Albert Kwon
Albert Kwon
Verified email at mit.edu - Homepage
Title
Cited by
Cited by
Year
Constants Count: Practical Improvements to Oblivious RAM
L Ren, C Fletcher, A Kwon, E Stefanov, E Shi, M van Dijk, S Devadas
24th USENIX Security Symposium (USENIX Security 15), 2015
165*2015
Spacemint: A cryptocurrency based on proofs of space
S Park, A Kwon, G Fuchsbauer, P Gaži, J Alwen, K Pietrzak
International Conference on Financial Cryptography and Data Security, 480-499, 2018
1422018
Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services
A Kwon, M AlSabah, D Lazar, M Dacier, S Devadas
24th USENIX Security Symposium (USENIX Security 15), 2015
992015
Freecursive ORAM: [Nearly] Free Recursion and Integrity Verification for Position-based Oblivious RAM
CW Fletcher, L Ren, A Kwon, M Van Dijk, S Devadas
Proceedings of the Twentieth International Conference on Architectural …, 2015
90*2015
Low-fat pointers: compact encoding and efficient gate-level implementation of fat pointers for spatial safety and capability-based security
A Kwon, U Dhawan, JM Smith, TF Knight Jr, A DeHon
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
902013
Riffle: An efficient communication system with strong anonymity
A Kwon, D Lazar, S Devadas, B Ford
Proceedings on Privacy Enhancing Technologies 2016 (2), 115-134, 2015
802015
A low-latency, low-area hardware oblivious RAM controller
CW Fletcher, L Ren, A Kwon, M Van Dijk, E Stefanov, D Serpanos, ...
2015 IEEE 23rd Annual International Symposium on Field-Programmable Custom …, 2015
63*2015
Atom: Horizontally scaling strong anonymity
A Kwon, H Corrigan-Gibbs, S Devadas, B Ford
SOSP 26, 2017
41*2017
Proram: dynamic prefetcher for oblivious ram
X Yu, SK Haider, L Ren, C Fletcher, A Kwon, M Van Dijk, S Devadas
2015 ACM/IEEE 42nd Annual International Symposium on Computer Architecture …, 2015
38*2015
Beaver: A Decentralized Anonymous Marketplace with Secure Reputation
K Soska, A Kwon, N Christin, S Devadas
242016
Hardware support for safety interlocks and introspection
U Dhawan, A Kwon, E Kadric, C Hritcu, BC Pierce, JM Smith, A DeHon, ...
2012 IEEE Sixth International Conference on Self-Adaptive and Self …, 2012
222012
Design and implementation of the ascend secure processor
L Ren, CW Fletcher, A Kwon, M Van Dijk, S Devadas
IEEE Transactions on Dependable and Secure Computing 16 (2), 204-216, 2017
152017
Var-CNN: A Data-Efficient Website Fingerprinting Attack Based on Deep Learning
S Bhat, D Lu, A Kwon, S Devadas
Proceedings on Privacy Enhancing Technologies 1, 19, 0
14*
{XRD}: Scalable Messaging System with Cryptographic Privacy
A Kwon, D Lu, S Devadas
17th {USENIX} Symposium on Networked Systems Design and Implementation …, 2020
112020
Dynaflow: An efficient website fingerprinting defense based on dynamically-adjusting flows
D Lu, S Bhat, A Kwon, S Devadas
Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 109-113, 2018
52018
Research for practice: private online communication; highlights in systems verification
A Kwon, JR Wilcox, P Bailis
Communications of the ACM 61 (2), 46-49, 2018
1*2018
RotoRouter: Router support for endpoint-authorized decentralized traffic filtering to prevent DoS attacks
A Kwon, K Zhang, PL Lim, Y Pan, JM Smith, A DeHon
2014 International Conference on Field-Programmable Technology (FPT), 183-190, 2014
12014
Network Working Group E. Omara Internet-Draft Google Intended status: Informational B. Beurdouche Expires: July 29, 2020 INRIA
E Rescorla, S Inguva, A Kwon, A Duric
2020
The system can't perform the operation now. Try again later.
Articles 1–18