Our Publications
242 results
2019
2018
Networking in Heaven as on Earth.
Tobias Klenze, Giacomo Giuliari, Christos Pappas, Adrian Perrig and David Basin.
In Proceedings of the ACM Workshop on Hot Topics in Networks (HotNets) 2018.
BlockPKI: An Automated, Resilient, and Transparent Public-Key Infrastructure.
Lukasz Dykcik, Laurent Chuat, Pawel Szalachowski and Adrian Perrig.
In Workshop on Blockchain and Sharing Economy Applications (BlockSEA) 2018.
Research Area: Public Key Infrastructures
Three Bits Suffice: Efficient Support for Passive Two-Way Latency Measurement in QUIC and TCP.
Piet De Vaere, Tobias Bühler, Mirja Kühlewind and Brian Trammel.
In Proceedings of the Internet Measurement Conference 2018.
Secure Opportunistic Multipath Key Exchange.
Sergiu Costea, Marios O. Choudary, Doru Gucea, Björn Tackmann and Costin Raiciu.
In Proceedings of the ACM Conference on Computer and Communications Security (CCS) 2018.
Alcatraz: Data Exfiltration-Resilient Corporate Network Architecture.
Daniele E. Asoni, Takayuki Sasaki and Adrian Perrig.
In 4th IEEE International Conference on Collaboration and Internet Computing (CIC) 2018.
SAFES: Sand-boxed Architecture for Frequent Environment Self-measurement.
Toshiki Kobayashi, Takayuki Sasaki, Astha Jada, Daniele E. Asoni and Adrian Perrig.
In 3rd Workshop on System Software for Trusted Execution (SysTEX) 2018.
Bootstrapping Privacy Services in Today's Internet.
Taeho Lee, Christos Pappas and Adrian Perrig.
In ACM SIGCOMM Computer Comunication Review (CCR) 48 (5) 2018.
CLEF: Limiting the Damage Caused by Large Flows in the Internet Core.
Hao Wu, Hsu-Chun Hsiao, Daniele E. Asoni, Simon Scherrer, Adrian Perrig and Yih-Chun Hu.
In International Conference on Cryptology and Network Security (CANS) 2018. (arXiv version:1807.05652)
Towards Sustainable Evolution for the TLS Public-Key Infrastructure.
Taeho Lee, Christos Pappas, Pawel Szalachowski and Adrian Perrig.
In Proceedings of the ACM Symposium on Information, Computer and Communications Security (ASIACCS) 2018.
SIOTOME: An Edge-ISP Collaborative Architecture for IoT Security.
Hamed Haddadi, Vassilis Christophides, Renata Teixeira, Kenjiro Cho, Shigeya Suzuki and Adrian Perrig.
In Proceedings of International Workshop on Security and Privacy for the Internet-of-Things (IoTSec) 2018.
TARANET: Traffic-Analysis Resistant Anonymity at the Network Layer.
Chen Chen, Daniele E. Asoni, Adrian Perrig, David Barrera, George Danezis and Carmela Troncoso.
In Proceedings of the IEEE European Symposium on Security and Privacy (EuroS&P) 2018.
Adding Path Awareness to the Internet Architecture.
Brian Trammell, Jean-Pierre Smith and Adrian Perrig.
In IEEE Internet Computing 22 (2) 2018.
2017
A Paged Domain Name System for Query Privacy.
Daniele E. Asoni, Samuel Hitz and Adrian Perrig.
In International Conference on Cryptology and Network Security (CANS) 2017.
PHI: Path-Hidden Lightweight Anonymity Protocol at Network Layer.
Chen Chen and Adrian Perrig.
In Proceedings on Privacy Enhancing Technologies (PoPETs) 2017.
The SCION Internet Architecture.
David Barrera, Laurent Chuat, Adrian Perrig, Raphael M. Reischuk and Pawel Szalachowski.
In Communications of the ACM 60 (6) 2017.
Research Area: SCION
Deadline-Aware Multipath Communication: An Optimization Problem.
Laurent Chuat, Adrian Perrig and Yih-Chun Hu.
In Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) 2017.
The Case for In-Network Replay Suppression.
Taeho Lee, Christos Pappas, Adrian Perrig, Virgil Gligor and Yih-Chun Hu.
In Proceedings of the ACM Symposium on Information, Computer and Communications Security (ASIACCS) 2017.
Short Paper: On Deployment of DNS-based Security Enhancements.
Pawel Szalachowski and Adrian Perrig.
In Proceedings of Financial Cryptography and Data Security 2017.
Internet Kill Switches Demystified.
Benjamin Rothenberger, Daniele E. Asoni, David Barrera and Adrian Perrig.
In Proceedings of EuroSec 2017.
Authentication Challenges in a Global Environment.
Stephanos Matsumoto, Raphael M. Reischuk, Pawel Szalachowski, Tiffany Hyun-Jin Kim and Adrian Perrig.
In ACM Transactions on Privacy and Security (TOPS) 20 (1) 2017.
Toward a Taxonomy and Attacker Model for Secure Routing Protocols.
Matthias Hollick, Cristina Nita-Rotaru and Panagiotis Papadimitratos, Adrian Perrig and Stefan Schmid.
In ACM SIGCOMM Computer Communication Review 47 (1) 2017.
SCION: A Secure Internet Architecture.
Adrian Perrig, Pawel Szalachowski, Raphael M. Reischuk and Laurent Chuat.
Publisher: Springer International Publishing AG, 2017.
Research Area: SCION
2016
Source Accountability with Domain-brokered Privacy.
Taeho Lee, Christos Pappas, David Barrera, Pawel Szalachowski and Adrian Perrig.
In Proceedings of the ACM Conference on Emerging Networking Experiments and Technologies (CoNEXT) 2016.
CASTLE: CA Signing in a Touch-Less Environment.
Stephanos Matsumoto, Samuel Steffen and Adrian Perrig.
In Proceedings of Annual Computer Security Applications Conference (ACSAC) 2016.
Modeling Data-Plane Power Consumption of Future Internet Architectures.
Chen, Chen, Barrera, David and Perrig, Adrian.
In Proceedings of the IEEE Conference on Collaboration and Internet Computing (CIC) 2016.
Communication Based on Per-Packet One-Time Addresses.
Taeho Lee, Christos Pappas, Pawel Szalachowski and Adrian Perrig.
In Proceedings of the IEEE Conference on Network Protocols (ICNP) 2016.
Design, Analysis, and Implementation of ARPKI: an Attack-Resilient Public-Key Infrastructure.
Basin, David, Cremers, Cas, Kim, Tiffany Hyun-Jin, Perrig, Adrian, Sasse, Ralf and Szalachowski, Pawel.
In IEEE Transactions on Dependable and Secure Computing (TDSC) 2016.
Research Area: Public Key Infrastructures
SDNsec: Forwarding Accountability for the SDN Data Plane.
