Cryptography, Cybersecurity, Privacy
Co-founder and CTO at Confidencial.io
2017-2021: SRI
2011-2016: HRL Laboratories
2006-2010: PhD@UC Irvine
(Email me if you are having problems finidng a PDF of one of my papers)
77- Karim Eldefrawy, Ben Terner, and Moti Yung, “Composing Timed Cryptographic Protocols: Foundations and Applications”, under review. [PDF] [eprint]
76- Daniel Apon, Chongwon Cho, Karim Eldefrawy, Feng-Hao Liu, Rafail Ostrovsky, “Towards Further Realizing Random Oracles: Post-Quantum Non-Malleable Point Obfuscation”, ongoing work. [PDF]
75- Linda Briesemeister, Karim Eldefrawy, Bob Haley, Tim McCarthy, Ben Terner, “PRISM: PRivacy-preserving Intrusion-resilient Secure Multiparty-computation-based Messaging-overlay”, ongoing work. [PDF]
74- Kelong Cong, Karim Eldefrawy, Ben Terner, Titouan Tanguy, “Decomposable MPC with Security Against Malicious Adversaries”, under review. [PDF]
73- Karim Eldefrawy, Stanislaw Jarecki, Ben Terner, Gene Tsudik, “Private Identity-based Bulletin Boards: Secure Anonymous Messaging over Delay-and-Disruption-Prone Networks”, under review. [PDF]
72- Karim Eldefrawy, Sashidhar Jakkamsetti, Ben Terner, Moti Yung, “Standard Model Time-Lock Puzzles: Defining Security and Constructing via Composition”, under review. [PDF] [eprint]
71- Karim Eldefrawy, Ben Terner, and Moti Yung, “Challenges in Timed-Cryptography: A Position Paper (Short Paper)”, to appear in proceedings of the 8th International Symposium on Cyber Security, Cryptology, and Machine Learning (CSCML), 2024. [PDF] [eprint]
70- Aysajan Abidin, Karim Eldefrawy, Dave Singelee, “Entanglement-based Mutual Quantum Distance Bounding”, to appear in proceedings of the 8th International Symposium on Cyber Security, Cryptology, and Machine Learning (CSCML), 2024. [PDF] [arxiv]
69- Ben Terner, Kelong Cong, Nigel P. Smart, Karim Eldefrawy, “The Key Lattice Framework for Concurrent Group Messaging”, in proceedings of the 21th International Conference on Applied Cryptography and Network Security (ACNS), 2024. [PDF] [eprint]
68- Karim Eldefrawy, Nicholas Genise, Stanislaw Jarecki, “Short Covert Authenticated Key Exchange”, in proceedings of the 29th Annual International Conference on the Theory and Applications of Cryptology and Information Security (Asiacrypt), 2023. [PDF] [eprint]
67- Sam Dittmer, Karim Eldefrawy, Stephane Graham-Lengrand, Steve Lu, Vitor Pereira, Rafail Ostrovsky “Boosting the Performance of High-Assurance Cryptography: Parallel Execution and Optimizing Memory Access in Formally-Verified Line-Point Zero-Knowledge”, in proceedings of the 30th ACM Conference on Computer and Communications Security (CCS), 2023. [PDF] [eprint]
66- Iness Ben Guirat, Claudia Diaz, Karim Eldefrawy, Hadas Zeilberger, “Traffic Analysis by Adversaries with Partial Visibility”, in proceedings of the 28th European Symposium on Research in Computer Security (ESORICS), 2023. [PDF]
65- Karim Eldefrawy, Nicholas Genise, and Nathan Manohar, “On the Hardness of Scheme-Switching Between SIMD FHE Schemes”, in proceedings of the 14th International Conference on Post-Quantum Cryptography (PQCrypto), 2023. [PDF] [eprint]
64- Nikola Samardzic, Axel Feldmann, Aleksandar Krastev, Nathan Manohar, Nicholas Genise, Srinivas Devadas, Karim Eldefrawy, Chris Peikert, Daniel Sanchez, “CraterLake: A Hardware Accelerator for Efficient Unbounded Computation on Encrypted Data”, in proceedings of the 49th International Symposium on Computer Architecture (ISCA), 2022. [PDF]
63- Karim Eldefrawy, Julian Loss, Ben Terner, “How Byzantine is a Send Corruption?”, in proceedings of the 20th International Conference on Applied Cryptography and Network Security (ACNS), 2022. [PDF] [eprint]
