Karim Eldefrawy

Principal Computer Scientist

Computer Science Laboratory (CSL)
SRI International

(Last Updated: June 2021)

(Email me if you are having problems finidng a PDF of one of my papers)

2021

64- Karim Eldefrawy and Nick Genise, “Efficient Bounded-Collusion Qualified ABE from DDH”, under review. [PDF]

63- Wim van Dam, Karim Eldefrawy, Nick Genise, Natalie Parham, “Quantum Optimization Heuristics with an Application to Knapsack Problems”, under review. [PDF]

62- Jose Bacelar Almeida, Manuel Barbosa, Karim Eldefrawy, Stephane Graham-Lengrand, Hugo Pacheco, and Vitor Pereira, “Machine-checked ZKP for NP-relations: Formally Verified Security Proofs and Implementations of MPC-in-the-Head”, under review. [PDF]

61- Kelong Cong, Karim Eldefrawy, Nigel Smart, “Optimizing Registration Based Encryption”, under review. [PDF]

60- Karim Eldefrawy, Julian Loss, Ben Terner, “Byzantine Agreement for Hybrid Network Settings with Optimal Tolerance to Byzantine and Crash Faults”, under review. [PDF]

59- Karim Eldefrawy, Tancrede Lepoint, Antonin Leroux, “Communication Efficient Proactive Secure Multi-party Computation for Dynamic Groups with Dishonest Majorities”, ongoing work. [PDF]

58- Aysajan Abidin, Karim Eldefrawy, Dave Singlee, “Entanglement-based (Mutual) Quantum Distance Bounding”, ongoing work. [PDF]

57- Daniel Apon, Chongwon Cho, Karim Eldefrawy, Feng-Hao Liu, Rafail Ostrovsky, “Towards Further Realizing Random Oracles: Post-Quantum Non-Malleable Point Obfuscation”, ongoing work. [PDF]

56- Karim Eldefrawy, Nicholas Genise, Rutuja Kshirsagar, Moti Yung, “On Regenerating Codes and Proactive Secret Sharing: Relationships and Implications”, ongoing work. [PDF]

2020

55- Karim Eldefrawy, Seoyeon Hwang, Moti Yung, Rafail Ostrovsky, “Communication-Efficient (Proactive) Secure Computation for Dynamic General Adversary Structures and Dynamic Groups”, in proceedings of the 12th Conference Security and Cryptography in Networks (SCN), 2020. [PDF]

54- Ivan De Olivera Nunes, Karim Eldefrawy, Norrathep Rattanavipanon, Gene Tsudik “APEX: Architecture for Provable EXecution”, in proceedings of the 29th Usenix Security Symposium, 2020. [PDF]

53- Karim Eldefrawy, Michael Locasto, Norrathep Rattanavipanon, Hassen Saidi, “Towards Automated-augmentation of Legacy and Insecure Cryptographic Executables”, in proceedings of the 18th International Conference on Applied Cryptography and Network Security (ACNS), 2020. [PDF]

52- Karim Eldefrawy, Tancrede Lepoint, Antonin Leroux “Communication Efficient Proactive Secret Sharing for Dynamic Groups with Dishonest Majorities”, in proceedings of the 18th International Conference on Applied Cryptography and Network Security (ACNS), 2020. [PDF]

2019

51- Karim Eldefrawy, Vitor Pereira, “A High-Assurance Evaluator for Machine-Checked Secure Multiparty Computation”, in proceedings of the ACM Conference on Computer and Communications Security (CCS), 2019. [PDF]

50- Ivan De Olivera Nunes, Karim Eldefrawy, Norrathep Rattanavipanon, Michael Steiner, Gene Tsudik, “VRASED: A Verified Hardware/Software Co-Design for Remote Attestation,” in proceedings of the Usenix Security Symposium, 2019. [PDF]

49- Karim Eldefrawy, Ashish Gehani, Alexandre Matton, “Longitudinal Study of Misuse of Bitcoin,” in proceedings of the International Conference on Applied Cryptography and Network Security (ACNS’19), 2019. [PDF]

48- Ivan De Olivera Nunes, Karim Eldefrawy, Tancrede Lepoint, “Non-interactive User Re-enrollment in Cryptographically Secured Biometrics-based Identification and Authentication Systems,” Elsevier Journal on Future Generation Computer Systems (FGCS), Volume 98, September 2019, Pages 259-273. [PDF]