Takayuki Sasaki, Christos Pappas, Taeho Lee, Torsten Hoefler and Adrian Perrig.
In Proceedings of the IEEE International Conference on Computer Communication and Networks (ICCCN) 2016.
On the Implementation of Path-Based Dynamic Pricing in Edge-Directed Routing.
Jumpei Urakawa, Cristina Basescu, Kohei Sugiyama, Christos Pappas, Akira Yamada, Ayumu Kubota and Adrian Perrig.
In Proceedings of the IEEE Asia-Pacific Conference on Communications (APCC) 2016.
SDNsec: Forwarding Accountability for the SDN Data Plane.
Takayuki Sasaki, Christos Pappas, Taeho Lee, Torsten Hoefler and Adrian Perrig.
Technical report, ETH Zurich 2016.
Control-plane isolation and recovery for a secure SDN architecture.
Takayuki Sasaki, Daniele E. Asoni and Adrian Perrig.
In IEEE NetSoft Conference and Workshops (NetSoft) 2016.
CICADAS: Congesting the Internet with Coordinated And Decentralized Pulsating Attacks.
Ke, Yu-Ming, Chen, Chih-Wei, Hsiao, Hsu-Chun, Perrig, Adrian and Sekar, Vyas.
In Proceedings of ACM Symposium on Information, Computer and Communications Security (ASIACCS) 2016.
RITM: Revocation in the Middle.
Pawel Szalachowski, Laurent Chuat, Taeho Lee and Adrian Perrig.
In Proceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS) 2016. (Best Paper Award)
Research Area: Public Key Infrastructures
High-Speed Inter-domain Fault Localization.
Cristina Basescu, Yue-Hsun Lin, Haoming Zhang and Adrian Perrig.
In Proceedings of IEEE Symposium on Security and Privacy 2016.
PKI Safety Net (PKISN): Addressing the Too-Big-to-Be-Revoked Problem of the TLS Ecosystem.
Pawel Szalachowski, Laurent Chuat and Adrian Perrig.
In Proceedings of the IEEE European Symposium on Security and Privacy (Euro S&P) 2016.
Research Area: Public Key Infrastructures
SIBRA: Scalable Internet Bandwidth Reservation Architecture.
Cristina Basescu, Raphael M. Reischuk, Pawel Szalachowski, Adrian Perrig, Yao Zhang, Hsu-Chun Hsiao, Ayumu Kubota and Jumpei Urakawa.
In Proceedings of Symposium on Network and Distributed System Security (NDSS) 2016.
Research Area: Distributed Denial of Service Defenses
PsyBoG: A scalable botnet detection method for large-scale DNS traffic.
Jonghoon Kwon, Jehyu Lee, Heejo Lee and Adrian Perrig.
In Computer Networks 2016.
2015
On Building Onion Routing into Future Internet Architectures.
Daniele E. Asoni, Chen Chen, David Barrera and Adrian Perrig.
In IFIP WG 11.4 International Workshop (iNetSec). Revised Selected Papers (Kesdogan, Dogan, Camenisch, Jan, eds.) 2015.
HORNET: High-speed Onion Routing at the Network Layer.
Chen Chen, Daniele E. Asoni, David Barrera, George Danezis and Adrian Perrig.
In Proceedings of the ACM Conference on Computer and Communications Security (CCS) 2015.
Research Area: High-speed Anonymous Communication
Efficient Gossip Protocols for Verifying the Consistency of Certificate Logs.
Laurent Chuat, Pawel Szalachowski, Adrian Perrig, Ben Laurie and Eran Messeri.
In Proceedings of the IEEE Conference on Communications and Network Security (CNS) 2015.
Research Area: Public Key Infrastructures
SCION Five Years Later: Revisiting Scalability, Control, and Isolation on Next-Generation Networks.
David Barrera, Raphael M. Reischuk,, Pawel Szalachowski and Adrian Perrig.
In arXiv e-prints 2015. (arXiv:1508.01651)
Research Area: SCION
Secure broadcast in distributed networks with strong adversaries.
Szalachowski, Pawel and Kim, Tiffany Hyun-Jin.
In Security and Communication Networks 2015.
Source-Based Path Selection: The Data Plane Perspective.
Taeho Lee, Christos Pappas, Cristina Basescu, Jun Han, Torsten Hoefler and Adrian Perrig.
In Proceedings of the ACM Conference on Future Internet Technologies (CFI) 2015.
ECO-DNS: Expected Consistency Optimization for DNS.
Chen, Chen, Matsumoto, Stephanos and Perrig, Adrian.
In Proceedings of the IEEE International Conference on Distributed Computing System (ICDCS) 2015.
ADSNARK: Nearly Practical and Privacy-Preserving Proofs on Authenticated Data.
Michael Backes, Manuel Barbosa, Dario Fiore and Raphael M. Reischuk.
In IEEE Symposium on Security and Privacy (Oakland) 2015.
Deployment Challenges in Log-Based PKI Enhancements.
Stephanos Matsumoto, Pawel Szalachowski and Adrian Perrig.
In Proceedings of the Eighth European Workshop on System Security (EuroSec) 2015.
Research Area: Public Key Infrastructures
Lightweight Protection of Group Content Distribution.
Szalachowski, Pawel and Perrig, Adrian.
In Proceedings of the ASIACCS Workshop on IoT Privacy, Trust, and Security (IoTPTS) 2015.
Establishing Software-Only Root of Trust on Embedded Systems: Facts and Fiction.
Yanlin Li, Yueqiang Cheng, Virgil Gligor and Adrian Perrig.
In Proceedings of International Workshop on Security Protocols (SPW) 2015.
Certificates-as-an-Insurance: Incentivizing Accountability in SSL/TLS.
Stephanos Matsumoto and Raphael M. Reischuk.
In Proceedings of the NDSS Workshop on Security of Emerging Network Technologies (SENT) 2015.
Research Area: Public Key Infrastructures
Transparency Instead of Neutrality.
Christos Pappas, Katerina Argyraki, Stefan Bechtold and Adrian Perrig.
In Proceedings of the ACM Workshop on Hot Topics in Networks (HotNets) 2015.
A Practical System for Guaranteed Access in the Presence of DDoS Attacks and Flash Crowds.
Yi-Hsuan Kung, Taeho Lee, Po-Ning Tseng, Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim, Soo Bum Lee, Yue-Hsun Lin and Adrian Perrig.
In Proceedings of the IEEE International Conference on Network Protocols (ICNP) 2015.
Research Area: Distributed Denial of Service Defenses
FAIR: Forwarding Accountability for Internet Reputability.
Christos Pappas, Raphael M. Reischuk and Adrian Perrig.
In Proceedings of the IEEE International Conference on Network Protocols (ICNP) 2015.
Research Area: Distributed Denial of Service Defenses
Forwarding Accountability: A Challenging Necessity of the Future Data Plane.
