aperrig

Prof. Dr. Adrian Perrig

CAB F 85.1
Universit├Ątstrasse 6
8006 Z├╝rich

Phone: +41 44 632 99 69
E-Mail: adrian.perrig@inf.ethz.ch



Publications

2015


ECO-DNS: Expected Consistency Optimization for DNS
Chen Chen, Stephanos Matsumoto, Adrian Perrig.
In Proceedings of the IEEE International Conference on Distributed Computing System (ICDCS) 2015. [bibtex] [pdf]

Deployment Challenges in Log-Based PKI Enhancements
Stephanos Matsumoto, Pawel Szalachowski, Adrian Perrig.
In Proceedings of the Eighth European Workshop on System Security (EuroSec) 2015. [bibtex] [pdf]

Lightweight Protection of Group Content Distribution
Pawel Szalachowski, Adrian Perrig.
In Proceedings of the ASIACCS Workshop on IoT Privacy, Trust, and Security (IoTPTS) 2015. [bibtex] [pdf] [doi]


2014


ARPKI: Attack Resilient Public-Key Infrastructure
David Basin, Cas Cremers, Tiffany Hyun-Jin Kim, Adrian Perrig, Ralf Sasse, Pawel Szalachowski.
In Proceedings of the ACM Conference on Computer and Communications Security (CCS) 2014. [bibtex] [pdf] [doi]

PoliCert: Secure and Flexible TLS Certificate Management
Pawel Szalachowski, Stephanos Matsumoto, Adrian Perrig.
In Proceedings of the ACM Conference on Computer and Communications Security (CCS) 2014. [bibtex] [pdf] [doi]

Mechanized Network Origin and Path Authenticity Proofs
Fuyuan Zhang, Limin Jia, Cristina Basescu, Tiffany Hyun-Jin Kim, Yih-Chun Hu, Adrian Perrig.
In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS) 2014. [bibtex] [pdf] [doi]

Fleet: defending SDNs from malicious administrators
Stephanos Matsumoto, Samuel Hitz, Adrian Perrig.
In Proceedings of the Third Workshop on Hot Topics in Software Defined Networking (HotSDN) 2014. [bibtex] [pdf]

Lightweight Source Authentication and Path Validation
Tiffany Hyun-Jin Kim, Cristina Basescu, Limin Jia, Soo Bum Lee, Yih-Chun Hu, Adrian Perrig.
In Proceedings of ACM SIGCOMM 2014. [bibtex] [pdf] [doi]

MVSec: Secure and Easy-to-Use Pairing of Mobile Devices with Vehicles
Jun Han, Yue-Hsun Lin, Adrian Perrig, Fan Bai.
In Proceedings of ACM conference on Security and Privacy in Wireless & Mobile Networks (WiSec) 2014. (Short paper) [bibtex] [pdf]

MiniBox: A Two-Way Sandbox for x86 Native Code
Yanlin Li, Jonathan M. McCune, James Newsome, Adrian Perrig, Brandon Baker, Will Drewry.
In Proceedings of the USENIX Annual Technical Conference (USENIX ATC) 2014. [bibtex] [pdf]

MVSec: Secure and Easy-to-Use Pairing of Mobile Devices with Vehicles
Jun Han, Yue-Hsun Lin, Adrian Perrig, Fan Bai.
Technical report, Carnegie Mellon University 2014. [bibtex] [pdf]

MiniBox: A Two-Way Sandbox for x86 Native Code
Yanlin Li, Adrian Perrig, Jonathan M. McCune, James Newsome, Brandon Baker, Will Drewry.
Technical report, Carnegie Mellon University 2014. [bibtex] [pdf]


2013


OASIS: On Achieving a Sanctuary for Integrity and Secrecy on Untrusted Platforms
Emmanuel Owusu, Jorge Guajardo, Jonathan McCune, Jim Newsome, Adrian Perrig, Amit Vasudevan.
In Proceedings of ACM Conference on Computer and Communications Security (CCS) 2013. [bibtex] [pdf]

SafeSlinger: Easy-to-Use and Secure Public-Key Exchange
Michael Farb, Yue-Hsun Lin, Tiffany Hyun-Jin Kim, Jonathan M. McCune, Adrian Perrig.
In Proceedings of ACM Annual International Conference on Mobile Computing and Networking (MobiCom) 2013. [bibtex] [pdf]

KISS: "Key it Simple and Secure" Corporate Key Management
Zongwei Zhou, Jun Han, Yue-Hsun Lin, Adrian Perrig, Virgil Gligor.
In Proceedings of International Conference on Trust and Trustworthy Computing (TRUST) 2013. [bibtex] [pdf]

Accountable Key Infrastructure (AKI): A Proposal for a Public-Key Validation Infrastructure
Tiffany Hyun-Jin Kim, Lin-Shung Huang, Adrian Perrig, Collin Jackson, Virgil Gligor.
In Proceedings of International World Wide Web Conference (WWW) 2013. [bibtex] [pdf]

STRIDE: Sanctuary Trail -- Refuge from Internet DDoS Entrapment
Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim, Soo Bum Lee, Xin Zhang, Sangjae Yoo, Virgil Gligor, Adrian Perrig.
In Proceedings of ACM Symposium on Information, Computer and Communications Security (ASIACCS) 2013. [bibtex] [pdf]

Soulmate or Acquaintance? Visualizing Tie Strength for Trust Inference
Tiffany Hyun-Jin Kim, Virgil Gligor, Jorge Guajardo, Jason Hong, Adrian Perrig.
In Proceedings of Workshop on Usable Security (USEC) 2013. [bibtex] [pdf]