62- Karim Eldefrawy, Tancrède Lepoint, and Laura Tam, “In-app Cryptographically-Enforced Selective Access Control for Microsoft Office and Similar Platforms”, in proceedings of the 6th International Symposium on Cyber Security, Cryptology, and Machine Learning (CSCML), 2022. [PDF] [Extended Version]
61- Karim Eldefrawy, Tancrede Lepoint, Antonin Leroux, “Communication Efficient Proactive Secure Multi-party Computation for Dynamic Groups with Dishonest Majorities”, in proceedings of the 20th International Conference on Applied Cryptography and Network Security (ACNS), 2022. [PDF] [eprint]
60- Wim van Dam, Karim Eldefrawy, Nicholas Genise, Natalie Parham, “Quantum Optimization Heuristics with an Application to Knapsack Problems”, in proceedings of the IEEE International Conference on Quantum Computing and Engineering (QCE). [PDF] [arxiv]
59- Axel Feldmann, Nikola Samardzic, Aleksandar Krastev, Nicholas Genise, Srini Devadas, Karim Eldefrawy, Ronald Dreslinski, Christopher Peikert, Daniel Sanchez, “F1: A Fast and Programmable Accelerator for Fully Homomorphic Encryption”, extended version of a preliminary paper in proceedings of the 54th IEEE/ACM International Symposium on Microarchitecture (Micro). [PDF] [arxiv]
58- Jose Bacelar Almeida, Manuel Barbosa, Karim Eldefrawy, Stephane Graham-Lengrand, Hugo Pacheco, Vitor Pereira, “Machine-checked ZKP for NP-relations: Formally Verified Security Proofs and Implementations of MPC-in-the-Head”, in proceedings of the 28th ACM Conference on Computer and Communications Security (CCS). [PDF]
57- Karim Eldefrawy, Nicholas Genise, Rutuja Kshirsagar, Moti Yung, “On Regenerating Codes and Proactive Secret Sharing: Relationships and Implications”, in proceedings of the 23rd International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS). [PDF] [eprint]
56- Kelong Cong, Karim Eldefrawy, Nigel Smart, “Optimizing Registration Based Encryption”, in proceedings of the 18th IMA International Conference on Cryptography and Coding (IMACC). [PDF] [eprint]
55- Karim Eldefrawy, Seoyeon Hwang, Moti Yung, Rafail Ostrovsky, “Communication-Efficient (Proactive) Secure Computation for Dynamic General Adversary Structures and Dynamic Groups”, in proceedings of the 12th Conference Security and Cryptography in Networks (SCN), 2020. [PDF]
54- Ivan De Olivera Nunes, Karim Eldefrawy, Norrathep Rattanavipanon, Gene Tsudik “APEX: Architecture for Provable EXecution”, in proceedings of the 29th Usenix Security Symposium, 2020. [PDF]
53- Karim Eldefrawy, Michael Locasto, Norrathep Rattanavipanon, Hassen Saidi, “Towards Automated-augmentation of Legacy and Insecure Cryptographic Executables”, in proceedings of the 18th International Conference on Applied Cryptography and Network Security (ACNS), 2020. [PDF]
52- Karim Eldefrawy, Tancrede Lepoint, Antonin Leroux “Communication Efficient Proactive Secret Sharing for Dynamic Groups with Dishonest Majorities”, in proceedings of the 18th International Conference on Applied Cryptography and Network Security (ACNS), 2020. [PDF]
51- Karim Eldefrawy, Vitor Pereira, “A High-Assurance Evaluator for Machine-Checked Secure Multiparty Computation”, in proceedings of the ACM Conference on Computer and Communications Security (CCS), 2019. [PDF]
50- Ivan De Olivera Nunes, Karim Eldefrawy, Norrathep Rattanavipanon, Michael Steiner, Gene Tsudik, “VRASED: A Verified Hardware/Software Co-Design for Remote Attestation,” in proceedings of the Usenix Security Symposium, 2019. [PDF]