Christos Pappas, Raphael M. Reischuk and Adrian Perrig.
In Post-proceedings of the IFIP WG 11.4 Workshop on Open Research Problems in Network Security (iNetSec) 2015.
Research Area: Distributed Denial of Service Defenses
What Lies Beneath? Analyzing Automated SSH Bruteforce Attacks.
AbdelRahman Abdou, David Barrera and Paul C. van Oorschot.
In Proceedings of the International Conference on Passwords 2015.
2014
PoliCert: Secure and Flexible TLS Certificate Management.
Szalachowski, Pawel, Matsumoto, Stephanos and Perrig, Adrian.
In Proceedings of the ACM Conference on Computer and Communications Security (CCS) 2014.
Research Area: Public Key Infrastructures
ARPKI: Attack Resilient Public-Key Infrastructure.
Basin, David, Cremers, Cas, Kim, Tiffany Hyun-Jin, Perrig, Adrian, Sasse, Ralf and Szalachowski, Pawel.
In Proceedings of the ACM Conference on Computer and Communications Security (CCS) 2014.
Research Area: Public Key Infrastructures
Mechanized Network Origin and Path Authenticity Proofs.
Fuyuan Zhang, Limin Jia, Cristina Basescu, Tiffany Hyun-Jin Kim and Yih-Chun Hu and Adrian Perrig.
In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS) 2014.
Accountability in Future Internet Architectures.
Stefan Bechtold and Adrian Perrig.
In Communications of the ACM 57 (9) 2014.
Fleet: defending SDNs from malicious administrators.
Stephanos Matsumoto, Samuel Hitz and Adrian Perrig.
In Proceedings of the Third Workshop on Hot Topics in Software Defined Networking (HotSDN) 2014.
Lightweight Source Authentication and Path Validation.
Tiffany Hyun-Jin Kim, Cristina Basescu, Limin Jia, Soo Bum Lee, Yih-Chun Hu and Adrian Perrig.
In Proceedings of ACM SIGCOMM 2014.
cTPM: A Cloud TPM for Cross-Device Trusted Applications.
Chen, Chen, Raj, Himanshu, Saroiu, Stefan and Wolman, Alec.
In 39 (4) 2014.
MiniBox: A Two-Way Sandbox for x86 Native Code.
Yanlin Li, Jonathan M. McCune, James Newsome, Adrian Perrig, Brandon Baker and Will Drewry.
In Proceedings of the USENIX Annual Technical Conference (USENIX ATC) 2014.
MVSec: Secure and Easy-to-Use Pairing of Mobile Devices with Vehicles.
Jun Han, Yue-Hsun Lin, Adrian Perrig and Fan Bai.
In Proceedings of ACM conference on Security and Privacy in Wireless & Mobile Networks (WiSec) 2014. (Short paper)
MVSec: Secure and Easy-to-Use Pairing of Mobile Devices with Vehicles.
Jun Han, Yue-Hsun Lin, Adrian Perrig and Fan Bai.
Technical report, Carnegie Mellon University 2014.
cTPM: a cloud TPM for cross-device trusted applications.
Chen, Chen, Raj, Himanshu, Saroiu, Stefan and Wolman, Alec.
In Proceedings of the USENIX Conference on Networked Systems Design and Implementation (NSDI) 2014.
MiniBox: A Two-Way Sandbox for x86 Native Code.
Yanlin Li, Adrian Perrig, Jonathan M. McCune, James Newsome, Brandon Baker and Will Drewry.
Technical report, Carnegie Mellon University 2014.
2013
OASIS: On Achieving a Sanctuary for Integrity and Secrecy on Untrusted Platforms.
Emmanuel Owusu, Jorge Guajardo, Jonathan McCune, Jim Newsome, Adrian Perrig and Amit Vasudevan.
In Proceedings of ACM Conference on Computer and Communications Security (CCS) 2013.
SafeSlinger: Easy-to-Use and Secure Public-Key Exchange.
Michael Farb, Yue-Hsun Lin, Tiffany Hyun-Jin Kim, Jonathan M. McCune and Adrian Perrig.
In Proceedings of ACM Annual International Conference on Mobile Computing and Networking (MobiCom) 2013.
KISS: "Key it Simple and Secure" Corporate Key Management.
Zongwei Zhou, Jun Han, Yue-Hsun Lin, Adrian Perrig and Virgil Gligor.
In Proceedings of International Conference on Trust and Trustworthy Computing (TRUST) 2013.
Accountable Key Infrastructure (AKI): A Proposal for a Public-Key Validation Infrastructure.
Tiffany Hyun-Jin Kim, Lin-Shung Huang, Adrian Perrig, Collin Jackson and Virgil Gligor.
In Proceedings of International World Wide Web Conference (WWW) 2013.
Research Area: Public Key Infrastructures
STRIDE: Sanctuary Trail – Refuge from Internet DDoS Entrapment.
Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim, Soo Bum Lee, Xin Zhang, Sangjae Yoo, Virgil Gligor and Adrian Perrig.
In Proceedings of ACM Symposium on Information, Computer and Communications Security (ASIACCS) 2013.
Research Area: Distributed Denial of Service Defenses
Design, Implementation and Verification of an eXtensible and Modular Hypervisor Framework.
Amit Vasudevan, Sagar Chaki, Limin Jia, Jonathan McCune, James Newsome and Anupam Datta.
In Proceedings of IEEE Symposium on Security and Privacy 2013.
Soulmate or Acquaintance? Visualizing Tie Strength for Trust Inference.
Tiffany Hyun-Jin Kim, Virgil Gligor, Jorge Guajardo, Jason Hong and Adrian Perrig.
In Proceedings of Workshop on Usable Security (USEC) 2013.
RelationGram: Tie-Strength Visualization for User-Controlled Online Identity Authentication.
Tiffany Hyun-Jin Kim, Akira Yamada, Virgil Gligor, Jason Hong and Adrian Perrig.
In Proceedings of Financial Cryptography and Data Security 2013.
ReDABLS: Revisiting Device Attestation with Bounded Leakage of Secrets.
Jun Zhao, Virgil Gligor, Adrian Perrig and James Newsome.
In Proceedings of International Workshop on Security Protocols 2013.
Towards Verifiable Resource Accounting for Outsourced Computation.
Chen Chen, Petros Maniatis, Adrian Perrig, Amit Vasudevan and Vyas Sekar.
In Proceedings of International Conference on Virtual Execution Environments (VEE) 2013.
2012
OTO: Online Trust Oracle for User-Centric Trust Establishment.
Tiffany Hyun-Jin Kim, Payas Gupta, Jun Han, Emmanuel Owusu, Jason Hong, Adrian Perrig and Debin Gao.
In Proceedings of ACM Conference on Computer and Communications Security (CCS) 2012.
Using Trustworthy Host-Based Information in the Network.
Bryan Parno, Zongwei Zhou and Adrian Perrig.
