Conference Finding Invariants of Distributed Systems: It's a Small (Enough) World After All 2021 • PROCEEDINGS OF THE 18TH USENIX SYMPOSIUM ON NETWORKED SYSTEM DESIGN AND IMPLEMENTATION • 115-132 Hance T, Heule M, Martins R, Parno B
Conference HERQULES: Securing Programs via Hardware-Enforced Message Queues 2021 • International Conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS • 773-788 Chen DD, Lim WS, Bakhshalipour M, Gibbons PB, Hoe JC, Parno B
Preprint Self-Correcting Neural Networks For Safe Classification 2021 Leino K, Fromherz A, Mangal R, Fredrikson M, Parno B, Păsăreanu C
Conference SoK: Computer-aided cryptography 2021 • IEEE Symposium on Security and Privacy: Proceedings • 2021-May:777-795 Barbosa M, Barthe G, Bhargavan K, Blanchet B, Cremers C, Liao K, Parno B
Conference Armada: Low-effort verification of high-performance concurrent programming 2020 • Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI) • 197-210 Lorch JR, Chen Y, Kapritsos M, Parno B, Qadeer S, Sharma U, Wilcox JR, Zhao X
Conference CAPS: Smoothly Transitioning to a More Resilient Web PKI 2020 • Proceedings - Annual Computer Security Applications Conference, ACSAC • 655-668 Matsumoto S, Bosamiya J, Dai Y, Van Oorschot P, Parno B
Conference EverCrypt: A fast, verified, cross-platform cryptographic provider 2020 • IEEE Symposium on Security and Privacy: Proceedings • 2020-May:983-1002 Protzenko J, Parno B, Fromherz A, Hawblitzel C, Polubelova M, Bhargavan K, Beurdouche B, Choi J, Delignat-Lavaud A, Fournet C, Kulatova N, Ramananandro T, Rastogi A, Swamy N, Wintersteiger CM, Zanella-Beguelin S
Preprint Fast Geometric Projections for Local Robustness Certification 2020 Fromherz A, Leino K, Fredrikson M, Parno B, Păsăreanu C
Conference Storage Systems are Distributed Systems (So Verify Them That Way!) 2020 • PROCEEDINGS OF THE 14TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION (OSDI '20) • 99-115 Hance T, Lattuada A, Hawblitzel C, Howell J, Johnson R, Parno B
Conference Talek: Private Group Messaging with Hidden Access Patterns 2020 • Proceedings - Annual Computer Security Applications Conference, ACSAC • 84-99 Cheng R, Scott W, Masserova E, Zhang I, Goyal V, Anderson T, Krishnamurthy A, Parno B
Preprint Talek: Private Group Messaging with Hidden Access Patterns 2020 Cheng R, Scott W, Masserova E, Zhang I, Goyal V, Anderson T, Krishnamurthy A, Parno B
Chapter Verified Transformations and Hoare Logic: Beautiful Proofs for Ugly Assembly Language 2020 • Lecture Notes in Computer Science • 12549 LNCS:106-123 Bosamiya J, Gibson S, Li Y, Parno B, Hawblitzel C
Journal Article A verified, efficient embedding of a verifiable assembly language 2019 • Proceedings of the ACM on Programming Languages • 3(POPL): Fromherz A, Giannarakis N, Hawblitzel C, Parno B, Rastogi A, Swamy N
Conference How to run POSIX apps in a minimal picoprocess 2019 • Proceedings of the 2013 USENIX Annual Technical Conference, USENIX ATC 2013 • 321-332 Howell J, Parno B, Douceur JR
Conference Message from the Program Chairs 2018 • IEEE Symposium on Security and Privacy: Proceedings • 2018-May:xvii Parno B, Kruegel C
Conference Everest: Towards a verified, drop-in replacement of HTTPS 2017 • Leibniz International Proceedings in Informatics • 71: Parno B, and others
Journal Article IronFleet: Proving safety and liveness of practical distributed systems 2017 • Communications of the ACM • 60(7):83-92 Hawblitzel C, Howell J, Kapritsos M, Lorch JR, Parno B, Roberts ML, Setty S, Zill B
Conference Komodo: Using verification to disentangle secure-enclave hardware from software 2017 • SOSP 2017 - Proceedings of the 26th ACM Symposium on Operating Systems Principles • 287-305 Ferraiuolo A, Baumann A, Hawblitzel C, Parno B
Conference Vale: Verifying high-performance cryptographic assembly code 2017 • Proceedings of the 26th USENIX Security Symposium • 917-934 Bond B, Hawblitzel C, Kapritsos M, Leino KRM, Lorch JR, Parno B, Rane A, Setty S, Thompson L
Conference Cinderella: Turning Shabby X.509 Certificates into Elegant Anonymous Credentials with the Magic of Verifiable Computation 2016 • IEEE Symposium on Security and Privacy: Proceedings • 235-254 Delignat-Lavaud A, Fournet C, Kohlweiss M, Parno B
Conference Hash first, argue later: Adaptive verifiable computations on outsourced data 2016 • Proceedings of the ACM Conference on Computer and Communications Security • 24-28-October-2016:1304-1316 Fiore D, Fournet C, Ghosh E, Kohlweiss M, Ohrimenko O, Parno B
Journal Article Pinocchio: Nearly practical verifiable computation 2016 • Communications of the ACM • 59(2):103-112 Parno B, Howell J, Gentry C, Raykova M
Conference Geppetto: Versatile verifiable computation 2015 • IEEE Symposium on Security and Privacy: Proceedings • 2015-July:253-270 Costello C, Fournet C, Howell J, Kohlweiss M, Kreuter B, Naehrig M, Parno B, Zahur S
Conference IronFleet: Proving practical distributed systems correct 2015 • SOSP 2015 - Proceedings of the 25th ACM Symposium on Operating Systems Principles • 1-17 Hawblitzel C, Howell J, Kapritsos M, Lorch JR, Parno B, Roberts ML, Setty S, Zill B
Journal Article Network Adversary Attacks against Secure Encryption Schemes 2015 • IEICE Transactions on Communications • E98B(2):267-279 Gligor VD, Parno B, Shin JS