49- Karim Eldefrawy, Ashish Gehani, Alexandre Matton, “Longitudinal Study of Misuse of Bitcoin,” in proceedings of the International Conference on Applied Cryptography and Network Security (ACNS’19), 2019. [PDF]
48- Ivan De Olivera Nunes, Karim Eldefrawy, Tancrede Lepoint, “Non-interactive User Re-enrollment in Cryptographically Secured Biometrics-based Identification and Authentication Systems,” Elsevier Journal on Future Generation Computer Systems (FGCS), Volume 98, September 2019, Pages 259-273. [PDF]
47- Karim Eldefrawy, Gene Tsudik, “Opinion: Advancing Remote Attestation via Computer-aided Formal Verification of Designs and Synthesis of Executables,” in proceedings of the 12th ACM Conference on Security and Privacy in Wireless and Mobile Networks (Wisec), 2019. [PDF]
46- Ivan De Oliveira Nunes, Karim Eldefrawy, Norrathep Rattanavipanon, Gene Tsudik, “PURE: Using Verified Remote Attestation to Obtain Proofs of Update, Reset and Erasure in Low-End Embedded Systems,” in proceedings of the IEEE/ACM International Conference On Computer Aided Design (ICCAD), 2019. [PDF]
45- (Book Chapter) Karim Eldefrawy, Rafail Ostrovsky, Moti Yung, “Theoretical Foundations of Moving Target Defense: Proactive Secret Sharing and Secure Multiparty Computation,” From Database to Cyber Security, Springer International Publishing, 2018. [PDF]
44- Karim Eldefrawy, Rafail Ostrovsky, Sunoo Park, Moti Yung, “Proactive Secure Computation with a Dishonest Majority,” in proceedings of the 11th Conference Security and Cryptography in Networks (SCN), 2018. [PDF]
43- Ivan De Olivera Nunes, Karim Eldefrawy, Tancrede Lepoint, “Non-interactive User Re-enrollment in Cryptographically Secured Biometrics-based Identification and Authentication Systems,” in proceedings of the 2018 International Symposium on Cyber Security Cryptography and Machine Learning (CSCML), 2018. [PDF]
42- Xavier Carpent, Karim Eldefrawy, Norrathep Rattanavipanon, Ahmad-Reza Sadeghi, Gene Tsudik, “Invited Paper: Reconciling Remote Attestation and Safety-Critical Operation on Simple IoT Devices,” in proceedings of the Design Automation Conference (DAC), 2018. [PDF]
41- Xavier Carpent, Karim Eldefrawy, Norrathep Rattanavipanon, Gene Tsudik, “Temporal Consistency of Integrity-Ensuring Computations and Applications to Embedded Systems Security,” in proceedings of ACM Asia Conference on Computer and Communications Security (AsiaCCS), 2018. [PDF]
40- Gabriela Ciocarlie, Karim Eldefrawy, Tancrede Lepoint, “BlockCIS - A Blockchain-based Cyber Insurance System,” 1st IEEE Workshop on Blockchain Applications and Technologies (BAT), 2018. [PDF]
39- Karim Eldefrawy and Vincent Sritapan, “Security Threats, Defenses, and Recommended Practices for Enterprise Mobility,” Information Systems Security Association (ISSA) Journal, Vol. 16 No. 5, May 2018. [PDF]
38- Karim Eldefrawy, Norrathep Rattanavipanon, Gene Tsudik, “Fusing Hybrid Remote Attestation with a Formally Verified Microkernel: Lessons Learned,” 47th IEEE/IFIP International Conference on De- pendable Systems and Networks (DSN), 2017. [PDF]
37- Karim Eldefrawy, Norrathep Rattanavipanon, Gene Tsudik, “HYDRA: HYbrid Design for Remote Attestation (Using a Formally Verified Microkernel),” in proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (Wisec), 2017. [PDF]
36- Shlomi Dolev, Karim Eldefrawy, Juan Garay, Rafail Ostrovsky, Moti Yung, “Brief Announcement: Se- cure Self-stabilizing Computation,” in proceedings of the ACM Symposium on Principles of Distributed Computing (PODC), 2017. [PDF]
35- Daniel Apon, Chongwon Cho, Karim Eldefrawy, Jonathan Katz, “Efficient, Reusable Fuzzy Extractors from LWE,” in proceedings of the 2017 International Symposium on Cyber Security Cryptography and Machine Learning (CSCML), 2017. [PDF]