In Proceedings of ACM Workshop on Scalable Trusted Computing (STC) 2012.
Transparent Key Integrity (TKI): A Proposal for a Public-Key Validation Infrastructure.
Tiffany Hyun-Jin Kim, Lin-Shung Huang, Adrian Perrig, Collin Jackson and Virgil Gligor.
Technical report, Carnegie Mellon University 2012.
Lockdown: Towards a Safe and Practical Architecture for Security Applications on Commodity Platforms.
Amit Vasudevan, Bryan Parno, Ning Qu, Virgil Gligor and Adrian Perrig.
In Proceedings of International Conference on Trust and Trustworthy Computing (TRUST) 2012.
Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems.
Lorenzo Martignoni, Pongsin Poosankam, Matei Zaharia, Jun Han, Stephen McCamant, Dawn Song, Vern Paxson, Adrian Perrig, Scott Shenker and Ion Stoica.
In Proceedings of USENIX Annual Technical Conference (USENIX ATC) 2012.
Trustworthy Execution on Mobile Devices: What Security Properties Can My Mobile Platform Give Me?.
Amit Vasudevan, Emmanuel Owusu, Zongwei Zhou, James Newsome and Jonathan M. McCune.
In Proceedings of International Conference on Trust and Trustworthy Computing (TRUST) 2012.
LAP: Lightweight Anonymity and Privacy.
Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim, Adrian Perrig, Akira Yamada, Samuel C. Nelson, Marco Gruteser and Wei Meng.
In Proceedings of IEEE Symposium on Security and Privacy 2012.
Secure and Scalable Network Fault Localization under Dynamic Traffic Patterns.
Xin Zhang, Chang Lan and Adrian Perrig.
In Proceedings of IEEE Symposium on Security and Privacy 2012.
CARMA: A Hardware Tamper-Resistant Isolated Execution Environment on Commodity x86 Platforms.
Amit Vasudevan, Jonathan McCune, James Newsome, Adrian Perrig and Leendert van Doorn.
In Proceedings of ACM Symposium on Information, Computer and Communications Security (ASIACCS) 2012.
Street-Level Trust Semantics for Attribute Authentication.
Tiffany Hyun-Jin Kim, Virgil Gligor and Adrian Perrig.
In Proceedings of International Workshop on Security Protocols 2012.
ACCessory: Keystroke Inference using Accelerometers on Smartphones.
Emmanuel Owusu, Jun Han, Sauvik Das, Adrian Perrig and Joy Zhang.
In Procceedings of Workshop on Mobile Computing Systems and Applications (HotMobile) 2012.
Cyber-Physical Security of a Smart Grid Infrastructure.
Yilin Mo, Tiffany Hyun-Jin Kim, Kenneth Brancik, Dona Dickinson, Heejo Lee, Adrian Perrig and Bruno Sinopoli.
In Proceedings of the IEEE 100 (1) 2012.
ACComplice: Location Inference using Accelerometers on Smartphones.
Jun Han, Emmanuel Owusu, Thanh-Le Nguyen, Adrian Perrig and Joy Zhang.
In Proceedings of International Conference on Communication Systems and Networks (COMSNETS) 2012.
GeoPKI: Converting Spatial Trust into Certificate Trust.
Tiffany Hyun-Jin Kim, Virgil Gligor and Adrian Perrig.
In Proceedings of European PKI Workshop (EuroPKI) 2012.
ShortMAC: Efficient Data Plane Fault Localization.
Xin Zhang, Zongwei Zhou, Hsu-Chun Hsiao, Adrian Perrig and Patrick Tague.
In Proceedings of Symposium on Network and Distributed System Security (NDSS) 2012.
2011
Bootstrapping Trust in Modern Computers.
Bryan Parno, Jonathan M. McCune and Adrian Perrig.
Publisher: Springer Briefs in Computer Science, 2011.
PFS: Probabilistic Filter Scheduling Against Distributed Denial-of-Service Attacks.
Dongwon Seo, Heejo Lee and Adrian Perrig.
In Proceedings of IEEE Conference on Local Computer Networks (LCN) 2011.
Uplink Traffic Control in Home 802.11 Wireless Networks.
Yanlin Li, Dina Papagiannaki and Anmol Sheth.
In Proceedings of ACM SIGCOMM Workshop on Home Networks (HomeNets) 2011.
A Picture is Worth a Thousand Words: Improving Usability and Robustness of Online Recommendation Systems.
Tiffany Hyun-Jin Kim, Virgil Gligor and Adrian Perrig.
In Proceedings of IEEE International Conference on Computer Communications and Networks (ICCCN) 2011.
Short Paper: Jamming-Resilient Multipath Routing Leveraging Availability-Based Correlation.
Hossen Mustafa, Xin Zhang, Zhenhua Liu, Wenyuan Xu and Adrian Perrig.
In Proceedings of ACM Conference on Wireless Network Security (WiSec) 2011.
Efficient and Secure Threshold-based Event Validation for VANETs.
Hsu-Chun Hsiao, Ahren Studer, Rituik Dubey, Elaine Shi and Adrian Perrig.
In Proceedings of ACM Conference on Wireless Network Security (WiSec) 2011.
Secure and Efficient Capability-based Power Management in the Smart Grid.
Dongwon Seo, Heejo Lee and Adrian Perrig.
In The International Workshop on Smart Grid Security and Communications (SGSC) 2011.
SCION: Scalability, Control, and Isolation On Next-Generation Networks.
Xin Zhang, Hsu-Chun Hsiao, Geoffrey Hasker, Haowen Chan, Adrian Perrig and David G. Andersen.
In Proceedings of IEEE Symposium on Security and Privacy 2011.
Research Area: SCION
OMAP:One-way Memory Attestation Protocol for Smart Meters.
Kyungsub Song, Dongwon Seo, Haemin Park, Heejo Lee and Adrian Perrig.
In The International Workshop on Smart Grid Security and Communications (SGSC) 2011.
Access Right Assignment Mechanisms for Secure Home Networks.
Tiffany Hyun-Jin Kim, Lujo Bauer, James Newsome, Adrian Perrig and Jesse Walker.
In Journal of Communications and Networks 13 (2) 2011.
XTRec: Secure Real-time Execution Trace Recording on Commodity Platforms.
Amit Vasudevan, Ning Qu and Adrian Perrig.
In Proceedings of IEEE Hawaii International Conference in System Sciences (HICSS) 2011.
Network Fault Localization with Small TCB.
Xin Zhang, Zongwei Zhou, Geoff Hasker, Adrian Perrig and Virgil Gligor.
In Proceedings of IEEE International Conference on Network Protocols (ICNP) 2011.
VIPER: Verifying the Integrity of Peripherals' Firmware.
Yanlin Li, Jonathan M. McCune and Adrian Perrig.
In Proceedings of ACM Conference on Computer and Communications Security (CCS) 2011.