RelationGram: Tie-Strength Visualization for User-Controlled Online Identity Authentication
Tiffany Hyun-Jin Kim, Akira Yamada, Virgil Gligor, Jason Hong, Adrian Perrig.
In Proceedings of Financial Cryptography and Data Security 2013. [bibtex] [pdf]

ReDABLS: Revisiting Device Attestation with Bounded Leakage of Secrets
Jun Zhao, Virgil Gligor, Adrian Perrig, James Newsome.
In Proceedings of International Workshop on Security Protocols 2013. [bibtex] [pdf]

Towards Verifiable Resource Accounting for Outsourced Computation
Chen Chen, Petros Maniatis, Adrian Perrig, Amit Vasudevan, Vyas Sekar.
In Proceedings of International Conference on Virtual Execution Environments (VEE) 2013. [bibtex] [pdf]


2012


Using Trustworthy Host-Based Information in the Network
Bryan Parno, Zongwei Zhou, Adrian Perrig.
In Proceedings of ACM Workshop on Scalable Trusted Computing (STC) 2012. [bibtex] [pdf]

OTO: Online Trust Oracle for User-Centric Trust Establishment
Tiffany Hyun-Jin Kim, Payas Gupta, Jun Han, Emmanuel Owusu, Jason Hong, Adrian Perrig, Debin Gao.
In Proceedings of ACM Conference on Computer and Communications Security (CCS) 2012. [bibtex] [pdf]

Transparent Key Integrity (TKI): A Proposal for a Public-Key Validation Infrastructure
Tiffany Hyun-Jin Kim, Lin-Shung Huang, Adrian Perrig, Collin Jackson, Virgil Gligor.
Technical report, Carnegie Mellon University 2012. [bibtex] [pdf]

Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems
Lorenzo Martignoni, Pongsin Poosankam, Matei Zaharia, Jun Han, Stephen McCamant, Dawn Song, Vern Paxson, Adrian Perrig, Scott Shenker, Ion Stoica.
In Proceedings of USENIX Annual Technical Conference (USENIX ATC) 2012. [bibtex] [pdf]

Lockdown: Towards a Safe and Practical Architecture for Security Applications on Commodity Platforms
Amit Vasudevan, Bryan Parno, Ning Qu, Virgil Gligor, Adrian Perrig.
In Proceedings of International Conference on Trust and Trustworthy Computing (TRUST) 2012. [bibtex] [pdf]

LAP: Lightweight Anonymity and Privacy
Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim, Adrian Perrig, Akira Yamada, Samuel C. Nelson, Marco Gruteser, Wei Meng.
In Proceedings of IEEE Symposium on Security and Privacy 2012. [bibtex] [pdf]

CARMA: A Hardware Tamper-Resistant Isolated Execution Environment on Commodity x86 Platforms
Amit Vasudevan, Jonathan McCune, James Newsome, Adrian Perrig, Leendert van Doorn.
In Proceedings of ACM Symposium on Information, Computer and Communications Security (ASIACCS) 2012. [bibtex] [pdf]

Secure and Scalable Network Fault Localization under Dynamic Traffic Patterns
Xin Zhang, Chang Lan, Adrian Perrig.
In Proceedings of IEEE Symposium on Security and Privacy 2012. [bibtex] [pdf]

Street-Level Trust Semantics for Attribute Authentication
Tiffany Hyun-Jin Kim, Virgil Gligor, Adrian Perrig.
In Proceedings of International Workshop on Security Protocols 2012. [bibtex] [pdf]

ACCessory: Keystroke Inference using Accelerometers on Smartphones
Emmanuel Owusu, Jun Han, Sauvik Das, Adrian Perrig, Joy Zhang.
In Procceedings of Workshop on Mobile Computing Systems and Applications (HotMobile) 2012. [bibtex] [pdf]

Cyber-Physical Security of a Smart Grid Infrastructure
Yilin Mo, Tiffany Hyun-Jin Kim, Kenneth Brancik, Dona Dickinson, Heejo Lee, Adrian Perrig, Bruno Sinopoli.
In Proceedings of the IEEE volume 100(1) 2012. [bibtex] [pdf]

ACComplice: Location Inference using Accelerometers on Smartphones
Jun Han, Emmanuel Owusu, Thanh-Le Nguyen, Adrian Perrig, Joy Zhang.
In Proceedings of International Conference on Communication Systems and Networks (COMSNETS) 2012. [bibtex] [pdf]

GeoPKI: Converting Spatial Trust into Certificate Trust
Tiffany Hyun-Jin Kim, Virgil Gligor, Adrian Perrig.
In Proceedings of European PKI Workshop (EuroPKI) 2012. [bibtex] [pdf]

ShortMAC: Efficient Data Plane Fault Localization
Xin Zhang, Zongwei Zhou, Hsu-Chun Hsiao, Adrian Perrig, Patrick Tague.
In Proceedings of Network and Distributed System Security Symposium (NDSS) 2012. [bibtex] [pdf]


2011


Bootstrapping Trust in Modern Computers
Bryan Parno, Jonathan M. McCune, Adrian Perrig.
SpringerBriefs in Computer Science 2011. [bibtex] [pdf]

PFS: Probabilistic Filter Scheduling Against Distributed Denial-of-Service Attacks
Dongwon Seo, Heejo Lee, Adrian Perrig.
In Proceedings of IEEE Conference on Local Computer Networks (LCN) 2011. [bibtex] [pdf]

A Picture is Worth a Thousand Words: Improving Usability and Robustness of Online Recommendation Systems
Tiffany Hyun-Jin Kim, Virgil Gligor, Adrian Perrig.
In Proceedings of IEEE International Conference on Computer Communications and Networks (ICCCN) 2011. [bibtex] [pdf]