47- Karim Eldefrawy, Gene Tsudik, “Opinion: Advancing Remote Attestation via Computer-aided Formal Verification,” in proceedings of the 12th ACM Conference on Security and Privacy in Wireless and Mobile Networks (Wisec), 2019. [PDF]

46- Ivan De Oliveira Nunes, Karim Eldefrawy, Norrathep Rattanavipanon, Gene Tsudik, “PURE: Using Verified Remote Attestation to Obtain Proofs of Update, Reset and Erasure in Low-End Embedded Systems,” in proceedings of the IEEE/ACM International Conference On Computer Aided Design (ICCAD), 2019. [PDF]

2018

45- (Book Chapter) Karim Eldefrawy, Rafail Ostrovsky, Moti Yung, “Theoretical Foundations of Moving Target Defense: Proactive Secret Sharing and Secure Multiparty Computation,” From Database to Cyber Security, Springer International Publishing, 2018. [PDF]

44- Karim Eldefrawy, Rafail Ostrovsky, Sunoo Park, Moti Yung, “Proactive Secure Computation with a Dishonest Majority,” in proceedings of the 11th Conference Security and Cryptography in Networks (SCN), 2018. [PDF]

43- Ivan De Olivera Nunes, Karim Eldefrawy, Tancrede Lepoint, “Non-interactive User Re-enrollment in Cryptographically Secured Biometrics-based Identification and Authentication Systems,” in proceedings of the 2018 International Symposium on Cyber Security Cryptography and Machine Learning (CSCML), 2018. [PDF]

42- Xavier Carpent, Karim Eldefrawy, Norrathep Rattanavipanon, Ahmad-Reza Sadeghi, Gene Tsudik, “Invited Paper: Reconciling Remote Attestation and Safety-Critical Operation on Simple IoT Devices,” in proceedings of the Design Automation Conference (DAC), 2018. [PDF]

41- Xavier Carpent, Karim Eldefrawy, Norrathep Rattanavipanon, Gene Tsudik, “Temporal Consistency of Integrity-Ensuring Computations and Applications to Embedded Systems Security,” in proceedings of ACM Asia Conference on Computer and Communications Security (AsiaCCS), 2018. [PDF]

40- Gabriela Ciocarlie, Karim Eldefrawy, Tancrede Lepoint, “BlockCIS - A Blockchain-based Cyber Insurance System,” 1st IEEE Workshop on Blockchain Applications and Technologies (BAT), 2018. [PDF]

39- Karim Eldefrawy and Vincent Sritapan, “Security Threats, Defenses, and Recommended Practices for Enterprise Mobility,” Information Systems Security Association (ISSA) Journal, Vol. 16 No. 5, May 2018. [PDF]

2017

38- Karim Eldefrawy, Norrathep Rattanavipanon, Gene Tsudik, “Fusing Hybrid Remote Attestation with a Formally Verified Microkernel: Lessons Learned,” 47th IEEE/IFIP International Conference on De- pendable Systems and Networks (DSN), 2017. [PDF]

37- Karim Eldefrawy, Norrathep Rattanavipanon, Gene Tsudik, “HYDRA: HYbrid Design for Remote Attestation (Using a Formally Verified Microkernel),” in proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (Wisec), 2017. [PDF]

36- Shlomi Dolev, Karim Eldefrawy, Juan Garay, Rafail Ostrovsky, Moti Yung, “Brief Announcement: Se- cure Self-stabilizing Computation,” in proceedings of the ACM Symposium on Principles of Distributed Computing (PODC), 2017. [PDF]

35- Daniel Apon, Chongwon Cho, Karim Eldefrawy, Jonathan Katz, “Efficient, Reusable Fuzzy Extractors from LWE,” in proceedings of the 2017 International Symposium on Cyber Security Cryptography and Machine Learning (CSCML), 2017. [PDF]

34- Karim Eldefrawy, Sky Faber, Tyler Kazcmarek, “Proactively Secure Cloud-enabled Storage,” in pro- ceedings of the 37th IEEE International Conference on Distributed Computing Systems (ICDCS), 2017. [PDF]

33- Xavier Carpent, Karim Eldefrawy, Norrathep Rattanavipanon, Gene Tsudik, “LIghtweight Swarm Attestation: a Tale of Two LISA-s,” in proceedings of ACM Asia Conference on Computer and Com- munications Security (ASIACCS), 2017. [PDF]