RelationGrams: Tie-Strength Visualization for User-Controlled Online Identity Authentication.
Tiffany Hyun-Jin Kim, Akira Yamada, Virgil Gligor, Jason Hong and Adrian Perrig.
Technical report, Carnegie Mellon University 2011.
Flooding-Resilient Broadcast Authentication for VANETs.
Hsu-Chun Hsiao, Ahren Studer, Chen Chen, Adrian Perrig, Fan Bai, Bhargav Bellur and Aravind Iyer.
In In Proceedings of ACM Annual International Conference on Mobile Computing and Networking (MobiCom) 2011.
Secure Distributed Data Aggregation.
Haowen Chan, Hsu-Chun Hsiao, Adrian Perrig and Dawn Song.
In Journal of Foundations and Trends in Databases 3 (3) 2011.
2010
Correlation-Resilient Path Selection in Multi-Path Routing.
Xin Zhang and Adrian Perrig.
In Proceedings of IEEE Global Communications Conference (Globecom) 2010.
Ho-Po Key: Leveraging Physical Constraints on Human Motion to Authentically Exchange Information in a Group.
Ghita Mezzour, Ahren Studer, Michael Farb, Jason Lee, Jonathan McCune, Hsu-Chun Hsiao and Adrian Perrig.
Technical report, Carnegie Mellon University 2010.
VANET Alert Endorsement Using Multi-Source Filters.
Tiffany Hyun-Jin Kim, Ahren Studer, Rituik Dubey, Xin Zhang, Adrian Perrig, Fan Bai, Bhargav Bellur and Aravind Iyer.
In Proceedings of ACM International Workshop on Vehicular Ad Hoc Networks (VANET) 2010.
Non-Interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers.
Rosario Gennaro, Craig Gentry and Bryan Parno.
In Proceedings of International Cryptology Conference (CRYPTO) 2010.
Challenges in Access Right Assignment for Secure Home Networks.
Tiffany Hyun-Jin Kim, Lujo Bauer, James Newsome, Adrian Perrig and Jesse Walker.
In Proceedings of USENIX Workshop on Hot Topics in Security (HotSec) 2010.
Requirements for an Integrity-Protected Hypervisor on the x86 Hardware Virtualized Architecture.
Amit Vasudevan, Jonathan M. McCune, Ning Qu, Leendert van Doorn and Adrian Perrig.
In Proceedings of International Conference on Trust and Trustworthy Computing (Trust) 2010.
SBAP: Software-Based Attestation for Peripherals.
Yanlin Li, Jonathan M. McCune and Adrian Perrig.
In Proceedings of International Conference on Trust and Trustworthy Computing (Trust) 2010.
TrustVisor: Efficient TCB Reduction and Attestation.
Jonathan M. McCune, Yanlin Li, Ning Qu and Zongwei Zhou, Anupam Datta and Virgil Gligor and Adrian Perrig.
In Proceedings of IEEE Symposium on Security and Privacy 2010.
More is Less: Denial-of-Service Attacks and Solutions in Many-Core On-Chip Networks..
Xin Zhang, Yanlin Li and Onur Mutlu.
In Poster at IEEE Symposium on Security and Privacy 2010.
Round-Effcient Broadcast Authentication Protocols for Fixed Topology Classes.
Haowen Chan and Adrian Perrig.
In Proceedings of IEEE Symposium on Security and Privacy 2010.
Bootstrapping Trust in Commodity Computers.
Bryan Parno, Jonathan M. McCune and Adrian Perrig.
In Proceedings of IEEE Symposium on Security and Privacy 2010.
Refutation of "On the Difficulty of Software-Based Attestation of Embedded Devices".
Adrian Perrig and Leendert van Doorn.
2010.
Mobile User Location-specific Encryption (MULE): Using Your Office as Your Password.
Ahren Studer and Adrian Perrig.
In Proceedings of ACM Conference on Wireless Network Security (WISEC) 2010.
SPATE: Small-Group PKI-Less Authenticated Trust Establishment.
Yue-Hsun Lin, Ahren Studer, Yao-Hsin Chen, Hsu-Chun Hsiao, Li-Hsiang Kuo, Jason Lee, Jonathan M. McCune, King-Hang Wang, Maxwell Krohn, Phen-Lan Lin, Adrian Perrig, Hung-Min Sun and Bo-Yin Yang.
In IEEE Transactions on Mobile Computing 2010.
Dependable Connection Setup for Network Capabilities.
Soo Bum Lee, Virgil Gligor and Adrian Perrig.
In Proceedings of IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) 2010.
2009
Flexible, Extensible, and Efficient VANET Authentication.
Ahren Studer, Fan Bai, Bhargav Bellur and Adrian Perrig.
In Journal of Communications and Networks 11 (6) 2009.
A Study of User-Friendly Hash Comparison Schemes.
Hsu-Chun Hsiao, Yue-Hsun Lin, Ahren Studer, Cassandra Studer, King-Hang Wang, Hiroaki Kikuchi, Adrian Perrig, Hung-Min Sun and Bo-Yin Yang.
In Proceedings of Computer Security Applications Conference (ACSAC) 2009.
Privacy-Preserving Relationship Path Discovery in Social Networks.
Ghita Mezzour, Adrian Perrig, Virgil Gligor and Panos Papadimitratos.
In Proceedings of International Conference on Cryptology and Network Security (CANS) 2009.
The Coremelt Attack.
Ahren Studer and Adrian Perrig.
In Proceedings of European Symposium on Research in Computer Security (ESORICS) 2009.
SPATE: Small-group PKI-less Authenticated Trust Establishment.
Yue-Hsun Lin, Ahren Studer, Hsu-Chin Hsiao and Jonathan M. McCune, King-Hang Wang, Maxwell Krohn and Phen-Lan Lin, Adrian Perrig, Hung-Min Sun and Bo-Yin Yang.
In Proceedings of Annual International Conference on Mobile Systems, Applications and Services (MobiSys) 2009.
TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs.
Ahren Studer, Elaine Shi, Fan Bai and Adrian Perrig.
In Proceedings of IEEE Communications Society Conference on Sensor, Mesh, and Ad Hoc Communications and Networks (SECON) 2009.
Centaur: A Hybrid Approach for Reliable Policy-Based Routing.
Xin Zhang, Adrian Perrig and Hui Zhang.
In Proceedings of International Conference on Distributed Computing Systems (ICDCS) 2009.
CLAMP: Practical Prevention of Large-Scale Data Leaks.
Bryan Parno, Jonathan M. McCune, Dan Wendlandt, David G. Andersen and Adrian Perrig.
In Proceedings of IEEE Symposium on Security and Privacy 2009.
Safe Passage for Passwords and Other Sensitive Data.
Jonathan M. McCune, Adrian Perrig and Michael K. Reiter.
In Proceedings of Symposium on Network and Distributed Systems Security (NDSS) 2009.
Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication.