Short Paper: Jamming-Resilient Multipath Routing Leveraging Availability-Based Correlation
Hossen Mustafa, Xin Zhang, Zhenhua Liu, Wenyuan Xu, Adrian Perrig.
In Proceedings of ACM Conference on Wireless Network Security (WiSec) 2011. [bibtex] [pdf]

Efficient and Secure Threshold-based Event Validation for VANETs
Hsu-Chun Hsiao, Ahren Studer, Rituik Dubey, Elaine Shi, Adrian Perrig.
In Proceedings of ACM Conference on Wireless Network Security (WiSec) 2011. [bibtex] [pdf]

OMAP:One-way Memory Attestation Protocol for Smart Meters
Kyungsub Song, Dongwon Seo, Haemin Park, Heejo Lee, Adrian Perrig.
In The International Workshop on Smart Grid Security and Communications (SGSC) 2011. [bibtex]

SCION: Scalability, Control, and Isolation On Next-Generation Networks
Xin Zhang, Hsu-Chun Hsiao, Geoffrey Hasker, Haowen Chan, Adrian Perrig, David G. Andersen.
In Proceedings of IEEE Symposium on Security and Privacy 2011. [bibtex] [pdf]

Secure and Efficient Capability-based Power Management in the Smart Grid
Dongwon Seo, Heejo Lee, Adrian Perrig.
In The International Workshop on Smart Grid Security and Communications (SGSC) 2011. [bibtex]

Access Right Assignment Mechanisms for Secure Home Networks
Tiffany Hyun-Jin Kim, Lujo Bauer, James Newsome, Adrian Perrig, Jesse Walker.
In Journal of Communications and Networks volume 13(2) 2011. [bibtex] [pdf]

XTRec: Secure Real-time Execution Trace Recording on Commodity Platforms
Amit Vasudevan, Ning Qu, Adrian Perrig.
In Proceedings of IEEE Hawaii International Conference in System Sciences (HICSS) 2011. [bibtex] [pdf]

Network Fault Localization with Small TCB
Xin Zhang, Zongwei Zhou, Geoff Hasker, Adrian Perrig, Virgil Gligor.
In Proceedings of IEEE International Conference on Network Protocols (ICNP) 2011. [bibtex] [pdf]

VIPER: Verifying the Integrity of Peripherals' Firmware
Yanlin Li, Jonathan M. McCune, Adrian Perrig.
In Proceedings of ACM Conference on Computer and Communications Security (CCS) 2011. [bibtex] [pdf]

RelationGrams: Tie-Strength Visualization for User-Controlled Online Identity Authentication
Tiffany Hyun-Jin Kim, Akira Yamada, Virgil Gligor, Jason Hong, Adrian Perrig.
Technical report, Carnegie Mellon University 2011. [bibtex] [pdf]

Flooding-Resilient Broadcast Authentication for VANETs
Hsu-Chun Hsiao, Ahren Studer, Chen Chen, Adrian Perrig, Fan Bai, Bhargav Bellur, Aravind Iyer.
In In Proceedings of ACM Annual International Conference on Mobile Computing and Networking (MobiCom) 2011. [bibtex] [pdf]

Secure Distributed Data Aggregation
Haowen Chan, Hsu-Chun Hsiao, Adrian Perrig, Dawn Song.
In Journal of Foundations and Trends in Databases volume 3(3) 2011. [bibtex] [pdf]


2010


Correlation-Resilient Path Selection in Multi-Path Routing
Xin Zhang, Adrian Perrig.
In Proceedings of IEEE Global Communications Conference (Globecom) 2010. [bibtex] [pdf]

Ho-Po Key: Leveraging Physical Constraints on Human Motion to Authentically Exchange Information in a Group
Ghita Mezzour, Ahren Studer, Michael Farb, Jason Lee, Jonathan McCune, Hsu-Chun Hsiao, Adrian Perrig.
Technical report, Carnegie Mellon University 2010. [bibtex] [pdf]

VANET Alert Endorsement Using Multi-Source Filters
Tiffany Hyun-Jin Kim, Ahren Studer, Rituik Dubey, Xin Zhang, Adrian Perrig, Fan Bai, Bhargav Bellur, Aravind Iyer.
In Proceedings of ACM International Workshop on Vehicular Ad Hoc Networks (VANET) 2010. [bibtex] [pdf]

Challenges in Access Right Assignment for Secure Home Networks
Tiffany Hyun-Jin Kim, Lujo Bauer, James Newsome, Adrian Perrig, Jesse Walker.
In Proceedings of USENIX Workshop on Hot Topics in Security (HotSec) 2010. [bibtex] [pdf]

Requirements for an Integrity-Protected Hypervisor on the x86 Hardware Virtualized Architecture
Amit Vasudevan, Jonathan M. McCune, Ning Qu, Leendert van Doorn, Adrian Perrig.
In Proceedings of International Conference on Trust and Trustworthy Computing (Trust) 2010. [bibtex] [pdf]

SBAP: Software-Based Attestation for Peripherals
Yanlin Li, Jonathan M. McCune, Adrian Perrig.
In Proceedings of International Conference on Trust and Trustworthy Computing (Trust) 2010. [bibtex] [pdf]

TrustVisor: Efficient TCB Reduction and Attestation
Jonathan M. McCune, Yanlin Li, Ning Qu, Zongwei Zhou, Anupam Datta, Virgil Gligor, Adrian Perrig.
In Proceedings of IEEE Symposium on Security and Privacy 2010. [bibtex] [pdf]

