Conference IronFleet 2015 1-17 Hawblitzel C, Howell J, Kapritsos M, Lorch JR, Parno B, Roberts ML, Setty S, Zill B
Journal Article Network Adversary Attacks against Secure Encryption Schemes 2015 • IEICE Transactions on Communications • E98B(2):267-279 Gligor VD, Parno B, Shin JS
Conference Ironclad apps: End-to-end security via automated full-system verification 2014 • Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2014 • 165-181 Hawblitzel C, Howell J, Lorch JR, Narayan A, Parno B, Zhang D, Zill B
Conference Missive: Fast application launch from an untrusted buffer cache 2014 • Proceedings of the 2014 USENIX Annual Technical Conference, USENIX ATC 2014 • 145-156 Howell J, Elson J, Parno B, Douceur JR
Conference Permacoin: Repurposing Bitcoin Work for Data Preservation 2014 • IEEE Symposium on Security and Privacy: Proceedings • 475-490 Miller A, Juels A, Shi E, Katz J, Parno B
Conference CCSW chairs' welcome 2013 • Proceedings of the ACM Conference on Computer and Communications Security Juels A, Parno B
Conference Embassies: Radically refactoring the web 2013 • Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2013 • 529-545 Howell J, Parno B, Douceur JR
Conference Fifth ACM cloud computing security workshop (CCSW 2013) 2013 • Proceedings of the ACM Conference on Computer and Communications Security • 1487-1488 Juels A, Parno B
Conference PETShop'13 welcome message 2013 • Proceedings of the ACM Conference on Computer and Communications Security Franz M, Holzer A, Majumdar R, Parno B, Veith H
Conference Pinocchio coin 2013 • Proceedings of the ACM Conference on Computer and Communications Security • 27-30 Danezis G, Fournet C, Kohlweiss M, Parno B
Conference Quadratic Span Programs and Succinct NIZKs without PCPs 2013 • Lecture Notes in Computer Science • 7881:626-645 Gennaro R, Gentry C, Parno B, Raykova M
Conference Resolving the conflict between generality and plausibility in verified computation 2013 71-84 Setty S, Braun B, Vu V, Blumberg AJ, Parno B, Walfish M
Conference Shroud: Ensuring private access to large-scale data in the data center 2013 • Proceedings of the 11th USENIX Conference on File and Storage Technologies, FAST 2013 • 199-213 Lorch JR, Parno B, Mickens J, Raykova M, Schiffman J
Conference The first workshop on language support for privacy-enhancing technologies (PETShop'13) 2013 • Proceedings of the ACM Conference on Computer and Communications Security • 1485-1486 Franz M, Holzer A, Majumdar R, Parno B, Veith H
Conference How to Delegate and Verify in Public: Verifiable Computation from Attribute-Based Encryption 2012 • Lecture Notes in Computer Science • 7194:422-439 Parno B, Raykova M, Vaikuntanathan V
Conference Lockdown: Towards a Safe and Practical Architecture for Security Applications on Commodity Platforms 2012 • Lecture Notes in Computer Science • 7344:34-54 Vasudevan A, Parno B, Qu N, Gligor VD, Perrig A
Journal Article Trust extension for commodity computers 2012 • Communications of the ACM • 55(6):76-85 Parno B
Conference User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems 2012 • IEEE Symposium on Security and Privacy: Proceedings • 1:224-238 Roesner F, Kohno T, Moshchuk A, Parno B, Wang HJ, Cowan C
Conference Using trustworthy host-based information in the network 2012 • Proceedings of the ACM Conference on Computer and Communications Security • 33-44 Parno B, Zhou Z, Perrig A
Chapter Additional Reading 2011 • SpringerBriefs in Computer Science • 10:75-76 Parno B, McCune JM, Perrig A
Chapter Applications 2011 • SpringerBriefs in Computer Science • 10:53-57 Parno B, McCune JM, Perrig A
Chapter Bootstrapping Trust in Modern Computers 2011 • SpringerBriefs in Computer Science • 10: Parno B, McCune JM, Perrig A
Chapter Can We Use Platform Information Locally? 2011 • SpringerBriefs in Computer Science • 10:13-18 Parno B, McCune JM, Perrig A
Chapter Can We Use Platform Information Remotely? 2011 • SpringerBriefs in Computer Science • 10:19-24 Parno B, McCune JM, Perrig A