2016

32- Shlomi Dolev, Karim Eldefrawy, Joshua Lampkins, Rafail Ostrovsky, Moti Yung, “Proactive Secret Sharing with a Dishonest Majority,” in proceedings of the10th Conference Security and Cryptography in Networks (SCN), 2016. [PDF]

31- Shlomi Dolev, Karim Eldefrawy, Joshua Lampkins, Rafail Ostrovsky, Moti Yung, “Brief Announcement: Proactive Secret Sharing with a Dishonest Majority,” in proceedings of the ACM Symposium on Principles of Distributed Computing (PODC), 2016. [PDF]

30- Karim Eldefrawy, Tiffany Kim, Pape Sylla, “Automated Identification of Network Service Dependencies via Transfer Entropy,” in proceedings of the 40th IEEE Computer Society International Conference on Computers, Software & Applications (COMPSAC’16), ADMNET: The 4th IEEE International Workshop on Architecture, Design, Deployment and Management of Networks and Applications, 2016. [PDF]

29- Karim Eldefrawy, Tyler Kazcmarek, “Byzantine Fault Tolerant Software-Defined Network (SDN) Con- trollers,” in proceedings of the 40th IEEE Computer Society International Conference on Computers, Software & Applications (COMPSAC’16), MidCCI: The 2nd IEEE International Workshop on Middleware for Cyber Security, Cloud Computing and Internetworking, 2016. [PDF]

2015

28- Joshua Baron, Karim Eldefrawy, Joshua Lampkins, Rafail Ostrovsky, “Communication-Optimal Mobile Proactive Secret Sharing” in proceedings of the International Conference on Applied Cryptography and Network Security (ACNS’15), 2015. [PDF]

27- Karim Eldefrawy, Gavin Holland, Gene Tsudik, “(Extended Abstract) Remote Attestation of Heterogeneous Cyber-Physical Systems: The Automotive Use Case” presented at the Embedded Security in Cars USA (escar USA) Workshop, 2015. [PDF]

2014

26- Karim Eldefrawy, Joshua Lampkins, “Founding Digital Currency on Secure Computation”, in proceedings of the ACM Conference on Computer and Communications Security (CCS), 2014. [PDF]

25- Joshua Baron, Karim Eldefrawy, Joshua Lampkins, Rafail Ostrovsky, “How to Withstand Mobile Virus Attacks, Revisited”, in proceedings of the ACM Symposium on Principles of Distributed Computing (PODC), 2014. [PDF]

24- Karim Eldefrawy, Joshua Lampkins, “Disincentivizing/Incentivizing Malicious/Honest Behavior on the Internet Via Privacy-preserving AppCoins” in proceedings of the Ninth Workshop on Secure Network Protocols (NPSec), 2014. [PDF]

2013

23- Joshua Baron, Karim Eldefrawy, Aleksey Nogin, Rafail Ostrovsky, “An Architecture for Resilient Cloud Operations” in proceedings of the IEEE International Conference on Technologies for Homeland Security (HST), 2013. [PDF]

22- Martin Strohmeier, Ivan Martinovic, Utz Roedig, Karim Eldefrawy, Jens Schmitt “Neighborhood Watch: On Network Coding Throughput and Key Sharing”, in proceedings of the IEEE Global Communications Conference (GLOBECOM), 2013. [PDF]

21- Joshua Baron, Karim Eldefrawy, Kirill Minkovich, Rafail Ostrovsky, Eric Tressler, “5PM: Secure Pat- tern Matching”, Journal of Computer Security (JCS), Vol. 21 No. 5, September 2013. [PDF]

20- Karim Eldefrawy, Sky Faber, “Blindfolded Searching of Data via Secure Pattern Matching”, in IEEE Computer Magazine, Vol. 46 No.12 , December 2013. [PDF]

2012

19- Joshua Baron, Karim Eldefrawy, Kirill Minkovich, Rafail Ostrovsky, Eric Tressler, “5PM: Secure Pat- tern Matching”, in proceedings of the 8th conference on Security and Cryptography for Networks (SCN), 2012. [PDF]

18- Karim Eldefrawy, Gavin Holland, “Secure and Privcay-preserving Querying of Content in MANETs”, in proceedings of the IEEE International Conference on Technologies for Homeland Security (HST), 2012. [PDF]