Round-Effcient Broadcast Authentication Protocols for Fixed Topology Classes
Haowen Chan, Adrian Perrig.
In Proceedings of IEEE Symposium on Security and Privacy 2010. [bibtex] [pdf]

Bootstrapping Trust in Commodity Computers
Bryan Parno, Jonathan M. McCune, Adrian Perrig.
In Proceedings of IEEE Symposium on Security and Privacy 2010. [bibtex] [pdf]

Refutation of ``On the Difficulty of Software-Based Attestation of Embedded Devices''
Adrian Perrig, Leendert van Doorn.
2010. [bibtex] [pdf]

Mobile User Location-specific Encryption (MULE): Using Your Office as Your Password
Ahren Studer, Adrian Perrig.
In Proceedings of ACM Conference on Wireless Network Security (WISEC) 2010. [bibtex] [pdf]

SPATE: Small-Group PKI-Less Authenticated Trust Establishment
Yue-Hsun Lin, Ahren Studer, Yao-Hsin Chen, Hsu-Chun Hsiao, Li-Hsiang Kuo, Jason Lee, Jonathan M. McCune, King-Hang Wang, Maxwell Krohn, Phen-Lan Lin, Adrian Perrig, Hung-Min Sun, Bo-Yin Yang.
In IEEE Transactions on Mobile Computing IEEE Computer Society 2010. [bibtex] [pdf] [doi]

Dependable Connection Setup for Network Capabilities
Soo Bum Lee, Virgil Gligor, Adrian Perrig.
In Proceedings of IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) 2010. [bibtex] [pdf]


2009


A Study of User-Friendly Hash Comparison Schemes
Hsu-Chun Hsiao, Yue-Hsun Lin, Ahren Studer, Cassandra Studer, King-Hang Wang, Hiroaki Kikuchi, Adrian Perrig, Hung-Min Sun, Bo-Yin Yang.
In Proceedings of Computer Security Applications Conference (ACSAC) 2009. [bibtex] [pdf]

Privacy-Preserving Relationship Path Discovery in Social Networks
Ghita Mezzour, Adrian Perrig, Virgil Gligor, Panos Papadimitratos.
In Proceedings of International Conference on Cryptology and Network Security (CANS) 2009. [bibtex] [pdf]

Flexible, Extensible, and Efficient VANET Authentication
Ahren Studer, Fan Bai, Bhargav Bellur, Adrian Perrig.
In Journal of Communications and Networks volume 11(6) 2009. [bibtex] [pdf]

The Coremelt Attack
Ahren Studer, Adrian Perrig.
In Proceedings of European Symposium on Research in Computer Security (ESORICS) 2009. [bibtex] [pdf]

SPATE: Small-group PKI-less Authenticated Trust Establishment
Yue-Hsun Lin, Ahren Studer, Hsu-Chin Hsiao, Jonathan M. McCune, King-Hang Wang, Maxwell Krohn, Phen-Lan Lin, Adrian Perrig, Hung-Min Sun, Bo-Yin Yang.
In Proceedings of Annual International Conference on Mobile Systems, Applications and Services (MobiSys) 2009. [bibtex] [pdf]

TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs
Ahren Studer, Elaine Shi, Fan Bai, Adrian Perrig.
In Proceedings of IEEE Communications Society Conference on Sensor, Mesh, and Ad Hoc Communications and Networks (SECON) 2009. [bibtex] [pdf]

Centaur: A Hybrid Approach for Reliable Policy-Based Routing
Xin Zhang, Adrian Perrig, Hui Zhang.
In Proceedings of International Conference on Distributed Computing Systems (ICDCS) 2009. [bibtex] [pdf]

CLAMP: Practical Prevention of Large-Scale Data Leaks
Bryan Parno, Jonathan M. McCune, Dan Wendlandt, David G. Andersen, Adrian Perrig.
In Proceedings of IEEE Symposium on Security and Privacy 2009. [bibtex] [pdf]

Safe Passage for Passwords and Other Sensitive Data
Jonathan M. McCune, Adrian Perrig, Michael K. Reiter.
In Proceedings of Symposium on Network and Distributed Systems Security (NDSS) 2009. [bibtex] [pdf]

Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication
Jonathan M. McCune, Adrian Perrig, Michael K. Reiter.
In International Journal of Security and Networks Special Issue on Secure Spontaneous Interaction volume 4(1--2) 2009. [bibtex] [pdf]


2008


Packet-dropping Adversary Identification for Data Plane Security
Xin Zhang, Abhishek Jain, Adrian Perrig.
In Proceedings of ACM SIGCOMM International Conference on emerging Networking EXperiments and Technologies (CoNEXT) 2008. [bibtex] [pdf]

Flexible, Extensible, and Efficient VANET Authentication
Ahren Studer, Fan Bai, Bhargav Bellur, Adrian Perrig.
In Proceedings of Embedded Security in Cars Workshop (ESCAR) 2008. [bibtex] [pdf]

Efficient Security Primitives Derived from a Secure Aggregation Algorithm
Haowen Chan, Adrian Perrig.
In Proceedings of ACM Conference on Computer and Communications Security (CCS) 2008. [bibtex] [pdf]

GAnGS: Gather Authenticate 'n Group Securely
Chia-Hsin Owen Chen, Chung-Wei Chen, Cynthia Kuo, Yan-Hao Lai, Jonathan M. McCune, Ahren Studer, Adrian Perrig, Bo-Yin Yang, Tzong-Chen Wu.
In Proceedings of ACM International Conference on Mobile Computing and Networking (MobiCom) 2008. [bibtex] [pdf]

SAKE: Software Attestation for Key Establishment in Sensor Networks
Arvind Seshadri, Mark Luk, Adrian Perrig.
In Proceedings of International Conference on Distributed Computing in Sensor Systems (DCOSS) 2008. [bibtex] [pdf]

