Raluca A. Popa

Orcid: 0000-0001-8899-801X

Affiliations:
  • University of California, Berkeley, CA, USA


According to our database1, Raluca A. Popa authored at least 84 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Confidential Computing or Cryptographic Computing?: Tradeoffs between cryptography and hardware enclaves.
ACM Queue, 2024

Compass: Encrypted Semantic Search with High Accuracy.
IACR Cryptol. ePrint Arch., 2024

Nebula: A Privacy-First Platform for Data Backhaul.
IACR Cryptol. ePrint Arch., 2024

Private Analytics via Streaming, Sketching, and Silently Verifiable Proofs.
IACR Cryptol. ePrint Arch., 2024

Flock: A Framework for Deploying On-Demand Distributed Trust.
IACR Cryptol. ePrint Arch., 2024

Secret Key Recovery in a Global-Scale End-to-End Encryption System.
IACR Cryptol. ePrint Arch., 2024

JudgeBench: A Benchmark for Evaluating LLM-based Judges.
CoRR, 2024

MPC-Minimized Secure LLM Inference.
CoRR, 2024

GoEX: Perspectives and Designs Towards a Runtime for Autonomous LLM Applications.
CoRR, 2024

Retcon: Live Updates for Embedded Event-Driven Applications.
Proceedings of the 23rd ACM/IEEE International Conference on Information Processing in Sensor Networks, 2024

LLoCO: Learning Long Contexts Offline.
Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, 2024

2023
HOLMES: Efficient Distribution Testing for Secure Collaborative Learning.
Proceedings of the 32nd USENIX Security Symposium, 2023

MPCAuth: Multi-factor Authentication for Distributed-trust Systems.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

2022
Piranha: A GPU Platform for Secure Computation.
IACR Cryptol. ePrint Arch., 2022

ELSA: Secure Aggregation for Federated Learning with Malicious Actors.
IACR Cryptol. ePrint Arch., 2022

CostCO: An automatic cost modeling framework for secure multi-party computation.
IACR Cryptol. ePrint Arch., 2022

The Sky Above The Clouds.
CoRR, 2022

Global perspectives of diversity, equity, and inclusion.
Commun. ACM, 2022

Reflections on trusting distributed trust.
Proceedings of the 21st ACM Workshop on Hot Topics in Networks, 2022

2021
Cerebro: A Platform for Multi-Party Cryptographic Collaborative Learning.
IACR Cryptol. ePrint Arch., 2021

MUSE: Secure Inference Resilient to Malicious Clients.
IACR Cryptol. ePrint Arch., 2021

Merkle^2: A Low-Latency Transparency Log System.
IACR Cryptol. ePrint Arch., 2021

Waldo: A Private Time-Series Database from Function Secret Sharing.
IACR Cryptol. ePrint Arch., 2021

Snoopy: Surpassing the Scalability Bottleneck of Oblivious Storage.
IACR Cryptol. ePrint Arch., 2021

HOLMES: A Platform for Detecting Malicious Inputs in Secure Collaborative Computation.
IACR Cryptol. ePrint Arch., 2021

N-for-1 Auth: N-wise Decentralized Authentication via One Authentication.
IACR Cryptol. ePrint Arch., 2021

What serverless computing is and should become: the next phase of cloud computing.
Commun. ACM, 2021

ObliCheck: Efficient Verification of Oblivious Algorithms with Unobservable State.
Proceedings of the 30th USENIX Security Symposium, 2021

Merkle<sup>2</sup>: A Low-Latency Transparency Log System.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

MAGE: Nearly Zero-Cost Virtual Memory for Secure Computation.
Proceedings of the 15th USENIX Symposium on Operating Systems Design and Implementation, 2021

2020
Senate: A Maliciously-Secure MPC Platform for Collaborative Analytics.
IACR Cryptol. ePrint Arch., 2020

Delphi: A Cryptographic Inference Service for Neural Networks.
IACR Cryptol. ePrint Arch., 2020

Ghostor: Toward a Secure Data-Sharing System from Decentralized Trust.
IACR Cryptol. ePrint Arch., 2020

DORY: An Encrypted Search System with Distributed Trust.
IACR Cryptol. ePrint Arch., 2020

Metal: A Metadata-Hiding File-Sharing System.
IACR Cryptol. ePrint Arch., 2020

Civet: An Efficient Java Partitioning Framework for Hardware Enclaves.
Proceedings of the 29th USENIX Security Symposium, 2020

Visor: Privacy-Preserving Video Analytics as a Cloud Service.
Proceedings of the 29th USENIX Security Symposium, 2020

An Off-Chip Attack on Hardware Enclaves via the Memory Bus.
Proceedings of the 29th USENIX Security Symposium, 2020

Oblivious coopetitive analytics using hardware enclaves.
Proceedings of the EuroSys '20: Fifteenth EuroSys Conference 2020, 2020

