kwon, Marten van Dijk, Srinivas Devadas:
PrORAM: dynamic prefetcher for oblivious RAM. ISCA 2015: 616-628 - [c43]Ling Ren, Christopher W. Fletcher, Albert Kwon, Emil Stefanov, Elaine Shi, Marten van Dijk, Srinivas Devadas:
Constants Count: Practical Improvements to Oblivious RAM. USENIX Security Symposium 2015: 415-430 - [i24]Srinivas Devadas, Marten van Dijk, Christopher W. Fletcher, Ling Ren:
Onion ORAM: A Constant Bandwidth and Constant Client Storage ORAM (without FHE or SWHE). IACR Cryptol. ePrint Arch. 2015: 5 (2015) - [i23]Chenglu Jin, Marten van Dijk:
Secure and Efficient Initialization and Authentication Protocols for SHIELD. IACR Cryptol. ePrint Arch. 2015: 210 (2015) - [i22]Syed Kamran Haider, Masab Ahmad, Farrukh Hijaz, Astha Patni, Ethan Johnson, Matthew Seita, Omer Khan, Marten van Dijk:
M-MAP: Multi-Factor Memory Authentication for Secure Embedded Processors. IACR Cryptol. ePrint Arch. 2015: 831 (2015) - [i21]Chenglu Jin, Xiaolin Xu, Wayne P. Burleson, Ulrich Rührmair, Marten van Dijk:
PLayPUF: Programmable Logically Erasable PUFs for Forward and Backward Secure Key Management. IACR Cryptol. ePrint Arch. 2015: 1052 (2015) - 2014
- [c42]Marten van Dijk, Ulrich Rührmair:
Protocol attacks on advanced PUF protocols and countermeasures. DATE 2014: 1-6 - [c41]Christopher W. Fletcher, Ling Ren, Xiangyao Yu, Marten van Dijk, Omer Khan, Srinivas Devadas:
Suppressing the Oblivious RAM timing channel while making information leakage and program efficiency trade-offs. HPCA 2014: 213-224 - [c40]G. Edward Suh, Christopher W. Fletcher, Dwaine E. Clarke, Blaise Gassend, Marten van Dijk, Srinivas Devadas:
Author retrospective AEGIS: architecture for tamper-evident and tamper-resistant processing. ICS 25th Anniversary 2014: 68-70 - [c39]Marten van Dijk, Uli Rührmair:
PUF Interfaces and their Security. ISVLSI 2014: 25-28 - [i20]Ling Ren, Christopher W. Fletcher, Xiangyao Yu, Albert Kwon, Marten van Dijk, Srinivas Devadas:
Unified Oblivious-RAM: Improving Recursive ORAM with Locality and Pseudorandomness. IACR Cryptol. ePrint Arch. 2014: 205 (2014) - [i19]Xiangyao Yu, Ling Ren, Christopher W. Fletcher, Albert Kwon, Marten van Dijk, Srinivas Devadas:
Enhancing Oblivious RAM Performance Using Dynamic Prefetching. IACR Cryptol. ePrint Arch. 2014: 234 (2014) - [i18]Christopher W. Fletcher, Ling Ren, Albert Kwon, Marten van Dijk, Emil Stefanov, Srinivas Devadas:
RAW Path ORAM: A Low-Latency, Low-Area Hardware ORAM Controller with Integrity Verification. IACR Cryptol. ePrint Arch. 2014: 431 (2014) - [i17]Charles Herder, Ling Ren, Marten van Dijk, Meng-Day (Mandel) Yu, Srinivas Devadas:
Trapdoor Computational Fuzzy Extractors. IACR Cryptol. ePrint Arch. 2014: 938 (2014) - [i16]Syed Kamran Haider, Chenglu Jin, Masab Ahmad, Devu Manikantan Shila, Omer Khan, Marten van Dijk:
HaTCh: Hardware Trojan Catcher. IACR Cryptol. ePrint Arch. 2014: 943 (2014)