Perspectives: Improving SSH-style Host Authentication with Multi-Path Probing
Dan Wendlandt, David G. Andersen, Adrian Perrig.
In Proceedings of USENIX Annual Technical Conference (USENIX ATC) 2008. [bibtex] [pdf]

Mechanisms to Provide Integrity in SCADA and PCS devices
Aakash Shah, Adrian Perrig, Bruno Sinopoli.
In Proceedings of International Workshop on Cyber-Physical Systems Challenges and Applications (CPS-CA) 2008. [bibtex] [pdf]

Remote Detection of Virtual Machine Monitors with Fuzzy Benchmarking
Jason Franklin, Mark Luk, Jonathan M. McCune, Arvind Seshadri, Adrian Perrig, Leendert van Doorn.
In ACM SIGOPS Operating System Review (Special Issue on Computer Forensics) 2008. [bibtex] [pdf]

Flicker: An Execution Infrastructure for TCB Minimization
Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, Hiroshi Isozaki.
In Proceedings of ACM European Conference in Computer Systems (EuroSys) 2008. [bibtex] [pdf]

SNAPP: Stateless Network-Authenticated Path Pinning
Bryan Parno, Adrian Perrig, David G. Andersen.
In Proceedings of ACM Symposium on Information, Computer and Communications Security (ASIACCS) 2008. [bibtex] [pdf]

How Low Can You Go? Recommendations for Hardware-Supported Minimal TCB Code Execution
Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, Arvind Seshadri.
In Proceedings of ACM Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS) 2008. [bibtex] [pdf]

Mind Your Manners: Socially Appropriate Wireless Key Establishment for Groups
Cynthia Kuo, Ahren Studer, Adrian Perrig.
In Proceedings of First ACM Conference on Wireless Network Security (WiSec '08) 2008. [bibtex] [pdf]

Countermeasures against Government-Scale Monetary Forgery
Alessandro Acquisti, Nicolas Christin, Bryan Parno, Adrian Perrig.
In Proceedings of Financial Cryptography and Data Security 12th International Conference 2008. [bibtex] [pdf]

Securing User-controlled Routing Infrastructures
Karthik Lakshminarayanan, Daniel Adkins, Adrian Perrig, Ion Stoica.
In IEEE/ACM Transactions on Networking volume 16(3) 2008. [bibtex] [pdf]


2007


An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants
Jason Franklin, Vern Paxson, Adrian Perrig, Stefan Savage.
In Proceedings of ACM Conference on Computer and Communications Security (CCS) 2007. [bibtex] [pdf]

Don't Sweat Your Privacy: Using Humidity to Detect Human Presence
Jun Han, Abhishek Jain, Mark Luk, Adrian Perrig.
In Proceedings of International Workshop on Privacy in UbiComp (UbiPriv) 2007. [bibtex] [pdf]

Efficient Mechanisms to Provide Convoy Member and Vehicle Sequence Authentication in VANETs
Ahren Studer, Mark Luk, Adrian Perrig.
In Proceedings of International Conference on Security and Privacy in Communication Networks (SecureComm) 2007. [bibtex] [pdf]

Turtles All The Way Down: Research Challenges in User-Based Attestation
Jonathan M. McCune, Adrian Perrig, Arvind Seshadri, Leendert van Doorn.
In Proceedings of Workshop on Hot Topics in Security (HotSec) 2007. [bibtex] [pdf]

Portcullis: Protecting Connection Setup from Denial-of-Capability Attacks
Bryan Parno, Dan Wendlandt, Elaine Shi, Adrian Perrig, Bruce Maggs, Yih-Chun Hu.
In Proceedings of ACM SIGCOMM 2007. [bibtex] [pdf]

Multi-Dimensional Range Query over Encrypted Data
Elaine Shi, John Bethencourt, Hubert Chan, Dawn Song, Adrian Perrig.
In IEEE Symposium on Security and Privacy 2007. [bibtex] [pdf]

Minimal TCB Code Execution (Extended Abstract)
Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, Arvind Seshadri.
In Proceedings of IEEE Symposium on Security and Privacy 2007. [bibtex] [pdf]

MiniSec: A Secure Sensor Network Communication Architecture
Mark Luk, Ghita Mezzour, Adrian Perrig, Virgil Gligor.
In Proceedings of IEEE International Conference on Information Processing in Sensor Networks (IPSN) 2007. [bibtex] [pdf]

BASE: An Incrementally Deployable Mechanism for Viable IP Spoofing Prevention
Heejo Lee, Minjin Kwon, Geoffrey Hasker, Adrian Perrig.
In Proceedings of ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS) 2007. [bibtex] [pdf]

Low-cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup
Cynthia Kuo, Jesse Walker, Adrian Perrig.
In Usable Security (USEC) 2007. [bibtex] [pdf]

PRISM: Enabling Personal Verification of Code Integrity, Untampered Execution, and Trusted I/O on Legacy Systems or Human-Verifiable Code Execution
Jason Franklin, Mark Luk, Arvind Seshadri, Adrian Perrig.
Technical report, CyLab 2007. [bibtex] [pdf]

Rapid Trust Establishment for Pervasive Personal Computing
Ajay Surie, Adrian Perrig, Mahadev Satyanarayanan, David Farber.
In IEEE Pervasive Computing volume 6(4) 2007. [bibtex] [pdf]

