Constants Count: Practical Improvements to Oblivious RAM L Ren, C Fletcher, A Kwon, E Stefanov, E Shi, M van Dijk, S Devadas 24th USENIX Security Symposium (USENIX Security 15), 2015 | 187* | 2015 |
Spacemint: A cryptocurrency based on proofs of space S Park, A Kwon, G Fuchsbauer, P Gaži, J Alwen, K Pietrzak International Conference on Financial Cryptography and Data Security, 480-499, 2018 | 154* | 2018 |
Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services A Kwon, M AlSabah, D Lazar, M Dacier, S Devadas 24th USENIX Security Symposium (USENIX Security 15), 2015 | 109 | 2015 |
Freecursive ORAM: [Nearly] Free Recursion and Integrity Verification for Position-based Oblivious RAM CW Fletcher, L Ren, A Kwon, M Van Dijk, S Devadas Proceedings of the Twentieth International Conference on Architectural …, 2015 | 102* | 2015 |
Low-fat pointers: compact encoding and efficient gate-level implementation of fat pointers for spatial safety and capability-based security A Kwon, U Dhawan, JM Smith, TF Knight Jr, A DeHon Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 98 | 2013 |
Riffle: An efficient communication system with strong anonymity A Kwon, D Lazar, S Devadas, B Ford Proceedings on Privacy Enhancing Technologies 2016 (2), 115-134, 2015 | 89 | 2015 |
A low-latency, low-area hardware oblivious RAM controller CW Fletcher, L Ren, A Kwon, M Van Dijk, E Stefanov, D Serpanos, ... 2015 IEEE 23rd Annual International Symposium on Field-Programmable Custom …, 2015 | 70* | 2015 |
Atom: Horizontally scaling strong anonymity A Kwon, H Corrigan-Gibbs, S Devadas, B Ford SOSP 26, 2017 | 48* | 2017 |
Proram: dynamic prefetcher for oblivious ram X Yu, SK Haider, L Ren, C Fletcher, A Kwon, M Van Dijk, S Devadas 2015 ACM/IEEE 42nd Annual International Symposium on Computer Architecture …, 2015 | 45* | 2015 |
Beaver: A Decentralized Anonymous Marketplace with Secure Reputation K Soska, A Kwon, N Christin, S Devadas | 32 | 2016 |
Var-CNN: A Data-Efficient Website Fingerprinting Attack Based on Deep Learning S Bhat, D Lu, A Kwon, S Devadas Proceedings on Privacy Enhancing Technologies 1, 19, 0 | 28* | |
Hardware support for safety interlocks and introspection U Dhawan, A Kwon, E Kadric, C Hritcu, BC Pierce, JM Smith, A DeHon, ... 2012 IEEE Sixth International Conference on Self-Adaptive and Self …, 2012 | 25 | 2012 |
Design and implementation of the ascend secure processor L Ren, CW Fletcher, A Kwon, M Van Dijk, S Devadas IEEE Transactions on Dependable and Secure Computing 16 (2), 204-216, 2017 | 18 | 2017 |
{XRD}: Scalable messaging system with cryptographic privacy A Kwon, D Lu, S Devadas 17th {USENIX} Symposium on Networked Systems Design and Implementation …, 2020 | 15 | 2020 |
The Messaging Layer Security (MLS) Architecture E Omara, B Beurdouche, E Rescorla, S Inguva, A Kwon, A Duric Internet-Draft draft-ietf-mls-architecture-02. Internet Engineering Task …, 2019 | 10 | 2019 |
Dynaflow: An efficient website fingerprinting defense based on dynamically-adjusting flows D Lu, S Bhat, A Kwon, S Devadas Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 109-113, 2018 | 8 | 2018 |
Research for practice: private online communication; highlights in systems verification A Kwon, JR Wilcox, P Bailis Communications of the ACM 61 (2), 46-49, 2018 | 1* | 2018 |
RotoRouter: Router support for endpoint-authorized decentralized traffic filtering to prevent DoS attacks A Kwon, K Zhang, PL Lim, Y Pan, JM Smith, A DeHon 2014 International Conference on Field-Programmable Technology (FPT), 183-190, 2014 | 1 | 2014 |
Proving Server Faults: RPCs for Distributed Systems in Byzantine Networks J Weiss, A Kwon, Y Gilad Proceedings of the 19th ACM Workshop on Hot Topics in Networks, 74-80, 2020 | | 2020 |
Network Working Group E. Omara Internet-Draft Google Intended status: Informational B. Beurdouche Expires: 27 January 2021 INRIA E Rescorla, S Inguva, A Kwon, A Duric | | 2020 |