34- Karim Eldefrawy, Sky Faber, Tyler Kazcmarek, “Proactively Secure Cloud-enabled Storage,” in proceedings of the 37th IEEE International Conference on Distributed Computing Systems (ICDCS), 2017. [PDF]
33- Xavier Carpent, Karim Eldefrawy, Norrathep Rattanavipanon, Gene Tsudik, “LIghtweight Swarm Attestation: a Tale of Two LISA-s,” in proceedings of ACM Asia Conference on Computer and Com- munications Security (ASIACCS), 2017. [PDF]
32- Shlomi Dolev, Karim Eldefrawy, Joshua Lampkins, Rafail Ostrovsky, Moti Yung, “Proactive Secret Sharing with a Dishonest Majority,” in proceedings of the10th Conference Security and Cryptography in Networks (SCN), 2016. [PDF]
31- Shlomi Dolev, Karim Eldefrawy, Joshua Lampkins, Rafail Ostrovsky, Moti Yung, “Brief Announcement: Proactive Secret Sharing with a Dishonest Majority,” in proceedings of the ACM Symposium on Principles of Distributed Computing (PODC), 2016. [PDF]
30- Karim Eldefrawy, Tiffany Kim, Pape Sylla, “Automated Identification of Network Service Dependencies via Transfer Entropy,” in proceedings of the 40th IEEE Computer Society International Conference on Computers, Software & Applications (COMPSAC’16), ADMNET: The 4th IEEE International Workshop on Architecture, Design, Deployment and Management of Networks and Applications, 2016. [PDF]
29- Karim Eldefrawy, Tyler Kazcmarek, “Byzantine Fault Tolerant Software-Defined Network (SDN) Controllers,” in proceedings of the 40th IEEE Computer Society International Conference on Computers, Software & Applications (COMPSAC’16), MidCCI: The 2nd IEEE International Workshop on Middleware for Cyber Security, Cloud Computing and Internetworking, 2016. [PDF]
28- Joshua Baron, Karim Eldefrawy, Joshua Lampkins, Rafail Ostrovsky, “Communication-Optimal Mobile Proactive Secret Sharing” in proceedings of the International Conference on Applied Cryptography and Network Security (ACNS’15), 2015. [PDF]
27- Karim Eldefrawy, Gavin Holland, Gene Tsudik, “(Extended Abstract) Remote Attestation of Heterogeneous Cyber-Physical Systems: The Automotive Use Case” presented at the Embedded Security in Cars USA (escar USA) Workshop, 2015. [PDF]
26- Karim Eldefrawy, Joshua Lampkins, “Founding Digital Currency on Secure Computation”, in proceedings of the ACM Conference on Computer and Communications Security (CCS), 2014. [PDF]
25- Joshua Baron, Karim Eldefrawy, Joshua Lampkins, Rafail Ostrovsky, “How to Withstand Mobile Virus Attacks, Revisited”, in proceedings of the ACM Symposium on Principles of Distributed Computing (PODC), 2014. [PDF]
24- Karim Eldefrawy, Joshua Lampkins, “Disincentivizing/Incentivizing Malicious/Honest Behavior on the Internet Via Privacy-preserving AppCoins” in proceedings of the Ninth Workshop on Secure Network Protocols (NPSec), 2014. [PDF]
23- Joshua Baron, Karim Eldefrawy, Aleksey Nogin, Rafail Ostrovsky, “An Architecture for Resilient Cloud Operations” in proceedings of the IEEE International Conference on Technologies for Homeland Security (HST), 2013. [PDF]
22- Martin Strohmeier, Ivan Martinovic, Utz Roedig, Karim Eldefrawy, Jens Schmitt “Neighborhood Watch: On Network Coding Throughput and Key Sharing”, in proceedings of the IEEE Global Communications Conference (GLOBECOM), 2013. [PDF]
21- Joshua Baron, Karim Eldefrawy, Kirill Minkovich, Rafail Ostrovsky, Eric Tressler, “5PM: Secure Pattern Matching”, Journal of Computer Security (JCS), Vol. 21 No. 5, September 2013. [PDF]