Jonathan M. McCune, Adrian Perrig and Michael K. Reiter.
In International Journal of Security and Networks Special Issue on Secure Spontaneous Interaction 4 (1–2) 2009.
2008
Packet-dropping Adversary Identification for Data Plane Security.
Xin Zhang, Abhishek Jain and Adrian Perrig.
In Proceedings of ACM SIGCOMM International Conference on emerging Networking EXperiments and Technologies (CoNEXT) 2008.
Flexible, Extensible, and Efficient VANET Authentication.
Ahren Studer, Fan Bai, Bhargav Bellur and Adrian Perrig.
In Proceedings of Embedded Security in Cars Workshop (ESCAR) 2008.
Efficient Security Primitives Derived from a Secure Aggregation Algorithm.
Haowen Chan and Adrian Perrig.
In Proceedings of ACM Conference on Computer and Communications Security (CCS) 2008.
GAnGS: Gather Authenticate 'n Group Securely.
Chia-Hsin Owen Chen, Chung-Wei Chen, Cynthia Kuo, Yan-Hao Lai, Jonathan M. McCune, Ahren Studer, Adrian Perrig, Bo-Yin Yang and Tzong-Chen Wu.
In Proceedings of ACM International Conference on Mobile Computing and Networking (MobiCom) 2008.
Unidirectional Key Distribution Across Time and Space with Applications to RFID Security.
Ari Juels, Ravikanth Pappu and Bryan Parno.
In Proceedings of USENIX Security Symposium 2008.
Bootstrapping Trust in a "Trusted" Platform.
Bryan Parno.
In Proceedings of 3rd USENIX Workshop on Hot Topics in Security (HotSec) 2008.
SAKE: Software Attestation for Key Establishment in Sensor Networks.
Arvind Seshadri, Mark Luk and Adrian Perrig.
In Proceedings of International Conference on Distributed Computing in Sensor Systems (DCOSS) 2008.
Perspectives: Improving SSH-style Host Authentication with Multi-Path Probing.
Dan Wendlandt, David G. Andersen and Adrian Perrig.
In Proceedings of USENIX Annual Technical Conference (USENIX ATC) 2008.
Mechanisms to Provide Integrity in SCADA and PCS devices.
Aakash Shah, Adrian Perrig and Bruno Sinopoli.
In Proceedings of International Workshop on Cyber-Physical Systems Challenges and Applications (CPS-CA) 2008.
Remote Detection of Virtual Machine Monitors with Fuzzy Benchmarking.
Jason Franklin, Mark Luk, Jonathan M. McCune, Arvind Seshadri, Adrian Perrig and Leendert van Doorn.
In ACM SIGOPS Operating System Review (Special Issue on Computer Forensics) 2008.
Flicker: An Execution Infrastructure for TCB Minimization.
Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter and Hiroshi Isozaki.
In Proceedings of ACM European Conference in Computer Systems (EuroSys) 2008.
How Low Can You Go? Recommendations for Hardware-Supported Minimal TCB Code Execution.
Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter and Arvind Seshadri.
In Proceedings of ACM Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS) 2008.
Mind Your Manners: Socially Appropriate Wireless Key Establishment for Groups.
Cynthia Kuo, Ahren Studer and Adrian Perrig.
In Proceedings of First ACM Conference on Wireless Network Security (WiSec '08) 2008.
SNAPP: Stateless Network-Authenticated Path Pinning.
Bryan Parno, Adrian Perrig and David G. Andersen.
In Proceedings of ACM Symposium on Information, Computer and Communications Security (ASIACCS) 2008.
Countermeasures against Government-Scale Monetary Forgery.
Alessandro Acquisti, Nicolas Christin, Bryan Parno and Adrian Perrig.
In Proceedings of Financial Cryptography and Data Security 12th International Conference 2008.
Securing User-controlled Routing Infrastructures.
Karthik Lakshminarayanan, Daniel Adkins, Adrian Perrig and Ion Stoica.
In IEEE/ACM Transactions on Networking 16 (3) 2008.
2007
An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants.
Jason Franklin, Vern Paxson, Adrian Perrig and Stefan Savage.
In Proceedings of ACM Conference on Computer and Communications Security (CCS) 2007.
Efficient Mechanisms to Provide Convoy Member and Vehicle Sequence Authentication in VANETs.
Ahren Studer, Mark Luk and Adrian Perrig.
In Proceedings of International Conference on Security and Privacy in Communication Networks (SecureComm) 2007.
Don't Sweat Your Privacy: Using Humidity to Detect Human Presence.
Jun Han, Abhishek Jain, Mark Luk and Adrian Perrig.
In Proceedings of International Workshop on Privacy in UbiComp (UbiPriv) 2007.
Turtles All The Way Down: Research Challenges in User-Based Attestation.
Jonathan M. McCune, Adrian Perrig, Arvind Seshadri and Leendert van Doorn.
In Proceedings of Workshop on Hot Topics in Security (HotSec) 2007.
Portcullis: Protecting Connection Setup from Denial-of-Capability Attacks.
Bryan Parno, Dan Wendlandt, Elaine Shi, Adrian Perrig, Bruce Maggs and Yih-Chun Hu.
In Proceedings of ACM SIGCOMM 2007.
Multi-Dimensional Range Query over Encrypted Data.
Elaine Shi, John Bethencourt, Hubert Chan, Dawn Song and Adrian Perrig.
In IEEE Symposium on Security and Privacy 2007.
Minimal TCB Code Execution (Extended Abstract).
Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter and Arvind Seshadri.
In Proceedings of IEEE Symposium on Security and Privacy 2007.
MiniSec: A Secure Sensor Network Communication Architecture.
Mark Luk, Ghita Mezzour, Adrian Perrig and Virgil Gligor.
In Proceedings of IEEE International Conference on Information Processing in Sensor Networks (IPSN) 2007.
BASE: An Incrementally Deployable Mechanism for Viable IP Spoofing Prevention.
Heejo Lee, Minjin Kwon, Geoffrey Hasker and Adrian Perrig.
In Proceedings of ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS) 2007.
Low-cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup.
Cynthia Kuo, Jesse Walker and Adrian Perrig.
In Usable Security (USEC) 2007.
PRISM: Enabling Personal Verification of Code Integrity, Untampered Execution, and Trusted I/O on Legacy Systems or Human-Verifiable Code Execution.
Jason Franklin, Mark Luk, Arvind Seshadri and Adrian Perrig.
Technical report, CyLab 2007.
Rapid Trust Establishment for Pervasive Personal Computing.
Ajay Surie, Adrian Perrig, Mahadev Satyanarayanan and David Farber.
In IEEE Pervasive Computing 6 (4) 2007.
Pioneer: Verifying Code Integrity and Enforcing Untampered Code Execution on Legacy Systems.
Arvind Seshadri, Mark Luk, Adrian Perrig, Leendert van Doorn and Pradeep Khosla.