PPMLP 2020: Workshop on Privacy-Preserving Machine Learning In Practice.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

MC2: A Secure Collaborative Computation Platform.
Proceedings of the PPMLP'20: Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practice, 2020

Delphi: A Cryptographic Inference System for Neural Networks.
Proceedings of the PPMLP'20: Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practice, 2020

Secure Collaborative Training and Inference for XGBoost.
Proceedings of the PPMLP'20: Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practice, 2020

2019
The Seattle Report on Database Research.
SIGMOD Rec., 2019

Arx: An Encrypted Database using Semantically Secure Encryption.
Proc. VLDB Endow., 2019

Practical Volume-Based Attacks on Encrypted Databases.
IACR Cryptol. ePrint Arch., 2019

Cloud Programming Simplified: A Berkeley View on Serverless Computing.
CoRR, 2019

JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT.
Proceedings of the 28th USENIX Security Symposium, 2019

WAVE: A Decentralized Authorization Framework with Transitive Delegation.
Proceedings of the 28th USENIX Security Symposium, 2019

Helen: Maliciously Secure Coopetitive Learning for Linear Models.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Securing Data in Compromised Clouds.
Proceedings of the ACM Symposium on Cloud Computing, SoCC 2019, 2019

2018
DIZK: A Distributed Zero Knowledge Proof System.
IACR Cryptol. ePrint Arch., 2018

Oblix: An Efficient Oblivious Search Index.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

SafeBricks: Shielding Network Functions in the Cloud.
Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation, 2018

2017
A Berkeley View of Systems Challenges for AI.
CoRR, 2017

Opaque: An Oblivious and Encrypted Distributed Analytics Platform.
Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation, 2017

MiniCrypt: Reconciling Encryption and Compression for Big Data Stores.
Proceedings of the Twelfth European Conference on Computer Systems, 2017

2016
Arx: A Strongly Encrypted Database System.
IACR Cryptol. ePrint Arch., 2016

A Secure One-Roundtrip Index for Range Queries.
IACR Cryptol. ePrint Arch., 2016

Verena: End-to-End Integrity Protection for Web Applications.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Embark: Securely Outsourcing Middleboxes to the Cloud.
Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation, 2016

2015
BlindBox: Deep Packet Inspection over Encrypted Traffic.
IACR Cryptol. ePrint Arch., 2015

Guidelines for Using the CryptDB System Securely.
IACR Cryptol. ePrint Arch., 2015

2014
Building practical systems that compute on encrypted data.
PhD thesis, 2014

Building Web Applications on Top of Encrypted Data Using Mylar.
login Usenix Mag., 2014

Machine Learning Classification over Encrypted Data.
IACR Cryptol. ePrint Arch., 2014

Building Web Applications on Top of Encrypted Data Using Mylar.
Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation, 2014

2013
Multi-Key Searchable Encryption.
IACR Cryptol. ePrint Arch., 2013

An Ideal-Security Protocol for Order-Preserving Encoding.
IACR Cryptol. ePrint Arch., 2013

Overcoming the Worst-Case Curse for Cryptographic Constructions.
IACR Cryptol. ePrint Arch., 2013

Reusable garbled circuits and succinct functional encryption.
Proceedings of the Symposium on Theory of Computing Conference, 2013

How to Run Turing Machines on Encrypted Data.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

2012
Succinct Functional Encryption and Applications: Reusable Garbled Circuits and Beyond.
IACR Cryptol. ePrint Arch., 2012

CryptDB: processing queries on an encrypted database.
Commun. ACM, 2012

2011
Going Beyond Pollution Attacks: Forcing Byzantine Clients to Code Correctly
CoRR, 2011

Enabling Security in Cloud Storage SLAs with CloudProof.
Proceedings of the 2011 USENIX Annual Technical Conference, 2011

CryptDB: protecting confidentiality with encrypted query processing.
Proceedings of the 23rd ACM Symposium on Operating Systems Principles 2011, 2011

Relational Cloud: a Database Service for the cloud.
Proceedings of the Fifth Biennial Conference on Innovative Data Systems Research, 2011

Privacy and accountability for location-based aggregate statistics.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2009
VPriv: Protecting Privacy in Location-Based Vehicular Services.
Proceedings of the 18th USENIX Security Symposium, 2009

Census: Location-Aware Membership Management for Large-Scale Distributed Systems.
Proceedings of the 2009 USENIX Annual Technical Conference, 2009

2008
On Auditing Elections When Precincts Have Different Sizes.
Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Workshop, 2008

2007
On Estimating the Size and Confidence of a Statistical Audit.
Proceedings of the 2007 USENIX/ACCURATE Electronic Voting Technology Workshop, 2007

MUVI: automatically inferring multi-variable access correlations and detecting related semantic and concurrency bugs.
Proceedings of the 21st ACM Symposium on Operating Systems Principles 2007, 2007


  Loading...