On this page we have videos of CrySP members presenting their research.
VLDB 2023
- Miti Mazmudar, "Cache Me If You Can: Accuracy-Aware Inference Engine for Differentially Private Data Exploration"
Oakland 2023
- Ru Ji, "Finding Specification Blind Spots via Fuzz Testing"
- Andre Kassis, "Breaking Security-Critical Voice Authentication"
- Nils Lukas, "Analyzing Leakage of Personally Identifiable Information in Language Models"
- Nils Lukas (presenting Florian Kerschbaum's paper), "Private Collaborative Data Cleaning via Non-Equi PSI"
Real World Cryptography 2023
- Elizabeth Crites, Tim Ruffing, Chelsea Komlo, "From Theory to Practice to Theory: Lessons Learned in Multi-Party Schnorr Signatures"
CCS 2022
- Thomas Humphries, "Selective MPC: Distributed Computation of Differentially Private Key-Value Statistics"
WPES 2022
- Stan Gurtler, "PRSONA: Private Reputation Supporting Ongoing Network Avatars"
Crypto 2022
- Chelsea Komlo, "Threshold Signatures with Private Accountability"
USENIX Security 2022
- Bailey Kacsmar, "Caring about Sharing: User Perceptions of Multiparty Data Sharing"
- Rasoul Akhavan Mahdavi, "Constant-weight PIR: Single-round Keyword PIR via Constant-weight Equality"
- Simon Oya, "IHOP: Improved Statistical Query Recovery against Searchable Symmetric Encryption through Quadratic Optimization"
ACNS 2022
- Sajin Sasy, "Improving the Privacy of Tor Onion Services"
Stinson66 - New Advances in Designs, Codes and Cryptography
- Ian Goldberg, "FROST: Flexible Round-Optimized Schnorr Threshold Signatures"
Cryptography Research Centre Seminar Series, Technology Innovation Institute, UAE
- Douglas Stebila, "Recent results for KEMTLS"
Oakland 2022
CCS 2021
- Zeinab El-Rewini, "Dissecting Residual APIs in Custom Android ROMs"
WPES 2021
- Akshaya Mani, "ZXAD: High-volume Attack Mitigation for Tor"
- Anna Harbluk Lorimer, "OUStralopithecus: Overt User Simulation for Censorship Circumvention"
- Miti Mazmudar, "Do You Feel a Chill? Using PIR Against Chilling Effects for Censorship-resistant Publishing"
Latincrypt 2021
- Shannon Veitch, "Improved attacks against key reuse in learning with errors key exchange"
ARES 2021
USENIX Security 2021
- Yousra Aafer, "Android SmartTVs Vulnerability Discovery via Log-Guided Fuzzing"
- Hans Liljestrand, "PACStack: an Authenticated Call Stack"
- Simon Oya, "Hiding the Access Pattern is Not Enough: Exploiting Search Pattern Leakage in Searchable Encryption"
PETS 2021
- Stan Gurtler, "SoK: Privacy-Preserving Reputation Systems"
NDSS 2021
ACSAC 2020
- Rasoul Akhavan Mahdavi, "Practical Over-Threshold Multi-Party Private Set Intersection"
SAC 2020
- Chelsea Komlo, "FROST: Flexible Round-Optimized Schnorr Threshold Signatures" (extended version presented at University College London Dec 2020)
PQCrypto 2020
VLDB 2020
- Simeon Krastnikov, "Oblivious Database Joins"
USENIX Security 2020
- Jiayi Chen, "Chaperone: Real-time Locking and Loss Prevention for Smartphones"
- Chelsea Komlo, "Walking Onions: Scaling Anonymity Networks while Protecting Users"
PETS 2020
- Bailey Kacsmar, "Mind the Gap: Ceremonies for Applied Secret Sharing"
- Miti Mazmudar, "Mitigator: Privacy policy compliance using trusted hardware"
ICDE 2020
CCS 2019
QCon 2019
- Brittany Postnikoff, "Robot Social Engineering: Social Engineering Using Physical Robots"
USENIX Security 2019
- Hans Liljestrand, "PAC it up: Towards Pointer Integrity using ARM Pointer Authentication"
PETS 2019
- Sajin Sasy, "ConsenSGX: Scaling Anonymous Communications Networks with Trusted Execution Environments"
- Dhinakaran Vinayagamurthy, "StealthDB: a Scalable Encrypted Database with Full SQL Query Support"
PETS 2018
- Cecylia Bocovich, "Secure asymmetry and deployability for decoy routing systems"
USENIX Security 2017
NSERC Science, Action! 2017
- Cecylia Bocovich, "Censorship Circumvention Research at the University of Waterloo: Slitheen"
CCS 2016
- Cecylia Bocovich, "Slitheen: Perfectly imitated decoy routing through traffic replacement"
PETS 2016
- Tariq Elahi, "A Framework for the Game-theoretic Analysis of Censorship Resistance"
- Tariq Elahi, "SoK: Making Sense of Censorship Resistance Systems"
- Tao Wang, "On Realistically Attacking Tor with Website Fingerprinting"