Conference Ironclad apps: End-to-end security via automated full-system verification 2014 • Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2014 • 165-181 Hawblitzel C, Howell J, Lorch JR, Narayan A, Parno B, Zhang D, Zill B
Conference Missive: Fast application launch from an untrusted buffer cache 2014 • Proceedings of the 2014 USENIX Annual Technical Conference, USENIX ATC 2014 • 145-156 Howell J, Elson J, Parno B, Douceur JR
Conference Permacoin: Repurposing bitcoin work for data preservation 2014 • IEEE Symposium on Security and Privacy: Proceedings • 475-490 Miller A, Juels A, Shi E, Parno B, Katz J
Conference CCSW chairs' welcome 2013 • Proceedings of the ACM Conference on Computer and Communications Security Juels A, Parno B
Conference Embassies: Radically refactoring the web 2013 • Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2013 • 529-545 Howell J, Parno B, Douceur JR
Conference Fifth ACM Cloud Computing Security Workshop (CCSW 2013) 2013 • Proceedings of the ACM Conference on Computer and Communications Security • 1487-1488 Juels A, Parno B
Conference PETShop'13 welcome message 2013 • Proceedings of the ACM Conference on Computer and Communications Security Franz M, Holzer A, Majumdar R, Parno B, Veith H
Conference Pinocchio coin: Building Zerocoin from a succinct pairing-based proof system 2013 • Proceedings of the ACM Conference on Computer and Communications Security • 27-29 Danezis G, Fournet C, Kohlweiss M, Parno B
Conference Pinocchio: Nearly practical verifiable computation 2013 • IEEE Symposium on Security and Privacy: Proceedings • 238-252 Parno B, Howell J, Gentry C, Raykova M
Conference Quadratic span programs and succinct NIZKs without PCPs 2013 • Lecture Notes in Computer Science • 7881 LNCS:626-645 Gennaro R, Gentry C, Parno B, Raykova M
Conference Resolving the conflict between generality and plausibility in verified computation 2013 • Proceedings of the 8th ACM European Conference on Computer Systems, EuroSys 2013 • 71-84 Setty S, Braun B, Vu V, Blumberg AJ, Parno B, Walfish M
Conference Shroud: Ensuring private access to large-scale data in the data center 2013 • Proceedings of the 11th USENIX Conference on File and Storage Technologies, FAST 2013 • 199-213 Lorch JR, Parno B, Mickens J, Raykova M, Schiffman J
Conference The first workshop on language support for Privacy-Enhancing Technologies (PETShop'13) 2013 • Proceedings of the ACM Conference on Computer and Communications Security • 1485-1486 Franz M, Holzer A, Majumdar R, Parno B, Veith H
Conference How to delegate and verify in public: Verifiable computation from attribute-based encryption 2012 • Lecture Notes in Computer Science • 7194 LNCS:422-439 Parno B, Raykova M, Vaikuntanathan V
Conference Lockdown: Towards a safe and practical architecture for security applications on commodity platforms 2012 • Lecture Notes in Computer Science • 7344 LNCS:34-54 Vasudevan A, Parno B, Qu N, Gligor VD, Perrig A
Journal Article Trust extension for commodity computers 2012 • Communications of the ACM • 55(6):76-85 Parno B
Conference User-driven access control: Rethinking permission granting in modern operating systems 2012 • IEEE Symposium on Security and Privacy: Proceedings • 224-238 Roesner F, Kohno T, Moshchuk A, Parno B, Wang HJ, Cowan C
Conference Using trustworthy host-based information in the network 2012 • Proceedings of the ACM Conference on Computer and Communications Security • 33-44 Parno B, Zhou Z, Perrig A
Chapter Additional Reading 2011 • SpringerBriefs in Computer Science • 10:75-76 Parno B, McCune JM, Perrig A
Chapter Applications 2011 • SpringerBriefs in Computer Science • 10:53-57 Parno B, McCune JM, Perrig A
Chapter Bootstrapping Trust in Modern Computers 2011 • SpringerBriefs in Computer Science • 10:1-22 Parno B, McCune JM, Perrig A
Chapter Can We Use Platform Information Locally? 2011 • SpringerBriefs in Computer Science • 10:13-18 Parno B, McCune JM, Perrig A
Chapter Can We Use Platform Information Remotely? 2011 • SpringerBriefs in Computer Science • 10:19-24 Parno B, McCune JM, Perrig A
Chapter Challenges in Bootstrapping Trust in Secure Hardware 2011 • SpringerBriefs in Computer Science • 10:41-50 Parno B, McCune JM, Perrig A