Chapter in Malware Detection (Mihai Christodorescu, Somesh Jha, Douglas Maughan, Dawn Song, Cliff Wang, eds.) 2007.
SecVisor: A Tiny Hypervisor to Provide Lifetime Kernel Code Integrity for Commodity OSes.
Arvind Seshadri, Mark Luk, Ning Qu and Adrian Perrig.
In Proceedings of ACM Conference on Operating Systems Principles (SOSP) 2007.
Message-In-a-Bottle: User-Friendly and Secure Key Deployment for Sensor Nodes.
Cynthia Kuo, Mark Luk, Rohit Negi and Adrian Perrig.
In Proceedings of ACM Conference on Embedded Networked Sensor System (SenSys) 2007.
SIA: Secure Information Aggregation in Sensor Networks.
Haowen Chan, Adrian Perrig, Bartosz Przydatek and Dawn Song.
In Journal of Computer Security (Special Issue on Security of Ad Hoc and Sensor Networks) 15 (1) 2007.
2006
Secure Sensor Network Routing: A Clean-Slate Approach.
Bryan Parno, Mark Luk, Evan Gaustad and Adrian Perrig.
In Proceedings of Conference on Future Networking Technologies (CoNEXT) 2006.
(R)Evolutionary Bootstrapping of a Global PKI for Securing BGP.
Yih-Chun Hu, David McGrew, Adrian Perrig, Brian Weis and Dan Wendlandt.
In Fifth Workshop on Hot Topics in Networks (HotNets-V) 2006.
Secure Hierarchical In-network Aggregation for Sensor Networks.
Haowen Chan, Adrian Perrig and Dawn Song.
In Proceedings of ACM Conference on Computer and Communications Security (CCS) 2006.
StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense.
Abraham Yaar, Adrian Perrig and Dawn Song.
In IEEE Journal on Selected Areas in Communications 24 (10) 2006.
Seven Cardinal Properties of Sensor Network Broadcast Authentication.
Mark Luk, Adrian Perrig and Bram Whillock.
In Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2006) 2006.
SCUBA: Secure Code Update By Attestation in Sensor Networks.
Arvind Seshadri, Mark Luk, Adrian Perrig, Leendert van Doorn and Pradeep Khosla.
In Proceedings of ACM Workshop on Wireless Security (WiSe) 2006.
Externally Verifiable Code Execution.
Arvind Seshadri, Mark Luk, Adrian Perrig and Leendert van Doorn and Pradeep Khosla.
In Communications of the ACM 49 (9) 2006.
Modeling Adoptability of Secure BGP Protocols.
Haowen Chan, Debabrata Dash, Adrian Perrig and Hui Zhang.
In Proceedings of ACM SIGCOMM 2006.
A Distributed Stealthy Coordination Mechanism for Worm Synchronization.
Gaurav Kataria, Gaurav Anand, Rudolph Araujo, Ramayya Krishnan and Adrian Perrig.
In Proceedings of International Conference on Security and Privacy in Communication Networks (SecureComm) 2006.
Human Selection of Mnemonic Phrase-based Passwords.
Cynthia Kuo, Sasha Romanosky and Lorrie Cranor.
In Proceedings of Symposium on Usable Privacy and Security (SOUPS) 2006.
Bump in the Ether: A Framework for Securing Sensitive User Input.
Jonathan M. McCune, Adrian Perrig and Michael K. Reiter.
In Proceedings of USENIX Annual Technical Conference (USENIX ATC) 2006.
FastPass: Providing First-Packet Delivery.
Dan Wendlandt, David G. Andersen and Adrian Perrig.
Technical report, CyLab 2006.
Phoolproof Phishing Prevention.
Bryan Parno, Cynthia Kuo and Adrian Perrig.
In Proceedings of International Conference on Financial Cryptography and Data Security (FC) 2006.
OverDoSe: A Generic DDoS Protection Service Using an Overlay Network.
Elaine Shi, Ion Stoica, David Andersen and Adrian Perrig.
Technical report, Computer Science Department, Carnegie Mellon University 2006.
Designing an Evaluation Method for Security User Interfaces: Lessons from Studying Secure Wireless Network Configuration.
Cynthia Kuo, Adrian Perrig and Jesse Walker.
In ACM Interactions 13 (3) 2006.
Browser Enhancements for Preventing Phishing Attacks.
Cynthia Kuo, Bryan Parno and Adrian Perrig.
Chapter in Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft (Markus Jakobsson, Steven Myers, eds.) 2006.
2005
Challenges in Securing Vehicular Networks.
Bryan Parno and Adrian Perrig.
In Proceedings of Workshop on Hot Topics in Networks (HotNets-IV) 2005.
Pioneer: Verifying Code Integrity and Enforcing Untampered Code Execution on Legacy Systems.
Arvind Seshadri, Mark Luk, Elaine Shi, Adrian Perrig, Leendert van Doorn and Pradeep Khosla.
In Proceedings of ACM Symposium on Operating Systems Principles (SOSP) 2005.
A Clean-Slate Design for the Next-Generation Secure Internet.
Steven Bellovin, David Clark, Adrian Perrig and Dawn Song.
Pittsburgh, PA: Report for NSF Global Environment for Network Innovations (GENI) workshop 2005.
Efficient Constructions for One-way Hash Chains.
Yih-Chun Hu, Markus Jakobsson and Adrian Perrig.
In Applied Cryptography and Network Security (ACNS) 2005.
Using Clustering Information for Sensor Network Localization.
Haowen Chan, Mark Luk and Adrian Perrig.
In Proceedings of IEEE Conference on Distributed Computing in Sensor Systems (DCOSS 2005) 2005.
Detection of Denial-of-Message Attacks on Sensor Network Broadcasts.
Jonathan McCune, Elaine Shi, Adrian Perrig and Michael K. Reiter.
In Proceedings of IEEE Symposium on Security and Privacy 2005.
Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication.
Jonathan M. McCune, Adrian Perrig and Michael K. Reiter.
In Proceedings of IEEE Symposium on Security and Privacy 2005.
Distributed Detection of Node Replication Attacks in Sensor Networks.
Bryan Parno, Adrian Perrig and Virgil Gligor.
In Proceedings of IEEE Symposium on Security and Privacy 2005.
BIND: A Fine-grained Attestation Service for Secure Distributed Systems.
Elaine Shi, Adrian Perrig and Leendert Van Doorn.
In Proceedings of IEEE Symposium on Security and Privacy 2005.
NATBLASTER: Establishing TCP Connections Between Hosts Behind NATs.
Andrew Biggadike, Daniel Ferullo, Geoffrey Wilson and Adrian Perrig.
In Proceedings of ACM SIGCOMM ASIA Workshop 2005.
FIT: Fast Internet Traceback.
Avi Yaar, Adrian Perrig and Dawn Song.
In Proceedings of IEEE Infocom 2005.
