An empirical analysis of traceability in the monero blockchain M Möser, K Soska, E Heilman, K Lee, H Heffan, S Srivastava, K Hogan, ... arXiv preprint arXiv:1704.04299, 2017 | 341 | 2017 |
Secure boot and remote attestation in the sanctum processor I Lebedev, K Hogan, S Devadas 2018 IEEE 31st Computer Security Foundations Symposium (CSF), 46-60, 2018 | 60 | 2018 |
A universally composable treatment of network time R Canetti, K Hogan, A Malhotra, M Varia 2017 IEEE 30th Computer Security Foundations Symposium (CSF), 360-375, 2017 | 30 | 2017 |
Adveil: A private targeted advertising ecosystem S Servan-Schreiber, K Hogan, S Devadas Cryptology ePrint Archive, 2021 | 16 | 2021 |
Sanctorum: A lightweight security monitor for secure enclaves I Lebedev, K Hogan, J Drean, D Kohlbrenner, D Lee, K Asanović, D Song, ... 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE …, 2019 | 16 | 2019 |
Secure multiparty computation for cooperative cyber risk assessment K Hogan, N Luther, N Schear, E Shen, D Stott, S Yakoubov, ... 2016 IEEE Cybersecurity Development (SecDev), 75-76, 2016 | 13 | 2016 |
On the universally composable security of openstack K Hogan, H Maleki, R Rahaeimehr, R Canetti, M Van Dijk, J Hennessey, ... 2019 IEEE Cybersecurity Development (SecDev), 20-33, 2019 | 11 | 2019 |
A secure cloud with minimal provider trust A Mosayyebzadeh, G Ravago, A Mohan, A Raza, S Tikale, N Schear, ... 10th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 18), 2018 | 11 | 2018 |
Shortor: Improving tor network latency via multi-hop overlay routing K Hogan, S Servan-Schreiber, Z Newman, B Weintraub, C Nita-Rotaru, ... 2022 IEEE Symposium on Security and Privacy (SP), 1933-1952, 2022 | 8 | 2022 |
Moving in next door: Network flooding as a side channel in cloud environments Y Agarwal, V Murale, J Hennessey, K Hogan, M Varia Cryptology and Network Security: 15th International Conference, CANS 2016 …, 2016 | 7 | 2016 |
Mission assurance: Beyond secure processing M Vai, D Whelihan, J Leemaster, H Whitman, W Wan, Y Fei, R Khazan, ... 2018 IEEE International Conference on Software Quality, Reliability and …, 2018 | 5 | 2018 |
Security analysis of Tor over QUIC K Hogan Massachusetts Institute of Technology, 2020 | 2 | 2020 |
1-119: Leveraging the Escrow-Holding Abilities of Ethereum Smart Contracts to Incentivize Account Creation for the Widespread Adoption of Web Monetization Schemes S Lichterfeld, G Rastogi, K Hogan 2024 Joint Mathematics Meetings (JMM 2024), 0 | | |