Pioneer: Verifying Code Integrity and Enforcing Untampered Code Execution on Legacy Systems
Arvind Seshadri, Mark Luk, Adrian Perrig, Leendert van Doorn, Pradeep Khosla.
Chapter in Malware Detection (Mihai Christodorescu, Somesh Jha, Douglas Maughan, Dawn Song, Cliff Wang, eds.) Springer Verlag 2007. [bibtex] [pdf]

SecVisor: A Tiny Hypervisor to Provide Lifetime Kernel Code Integrity for Commodity OSes
Arvind Seshadri, Mark Luk, Ning Qu, Adrian Perrig.
In Proceedings of ACM Conference on Operating Systems Principles (SOSP) 2007. [bibtex] [pdf]

Message-In-a-Bottle: User-Friendly and Secure Key Deployment for Sensor Nodes
Cynthia Kuo, Mark Luk, Rohit Negi, Adrian Perrig.
In Proceedings of ACM Conference on Embedded Networked Sensor System (SenSys) 2007. [bibtex] [pdf]

SIA: Secure Information Aggregation in Sensor Networks
Haowen Chan, Adrian Perrig, Bartosz Przydatek, Dawn Song.
In Journal of Computer Security (Special Issue on Security of Ad Hoc and Sensor Networks) volume 15(1) 2007. [bibtex] [pdf]


2006


Secure Sensor Network Routing: A Clean-Slate Approach
Bryan Parno, Mark Luk, Evan Gaustad, Adrian Perrig.
In Proceedings of Conference on Future Networking Technologies (CoNEXT) 2006. [bibtex] [pdf]

(R)Evolutionary Bootstrapping of a Global PKI for Securing BGP
Yih-Chun Hu, David McGrew, Adrian Perrig, Brian Weis, Dan Wendlandt.
In Fifth Workshop on Hot Topics in Networks (HotNets-V) 2006. [bibtex] [pdf]

Secure Hierarchical In-network Aggregation for Sensor Networks
Haowen Chan, Adrian Perrig, Dawn Song.
In Proceedings of ACM Conference on Computer and Communications Security (CCS) 2006. [bibtex] [pdf]

Seven Cardinal Properties of Sensor Network Broadcast Authentication
Mark Luk, Adrian Perrig, Bram Whillock.
In Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2006) 2006. [bibtex] [pdf]

StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense
Abraham Yaar, Adrian Perrig, Dawn Song.
In IEEE Journal on Selected Areas in Communications volume 24(10) 2006. [bibtex] [pdf]

SCUBA: Secure Code Update By Attestation in Sensor Networks
Arvind Seshadri, Mark Luk, Adrian Perrig, Leendert van Doorn, Pradeep Khosla.
In Proceedings of ACM Workshop on Wireless Security (WiSe) 2006. [bibtex] [pdf]

Modeling Adoptability of Secure BGP Protocols
Haowen Chan, Debabrata Dash, Adrian Perrig, Hui Zhang.
In Proceedings of ACM SIGCOMM 2006. [bibtex] [pdf]

Externally Verifiable Code Execution
Arvind Seshadri, Mark Luk, Adrian Perrig, Leendert van Doorn, Pradeep Khosla.
In Communications of the ACM volume 49(9) 2006. [bibtex] [pdf]

A Distributed Stealthy Coordination Mechanism for Worm Synchronization
Gaurav Kataria, Gaurav Anand, Rudolph Araujo, Ramayya Krishnan, Adrian Perrig.
In Proceedings of International Conference on Security and Privacy in Communication Networks (SecureComm) 2006. [bibtex] [pdf]

Bump in the Ether: A Framework for Securing Sensitive User Input
Jonathan M. McCune, Adrian Perrig, Michael K. Reiter.
In Proceedings of USENIX Annual Technical Conference (USENIX ATC) 2006. [bibtex] [pdf]

FastPass: Providing First-Packet Delivery
Dan Wendlandt, David G. Andersen, Adrian Perrig.
Technical report, CyLab 2006. [bibtex] [pdf]

Phoolproof Phishing Prevention
Bryan Parno, Cynthia Kuo, Adrian Perrig.
In Proceedings of International Conference on Financial Cryptography and Data Security (FC) 2006. [bibtex] [pdf]

Designing an Evaluation Method for Security User Interfaces: Lessons from Studying Secure Wireless Network Configuration
Cynthia Kuo, Adrian Perrig, Jesse Walker.
In ACM Interactions volume 13(3) 2006. [bibtex] [pdf]

Browser Enhancements for Preventing Phishing Attacks
Cynthia Kuo, Bryan Parno, Adrian Perrig.
Chapter in Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft (Markus Jakobsson, Steven Myers, eds.) Wiley-Interscience 2006. [bibtex]


2005


Challenges in Securing Vehicular Networks
Bryan Parno, Adrian Perrig.
In Proceedings of Workshop on Hot Topics in Networks (HotNets-IV) 2005. [bibtex] [pdf]

Pioneer: Verifying Code Integrity and Enforcing Untampered Code Execution on Legacy Systems
Arvind Seshadri, Mark Luk, Elaine Shi, Adrian Perrig, Leendert van Doorn, Pradeep Khosla.
In Proceedings of ACM Symposium on Operating Systems Principles (SOSP) 2005. [bibtex] [pdf]

A Clean-Slate Design for the Next-Generation Secure Internet
Steven Bellovin, David Clark, Adrian Perrig, Dawn Song.
Pittsburgh, PA: Report for NSF Global Environment for Network Innovations (GENI) workshop 2005. [bibtex] [pdf]

Using Clustering Information for Sensor Network Localization
Haowen Chan, Mark Luk, Adrian Perrig.
In Proceedings of IEEE Conference on Distributed Computing in Sensor Systems (DCOSS 2005) 2005. [bibtex] [pdf]