PIKE: Peer Intermediaries for Key Establishment in Sensor Networks.
Haowen Chan and Adrian Perrig.
In Proceedings of IEEE Infocom 2005.
FANFARE for the Common Flow.
Elaine Shi, Bryan Parno, Adrian Perrig, Yih-Chun Hun and Bruce Maggs.
Technical report, CyLab 2005.
Empowering Ordinary Consumers to Securely Configure their Mobile Devices and Wireless Networks.
Cynthia Kuo, Vincent Goh, Adrian Tang, Adrian Perrig and Jesse Walker.
Technical report, CyLab 2005.
Wormhole Attacks in Wireless Networks.
Yih-Chun Hu, Adrian Perrig and Dave Johnson.
In IEEE Journal on Selected Areas in Communications (JSAC) 2005.
Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks.
Yih-Chun Hu, Adrian Perrig and David B. Johnson.
In Wireless Networks Journal 11 (1) 2005.
On the Distribution and Revocation of Cryptographic Keys in Sensor Networks.
Haowen Chan, Virgil Gligor, Adrian Perrig and Gautam Muralidharan.
In IEEE Transactions on Dependable and Secure Computing (TDSC) 2 (3) 2005.
2004
Designing Secure Sensor Networks.
Elaine Shi and Adrian Perrig.
In Wireless Communication Magazine 11 (6) 2004.
Using SWATT for Verifying Embedded Systems in Cars.
Arvind Seshadri, Adrian Perrig, Leendert van Doorn and Pradeep Khosla.
In Proceedings of Embedded Security in Cars Workshop (ESCAR) 2004.
Key Infection: Smart Trust for Smart Dust.
Ross Anderson, Haowen Chan and Adrian Perrig.
In Proceedings of IEEE International Conference on Network Protocols (ICNP) 2004.
SPV: Secure Path Vector Routing for Securing BGP.
Yih-Chun Hu, Adrian Perrig and Marvin Sirbu.
In Proceedings of ACM SIGCOMM 2004.
SWATT: Software-based Attestation for Embedded Devices.
Arvind Seshadri, Adrian Perrig, Leendert van Doorn and Pradeep Khosla.
In Proceedings of IEEE Symposium on Security and Privacy 2004.
SIFF: A Stateless Internet Flow Filter to Mitigate DDoS Flooding Attacks.
Avi Yaar, Adrian Perrig and Dawn Song.
In Proceedings of IEEE Symposium on Security and Privacy 2004.
The Sybil Attack in Sensor Networks: Analysis and Defenses.
James Newsome, Runting Shi, Dawn Song and Adrian Perrig.
In Proceedings of IEEE International Conference on Information Processing in Sensor Networks (IPSN) 2004.
Distillation Codes and Applications to DoS Resistant Multicast Authentication.
Chris Karlof, Naveen Sastry, Yaping Li, Adrian Perrig and J. D. Tygar.
In Proceedings of Symposium on Network and Distributed System Security (NDSS) 2004.
ACE: An Emergent Algorithm for Highly Uniform Cluster Formation.
Haowen Chan and Adrian Perrig.
In Proceedings of European Workshop on Wireless Sensor Networks (EWSN) 2004.
A Survey of Secure Wireless Ad Hoc Routing.
Yih-Chun Hu and Adrian Perrig.
In IEEE Security & Privacy 2 (3) 2004.
Taming IP Packet Flooding Attacks.
Daniel Adkins, Karthik Lakshminarayanan, Adrian Perrig and Ion Stoica.
In ACM SIGCOMM Computer Communication Review 34 (1) 2004.
2003
SIA: Secure Information Aggregation in Sensor Networks.
Bartosz Przydatek, Dawn Song and Adrian Perrig.
In Proceedings of ACM SenSys 2003.
Taming IP Packet Flooding Attacks.
Daniel Adkins, Karthik Lakshminarayanan, Adrian Perrig and Ion Stoica.
In Proceedings of Workshop on Hot Topics in Networks (HotNets-II) 2003.
Security and Privacy in Sensor Networks.
Haowen Chan and Adrian Perrig.
In IEEE Computer Magazine 2003.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols.
Yih-Chun Hu, Adrian Perrig and David B. Johnson.
In Proceedings of ACM Workshop on Wireless Security (WiSe) 2003.
Opportunistic Use of Content Addressable Storage for Distributed File Systems.
Niraj Tolia, Michael Kozuch, Mahadev Satyanarayanan, Brad Karp, Thomas Bressoud and Adrian Perrig.
In Proceedings of USENIX Annual Technical Conference (USENIX ATC) 2003.
Pi: A Path Identification Mechanism to Defend against DDoS Attacks.
Avi Yaar, Adrian Perrig and Dawn Song.
In Proceedings of IEEE Symposium on Security and Privacy 2003.
Random Key Predistribution Schemes for Sensor Networks.
Haowen Chan, Adrian Perrig and Dawn Song.
In Proceedings of IEEE Symposium on Security and Privacy 2003.
Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks.
Yih-Chun Hu, Adrian Perrig and David B. Johnson.
In Proceedings of IEEE Infocomm 2003.
Efficient Security Mechanisms for Routing Protocols.
Yih-Chun Hu, Adrian Perrig and David B. Johnson.
In Proceedings of Symposium on Network and Distributed System Security (NDSS) 2003.
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks.
Yih-Chun Hu, David B. Johnson and Adrian Perrig.
In Journal of Ad Hoc Networks 1 (1) 2003.
2002
2001
The BiBa One-Time Signature and Broadcast Authentication Protocol.
Adrian Perrig.
In Proceedings of ACM Conference on Computer and Communications Security (CCS) 2001.
SPINS: Security Protocols for Sensor Networks.
Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler and J.D. Tygar.
In Seventh Annual International Conference on Mobile Computing and Networks (MobiCom) 2001.
AGVI — Automatic Generation, Verification, and Implementation of Security Protocols.
Dawn Song, Adrian Perrig and Doantam Phan.
In Proceedings of Conference on Computer Aided Verification (CAV) 2001.
Communication-Efficient Group Key Agreement.
Yongdae Kim, Adrian Perrig and Gene Tsudik.
In International Federation for Information Processing (IFIP SEC) 2001.
ELK, a New Protocol for Efficient Large-Group Key Distribution.
Adrian Perrig, Dawn Song and Doug Tygar.
In Proceedings of IEEE Symposium on Security and Privacy 2001.
SAM: A Flexible and Secure Auction Architecture Using Trusted Hardware.
Adrian Perrig, Sean Smith, Dawn Song and J.D. Tygar.
In First International Workshop on Internet Computing and E-Commerce (ICEC'01) 2001.
Efficient and Secure Source Authentication for Multicast.
Adrian Perrig, Ran Canetti, Dawn Song and J.D. Tygar.
In Proceedings of Symposium on Network and Distributed System Security (NDSS) 2001.
2000
1999