Resources‎ > ‎

Publications 2014-2015

Cryptography with One-Way Communication

Sanjam Garg, Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Amit Sahai

CRYPTO 2015

(pdf download link provided below)

Secure Computation from Leaky Correlated Randomness

Divya Gupta, Yuval Ishai, Hemanta K. Maji, Amit Sahai

CRYPTO 2015

(pdf download link provided below)

Locally Decodable Codes for Edit Distance

Rafail Ostrovsky, Anat Paskin-Cherniavsky

ICITS 2015

(pdf download link provided below)

The Hidden Graph Model: Communication Locality and Optimal Resiliency with Adaptive Faults

Nishanth Chandran, Wutichai Chongchitmate, Juan A. Garay, Shafi Goldwasser, Rafail Ostrovsky, Vassilis Zikas

ITCS 2015

(pdf download link provided below)

Secure state estimation and control using multiple (insecure) observers

S. Mishra, N Karamchandani, P. Tabuada and S N. Diggavi

CDC 2014

(pdf download link provided below)


Secure State Estimation: Optimal Guarantees against Sensor Attacks in the Presence of Noise

Shaunak Mishra, Yasser Shoukry Nikhil Karamchandani, Suhas Diggavi, Paulo Tabuada

ISIT 2015

(pdf download link provided below)

Sound and Complete State Estimation for Linear Dynamical Systems Under Sensor Attack Using Satisfiability Modulo Theory Solving

Yasser Shoukry, Alberto Puggelli, Pierluigi Nuzzo, Alberto Sangiovanni-Vincentelli, Sanjit A. Seshia, and Paulo Tabuada

ACC 2015

(pdf download link provided below)

IMHOTEP-SMT: A Satisfiability Modulo Theory Solver For Secure State Estimation

Yasser Shoukry, Pierluigi Nuzzo, Alberto Puggelli, Alberto Sangiovanni-Vincentelli, Sanjit A. Seshia, Mani Srivastava, and Paulo Tabuada

SMT 2015

(pdf download link provided below)


Optimal Coding for Streaming Authentication and Interactive Communication

Matthew K. Franklin; Ran Gelles; Rafail Ostrovsky; Leonard J. Schulman

IEEE Transactions on Information Theory 61(1): 133-145, 2015

(pdf download link provided below)

Event-Triggered Projected Luenberger Observer for Linear Systems Under Sensor Attacks

Yasser Shoukry and Paulo Tabuada

CDC 2014

(pdf download link provided below)

Attack Detection and State Reconstruction in Differentially Flat Systems Under Sensor Attacks Using Satis- fiability Modulo Theory Solving.

Yasser Shoukry, Pierluigi Nuzzo, Nicola Bezzo, Alberto Sangiovanni-Vincentelli, Sanjit A. Seshia, and Paulo Tabuada

CDC 2015

AnonyCast: Privacy Preserving Location Distribution for Anonymous Crowd Tracking Systems

Takamasa Higuchi, Paul Martin, Supriyo Chakraborty, and Mani Srivastava

ACM Ubicomp 2015