Efficient Constructions for One-way Hash Chains
Yih-Chun Hu, Markus Jakobsson, Adrian Perrig.
In Applied Cryptography and Network Security (ACNS) 2005. [bibtex] [pdf]

Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication
Jonathan M. McCune, Adrian Perrig, Michael K. Reiter.
In Proceedings of IEEE Symposium on Security and Privacy 2005. [bibtex] [pdf]

Detection of Denial-of-Message Attacks on Sensor Network Broadcasts
Jonathan McCune, Elaine Shi, Adrian Perrig, Michael K. Reiter.
In Proceedings of IEEE Symposium on Security and Privacy 2005. [bibtex] [pdf]

BIND: A Fine-grained Attestation Service for Secure Distributed Systems
Elaine Shi, Adrian Perrig, Leendert Van Doorn.
In Proceedings of IEEE Symposium on Security and Privacy 2005. [bibtex] [pdf]

Distributed Detection of Node Replication Attacks in Sensor Networks
Bryan Parno, Adrian Perrig, Virgil Gligor.
In Proceedings of IEEE Symposium on Security and Privacy 2005. [bibtex] [pdf]

NATBLASTER: Establishing TCP Connections Between Hosts Behind NATs
Andrew Biggadike, Daniel Ferullo, Geoffrey Wilson, Adrian Perrig.
In Proceedings of ACM SIGCOMM ASIA Workshop 2005. [bibtex] [pdf]

PIKE: Peer Intermediaries for Key Establishment in Sensor Networks
Haowen Chan, Adrian Perrig.
In Proceedings of IEEE Infocom 2005. [bibtex] [pdf]

FIT: Fast Internet Traceback
Avi Yaar, Adrian Perrig, Dawn Song.
In Proceedings of IEEE Infocom 2005. [bibtex] [pdf]

FANFARE for the Common Flow
Elaine Shi, Bryan Parno, Adrian Perrig, Yih-Chun Hun, Bruce Maggs.
Technical report, CyLab 2005. [bibtex] [pdf]

Empowering Ordinary Consumers to Securely Configure their Mobile Devices and Wireless Networks
Cynthia Kuo, Vincent Goh, Adrian Tang, Adrian Perrig, Jesse Walker.
Technical report, CyLab 2005. [bibtex]

Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks
Yih-Chun Hu, Adrian Perrig, David B. Johnson.
In Wireless Networks Journal volume 11(1) 2005. [bibtex] [pdf]

On the Distribution and Revocation of Cryptographic Keys in Sensor Networks
Haowen Chan, Virgil Gligor, Adrian Perrig, Gautam Muralidharan.
In IEEE Transactions on Dependable and Secure Computing (TDSC) volume 2(3) 2005. [bibtex] [pdf]


2004


Designing Secure Sensor Networks
Elaine Shi, Adrian Perrig.
In Wireless Communication Magazine volume 11(6) 2004. [bibtex] [pdf]

Using SWATT for Verifying Embedded Systems in Cars
Arvind Seshadri, Adrian Perrig, Leendert van Doorn, Pradeep Khosla.
In Proceedings of Embedded Security in Cars Workshop (ESCAR) 2004. [bibtex] [pdf]

Key Infection: Smart Trust for Smart Dust
Ross Anderson, Haowen Chan, Adrian Perrig.
In Proceedings of IEEE International Conference on Network Protocols (ICNP) 2004. [bibtex] [pdf]

SPV: Secure Path Vector Routing for Securing BGP
Yih-Chun Hu, Adrian Perrig, Marvin Sirbu.
In Proceedings of ACM SIGCOMM 2004. [bibtex] [pdf]

SIFF: A Stateless Internet Flow Filter to Mitigate DDoS Flooding Attacks
Avi Yaar, Adrian Perrig, Dawn Song.
In Proceedings of IEEE Symposium on Security and Privacy 2004. [bibtex] [pdf]

SWATT: Software-based Attestation for Embedded Devices
Arvind Seshadri, Adrian Perrig, Leendert van Doorn, Pradeep Khosla.
In Proceedings of IEEE Symposium on Security and Privacy 2004. [bibtex] [pdf]

The Sybil Attack in Sensor Networks: Analysis and Defenses
James Newsome, Runting Shi, Dawn Song, Adrian Perrig.
In Proceedings of IEEE International Conference on Information Processing in Sensor Networks (IPSN) 2004. [bibtex] [pdf]

ACE: An Emergent Algorithm for Highly Uniform Cluster Formation
Haowen Chan, Adrian Perrig.
In Proceedings of European Workshop on Wireless Sensor Networks (EWSN) 2004. [bibtex] [pdf]

A Survey of Secure Wireless Ad Hoc Routing
Yih-Chun Hu, Adrian Perrig.
In IEEE Security & Privacy volume 2(3) 2004. [bibtex] [pdf]

Taming IP Packet Flooding Attacks
Daniel Adkins, Karthik Lakshminarayanan, Adrian Perrig, Ion Stoica.
In ACM SIGCOMM Computer Communication Review volume 34(1) 2004. [bibtex]


2003


Taming IP Packet Flooding Attacks
Daniel Adkins, Karthik Lakshminarayanan, Adrian Perrig, Ion Stoica.
In Proceedings of Workshop on Hot Topics in Networks (HotNets-II) 2003. [bibtex] [pdf]

SIA: Secure Information Aggregation in Sensor Networks
Bartosz Przydatek, Dawn Song, Adrian Perrig.
In Proceedings of ACM SenSys 2003. [bibtex] [pdf]

Security and Privacy in Sensor Networks
Haowen Chan, Adrian Perrig.
In IEEE Computer Magazine 2003. [bibtex] [pdf]

Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols
Yih-Chun Hu, Adrian Perrig, David B. Johnson.
In Proceedings of ACM Workshop on Wireless Security (WiSe) 2003. [bibtex] [pdf]

Opportunistic Use of Content Addressable Storage for Distributed File Systems
Niraj Tolia, Michael Kozuch, Mahadev Satyanarayanan, Brad Karp, Thomas Bressoud, Adrian Perrig.
In Proceedings of USENIX Annual Technical Conference (USENIX ATC) 2003. [bibtex] [pdf]

Random Key Predistribution Schemes for Sensor Networks
Haowen Chan, Adrian Perrig, Dawn Song.
In Proceedings of IEEE Symposium on Security and Privacy 2003. [bibtex] [pdf]

Pi: A Path Identification Mechanism to Defend against DDoS Attacks
Avi Yaar, Adrian Perrig, Dawn Song.
In Proceedings of IEEE Symposium on Security and Privacy 2003. [bibtex] [pdf]

Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks
Yih-Chun Hu, Adrian Perrig, David B. Johnson.
In Proceedings of IEEE Infocomm 2003. [bibtex] [pdf]

Efficient Security Mechanisms for Routing Protocols
Yih-Chun Hu, Adrian Perrig, David B. Johnson.
In Network and Distributed System Security Symposium (NDSS) 2003. [bibtex] [pdf]

SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks
Yih-Chun Hu, David B. Johnson, Adrian Perrig.
In Journal of Ad Hoc Networks volume 1(1) 2003. [bibtex] [pdf]


2002


Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks
Yih-Chun Hu, Adrian Perrig, David B. Johnson.
In Proceedings of ACM International Conference on Mobile Computing and Networking (Mobicom) 2002. [bibtex] [pdf]

SPINS: Security Protocols for Sensor Networks
Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J.D. Tygar.
In Journal of Wireless Networks volume 8(5) 2002. [bibtex] [pdf]

Secure Efficient Distance Vector Routing in Mobile Wireless Ad Hoc Networks
Yih-Chun Hu, David B. Johnson, Adrian Perrig.
In Proceedings of IEEE Workshop on Mobile Computing Systems and Applications (WMCSA) 2002. [bibtex] [pdf]

The TESLA Broadcast Authentication Protocol
Adrian Perrig, Ran Canetti, J.D. Tygar, Dawn Song.
In RSA CryptoBytes volume 5(Summer) 2002. [bibtex] [pdf]


2001


The BiBa One-Time Signature and Broadcast Authentication Protocol
Adrian Perrig.
In Proceedings of ACM Conference on Computer and Communications Security (CCS) 2001. [bibtex] [pdf]

SPINS: Security Protocols for Sensor Networks
Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J.D. Tygar.
In Seventh Annual International Conference on Mobile Computing and Networks (MobiCom) 2001. [bibtex] [pdf]

AGVI --- Automatic Generation, Verification, and Implementation of Security Protocols
Dawn Song, Adrian Perrig, Doantam Phan.
In Proceedings of Conference on Computer Aided Verification (CAV) 2001. [bibtex] [pdf]

Communication-Efficient Group Key Agreement
Yongdae Kim, Adrian Perrig, Gene Tsudik.
In International Federation for Information Processing (IFIP SEC) 2001. [bibtex] [pdf]

ELK, a New Protocol for Efficient Large-Group Key Distribution
Adrian Perrig, Dawn Song, Doug Tygar.
In Proceedings of IEEE Symposium on Security and Privacy 2001. [bibtex] [pdf]

SAM: A Flexible and Secure Auction Architecture Using Trusted Hardware
Adrian Perrig, Sean Smith, Dawn Song, J.D. Tygar.
In First International Workshop on Internet Computing and E-Commerce (ICEC'01) 2001. [bibtex] [pdf]

Efficient and Secure Source Authentication for Multicast
Adrian Perrig, Ran Canetti, Dawn Song, J.D. Tygar.
In Network and Distributed System Security Symposium (NDSS) 2001. [bibtex] [pdf]


2000


Déjà Vu: A User Study, Using Images for Authentication
Rachna Dhamija, Adrian Perrig.
In Proceedings of USENIX Security Symposium 2000. [bibtex] [pdf]

Efficient Authentication and Signing of Multicast Streams over Lossy Channels
Adrian Perrig, Ran Canetti, J.D. Tygar, Dawn Xiaodong Song.
In IEEE Symposium on Security and Privacy 2000. [bibtex] [pdf]

Practical Techniques for Searches on Encrypted Data
Dawn Xiaodong Song, David Wagner, Adrian Perrig.
In Proceedings of IEEE Symposium on Security and Privacy 2000. [bibtex] [pdf]

A First Step towards the Automatic Generation of Security Protocols
Adrian Perrig, Dawn Song.
In Proceedings of Network and Distributed System Security Symposium (NDSS) 2000. [bibtex] [pdf]

Simple and fault-tolerant key agreement for dynamic collaborative groups
Yongdae Kim, Adrian Perrig, Gene Tsudik.
In Proceedings of ACM Conference on Computer and Communications Security (CCS) 2000. [bibtex] [pdf]


1999


Efficient Collaborative Key Management Protocols for Secure Autonomous Group Communication
Adrian Perrig.
In Proceedings of International Workshop on Cryptographic Techniques and E-Commerce (CrypTEC) 1999. [bibtex] [pdf]

Hash Visualization: A New Technique to Improve Real-World Security
Adrian Perrig, Dawn Song.
In Proceedings of International Workshop on Cryptographic Techniques and E-Commerce (CrypTEC) 1999. [bibtex] [pdf]