Ari Juels [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts 27thUsenixSecuritySymposium-2018 - Vancouver, Canada
DelegaTEE: Brokered Delegation Using Trusted Execution Environments 27thUsenixSecuritySymposium-2018 - Vancouver, Canada
Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts 27thUsenixSecuritySymposium-2018 - Vancouver, Canada
DelegaTEE: Brokered Delegation Using Trusted Execution Environments 27thUsenixSecuritySymposium-2018 - Vancouver, Canada
ROTE: Rollback Protection for Trusted Execution usenixsecurity-2017 - vancouver,canada
REM: Resource-Efficient Mining for Blockchains usenixsecurity-2017 - vancouver,canada
Sealed-Glass Proofs: Using Transparent Enclaves to Prove and Sell Knowledge EuroSP-2017 - paris,france
FairTest: Discovering Unwarranted Associations in Data-Driven Applications EuroSP-2017 - paris,france
Stealing Machine Learning Models via Prediction APIs USENIX-2016 - austin,usa
Pass: Strengthening and Democratizing Enterprise Password Hardening RWC-2016 - stanford,usa
The Pythia PRF Service SecuritySymposium-2015 - washington,USA
A Formal Treatment of Backdoored Pseudorandom Generators EuroCrypt-2015 - Soia,Bulgaria
A Visitor's Guide to a Post-Privacy World CCSW-2014 - Arizona,USA
Cross-Tenant Side-Channel Attacks in PaaS Clouds CCS-2014 - Scottsdale,USA
An Epidemiological Study of Malware Encounters in a Large Enterprise CCS-2014 - Scottsdale,USA
PillarBox: Combating Next-Generation Malware with Fast Forward-Secure Logging Raid-2014 - gottenburg,sweden
Honey Encryption: Security Beyond the Brute-Force Bound EuroCrypt-2014 - copenhagen,denmark
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterprise Networks ACSAC-2013 - New Orleans, USA
Sherlock Holmes and the Case of the Advanced Persistent Threat 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats-2012 - San Francisco, USA Advanced Persistent Threat
How to Tell if Your Cloud Files Are Vulnerable to Drive Crashes Confrence-on-computer-communications-security-2011 - Chicago, USA
On The Impossibility Of Cryptography Alone For Privacy-Preserving Cloud Computing 5th USENIX Workshop on Hot Topics in Security-2010 - Washington DC, USA Security
Cccp: Secure Remote Storage For Computational Rfids 18th USENIX Security Symposium-2009 - Montreal, Canada Security
Keynote: The Cryptographer's Panel RSA-2009 - San Francisco,USA
Unidirectional Key Distribution Across Time And Space With Applications To Rfid Security 17th USENIX Security Symposium-2008 - San Jose, USA Security
Combating Click Fraud Via Premium Clicks 16th USENIX Security Symposium-2007 - Boston, USA Security
Security Analysis Of A Cryptographically-Enabled Rfid Device 14th USENIX Security Symposium-2005 - Baltimore, USA Security Analysis
Rfid: Security And Privacy For Five-Cent Computers 13th USENIX Security Symposium-2004 - San Diego, USA Security Privacy
A New Two-Server Approach For Authentication With Short Secrets 12th USENIX Security Symposium-2003 - Washington DC, USA Security