17- Karim Eldefrawy, Aurelien Francillon, Daniele Perito, Gene Tsudik, “SMART: Secure and Minimal Architecture for (Establishing Dynamic) Root of Trust”, in proceedings of Network & Distributed System Security Symposium (NDSS), 2012. [PDF]

16- Mishari Al Mishari, Emiliano De Cristofaro, Karim Eldefrawy, Gene Tsudik, “Harvesting SSL Certifi- cate Data to Mitigate Web-Fraud”, International Journal of Network Security (IJNS), Vol. 14 No. 6, November 2012. [PDF]

2011

15- Karim Eldefrawy, GeneTsudik,“Privacy-Preserving Location-Based On-Demand Routing in MANETs”, IEEE Journal of Selected Areas of Communication (IEEE JSAC), Vol. 29 No. 10, December 2011. [PDF]

14- Karim Eldefrawy, Gene Tsudik,“Anonymous Location Aided Routing in Suspicious MANETs”, IEEE Transactions on Mobile Computing (IEEE TMC), Vol. 10 No. 9, September 2011. [PDF]

13- Srdjan Capkun, Karim Eldefrawy, Gene Tsudik, “Group Distance Bounding Protocols”, in proceedings of the 4th International Conference on Trust and Trustworthy Computing (TRUST), 2011. [PDF]

2010 - 2006

12- Boris Danev, Heinrich Luecken, Srdjan Capkun, Karim Eldefrawy, “Attacks on Physical-layer Identification”, in proceedings of the ACM Conference on Wireless Network Security (WiSec), 2010. [PDF]

11- Claude Catellucia, Karim Eldefrawy, Gene Tsudik, “Link-Layer Encryption Effect on the Capacity of Network Coding in Wireless Networks”, in proceedings of IEEE INFOCOM Work in Progress, 2010. [PDF]

10- Karim Eldefrawy, John Solis, Gene Tsudik, “Leveraging Social Contacts for Message Confidential- ity in Delay Tolerant Networks”, in proceedings of the IEEE International Computer Software and Applications Conference (COMPSAC), 2009. [PDF]

9- Karim Eldefrawy, Gene Tsudik, “PRISM: Privacy-friendly Routing In Suspicious MANETs (and VANETs)”, in proceedings of the IEEE International Conference of Network Protocols (ICNP), 2008. [PDF]

8- Fabio Soldo, Karim Eldefrawy, Athina Markopoulou, Bala Krishnamurthy, Kobus van der Merwe, “Filtering Sources of Unwanted Traffic Based on Blacklists”, in proceedings of the Information Theory and Applications Workshop (ITA), 2008. [PDF]

7- Karim Eldefrawy, GeneTsudik, “ALARM: Anonymous Location Aided Routing in Suspicious MANETS”, in proceedings of the IEEE International Conference of Network Protocols (ICNP), 2007. [PDF]

6- Karim Eldefrawy, Athina Markopoulou, Katerina Argyraki, “Optimal Filter Allocation Against Distributed Denial-of-Service Attacks”, in proceedings of the Information Theory and Applications Workshop (ITA), 2007. [PDF]

5- Karim Eldefrawy, Minas Gjoka, Athina Markopoulou, “BotTorrent: Misusing BitTorrent to Launch DDoS Attacks”, in proceedings of USENIX Steps Towards Reducing Unwanted Traffic on the Internet (SRUTI), 2007. [PDF]

4- Karim Eldefrawy, Magda El Zarki, Gene Tsudik, “Incentive-Based Cooperative and Secure Inter-Personal Networking”, in proceedings of ACM MobiOpp, 2007. [PDF]

3- Karim Eldefrawy, Claudio Soriente, “PEUC-WiN: Privacy Enhancement by User Cooperation in Wireless Networks”, in proceedings of Second Workshop on Secure Network Protocols (NPSEC), 2006. [PDF]

2- Karim Eldefrawy, Magda El Zarki , Mohamed Khairy, “Proposal for a cross-layer coordination frame- work for next generation wireless systems”, in proceedings of the International Conference on Communications and Mobile Computing (IWCMC), 2006. [PDF]

1- Karim Eldefrawy, Mohamed Khairy, Amin Nassar, “Sub-Carrier Allocation using Channel Prediction for OFDMA systems based on IEEE 802.16 Standard”, in proceedings International Conference on Computer Engineering and Systems (ICCES), 2006. [PDF]