Bryan Parno
Orcid: 0000-0002-9113-1684
According to our database1,
Bryan Parno
authored at least 93 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
FlowCert: Translation Validation for Asynchronous Dataflow via Dynamic Fractional Permissions.
Proc. ACM Program. Lang., 2024
Proceedings of the ACM SIGOPS 30th Symposium on Operating Systems Principles, 2024
Inductive Invariants That Spark Joy: Using Invariant Taxonomies to Streamline Distributed Protocol Proofs.
Proceedings of the 18th USENIX Symposium on Operating Systems Design and Implementation, 2024
Proceedings of the Computer Aided Verification - 36th International Conference, 2024
2023
Proc. ACM Program. Lang., October, 2023
Proc. ACM Program. Lang., April, 2023
Proc. ACM Program. Lang., January, 2023
Owl: Compositional Verification of Security Protocols via an Information-Flow Type System.
IACR Cryptol. ePrint Arch., 2023
CoRR, 2023
CoRR, 2023
Sharding the State Machine: Automated Modular Reasoning for Complex Concurrent Systems.
Proceedings of the 17th USENIX Symposium on Operating Systems Design and Implementation, 2023
Proceedings of the 22nd ACM Workshop on Hot Topics in Networks, 2023
Proceedings of the Formal Methods in Computer-Aided Design, 2023
Proceedings of the 12th ACM SIGPLAN International Conference on Certified Programs and Proofs, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
ACM Trans. Program. Lang. Syst., 2022
Trans. Mach. Learn. Res., 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Hammurabi: A Framework for Pluggable, Logic-Based X.509 Certificate Validation Policies.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the Software Verification and Formal Methods for ML-Enabled Autonomous Systems, 2022
2021
IACR Cryptol. ePrint Arch., 2021
Self-Repairing Neural Networks: Provable Safety for Deep Networks via Dynamic Repair.
CoRR, 2021
Proceedings of the 18th USENIX Symposium on Networked Systems Design and Implementation, 2021
Proceedings of the 18th USENIX Symposium on Networked Systems Design and Implementation, 2021
Proceedings of the 9th International Conference on Learning Representations, 2021
Proceedings of the ASPLOS '21: 26th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2021
2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Verified Transformations and Hoare Logic: Beautiful Proofs for Ugly Assembly Language.
Proceedings of the Software Verification - 12th International Conference, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the 41st ACM SIGPLAN International Conference on Programming Language Design and Implementation, 2020
Proceedings of the 14th USENIX Symposium on Operating Systems Design and Implementation, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
Proc. ACM Program. Lang., 2019
IACR Cryptol. ePrint Arch., 2019
2017
Commun. ACM, 2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the 26th Symposium on Operating Systems Principles, 2017
Proceedings of the 2nd Summit on Advances in Programming Languages, 2017
2016
IACR Cryptol. ePrint Arch., 2016
Cinderella: Turning Shabby X.509 Certificates into Elegant Anonymous Credentials with the Magic of Verifiable Computation.
Proceedings of the IEEE Symposium on Security and Privacy, 2016
2015
IEICE Trans. Commun., 2015
Proceedings of the 25th Symposium on Operating Systems Principles, 2015
2014
Proceedings of the 2014 USENIX Annual Technical Conference, 2014
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014
Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation, 2014
Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers (dissertation, updated version).
ACM Books 2, ACM / Morgan & Claypool, ISBN: 978-1-62705-477-5, 2014
2013
Proceedings of the 2013 USENIX Annual Technical Conference, 2013
Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation, 2013
Proceedings of the 11th USENIX conference on File and Storage Technologies, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
The first workshop on language support for privacy-enhancing technologies (PETShop'13).
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the PETShop'13, 2013
2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Lockdown: Towards a Safe and Practical Architecture for Security Applications on Commodity Platforms.
Proceedings of the Trust and Trustworthy Computing - 5th International Conference, 2012
User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems.
Proceedings of the IEEE Symposium on Security and Privacy, 2012
2011
Springer Briefs in Computer Science 10, Springer, ISBN: 978-1-4614-1460-5, 2011
How to Delegate and Verify in Public: Verifiable Computation from Attribute-based Encryption.
IACR Cryptol. ePrint Arch., 2011
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011
Proceedings of the Tenth ACM Workshop on Hot Topics in Networks (HotNets-X), 2011
2010
PhD thesis, 2010
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010
2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the 30th IEEE Symposium on Security and Privacy (SP 2009), 2009
2008
Unidirectional Key Distribution Across Time and Space with Applications to RFID Security.
IACR Cryptol. ePrint Arch., 2008
Proceedings of the 3rd USENIX Workshop on Hot Topics in Security, 2008
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008
Proceedings of the 2008 EuroSys Conference, Glasgow, Scotland, UK, April 1-4, 2008, 2008
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008
How low can you go?: recommendations for hardware-supported minimal TCB code execution.
Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems, 2008
2007
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007
Proceedings of the ACM SIGCOMM 2007 Conference on Applications, 2007
2006
Proceedings of the Financial Cryptography and Data Security, 2006
Proceedings of the 2006 ACM Conference on Emerging Network Experiment and Technology, 2006
2005
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), 2005
2004
IEEE Trans. Dependable Secur. Comput., 2004
2003
Proceedings of the 17th Conference on Systems Administration (LISA 2003), 2003