20- Karim Eldefrawy, Sky Faber, “Blindfolded Searching of Data via Secure Pattern Matching”, in IEEE Computer Magazine, Vol. 46 No.12 , December 2013. [PDF]
19- Joshua Baron, Karim Eldefrawy, Kirill Minkovich, Rafail Ostrovsky, Eric Tressler, “5PM: Secure Pattern Matching”, in proceedings of the 8th conference on Security and Cryptography for Networks (SCN), 2012. [PDF]
18- Karim Eldefrawy, Gavin Holland, “Secure and Privcay-preserving Querying of Content in MANETs”, in proceedings of the IEEE International Conference on Technologies for Homeland Security (HST), 2012. [PDF]
17- Karim Eldefrawy, Aurelien Francillon, Daniele Perito, Gene Tsudik, “SMART: Secure and Minimal Architecture for (Establishing Dynamic) Root of Trust”, in proceedings of Network & Distributed System Security Symposium (NDSS), 2012. [PDF]
16- Mishari Al Mishari, Emiliano De Cristofaro, Karim Eldefrawy, Gene Tsudik, “Harvesting SSL Certificate Data to Mitigate Web-Fraud”, International Journal of Network Security (IJNS), Vol. 14 No. 6, November 2012. [PDF]
15- Karim Eldefrawy, GeneTsudik, “Privacy-Preserving Location-Based On-Demand Routing in MANETs”, IEEE Journal of Selected Areas of Communication (IEEE JSAC), Vol. 29 No. 10, December 2011. [PDF]
14- Karim Eldefrawy, Gene Tsudik, “Anonymous Location Aided Routing in Suspicious MANETs”, IEEE Transactions on Mobile Computing (IEEE TMC), Vol. 10 No. 9, September 2011. [PDF]
13- Srdjan Capkun, Karim Eldefrawy, Gene Tsudik, “Group Distance Bounding Protocols”, in proceedings of the 4th International Conference on Trust and Trustworthy Computing (TRUST), 2011. [PDF]
12- Boris Danev, Heinrich Luecken, Srdjan Capkun, Karim Eldefrawy, “Attacks on Physical-layer Identification”, in proceedings of the ACM Conference on Wireless Network Security (WiSec), 2010. [PDF]
11- Claude Catellucia, Karim Eldefrawy, Gene Tsudik, “Link-Layer Encryption Effect on the Capacity of Network Coding in Wireless Networks”, in proceedings of IEEE INFOCOM Work in Progress, 2010. [PDF]
10- Karim Eldefrawy, John Solis, Gene Tsudik, “Leveraging Social Contacts for Message Confidentiality in Delay Tolerant Networks”, in proceedings of the IEEE International Computer Software and Applications Conference (COMPSAC), 2009. [PDF]
9- Karim Eldefrawy, Gene Tsudik, “PRISM: Privacy-friendly Routing In Suspicious MANETs (and VANETs)”, in proceedings of the IEEE International Conference of Network Protocols (ICNP), 2008. [PDF]
8- Fabio Soldo, Karim Eldefrawy, Athina Markopoulou, Bala Krishnamurthy, Kobus van der Merwe, “Filtering Sources of Unwanted Traffic Based on Blacklists”, in proceedings of the Information Theory and Applications Workshop (ITA), 2008. [PDF]
7- Karim Eldefrawy, GeneTsudik, “ALARM: Anonymous Location Aided Routing in Suspicious MANETS”, in proceedings of the IEEE International Conference of Network Protocols (ICNP), 2007. [PDF]
6- Karim Eldefrawy, Athina Markopoulou, Katerina Argyraki, “Optimal Filter Allocation Against Distributed Denial-of-Service Attacks”, in proceedings of the Information Theory and Applications Workshop (ITA), 2007. [PDF]
5- Karim Eldefrawy, Minas Gjoka, Athina Markopoulou, “BotTorrent: Misusing BitTorrent to Launch DDoS Attacks”, in proceedings of USENIX Steps Towards Reducing Unwanted Traffic on the Internet (SRUTI), 2007. [PDF]
4- Karim Eldefrawy, Magda El Zarki, Gene Tsudik, “Incentive-Based Cooperative and Secure Inter-Personal Networking”, in proceedings of ACM MobiOpp, 2007. [PDF]
3- Karim Eldefrawy, Claudio Soriente, “PEUC-WiN: Privacy Enhancement by User Cooperation in Wireless Networks”, in proceedings of Second Workshop on Secure Network Protocols (NPSEC), 2006. [PDF]
2- Karim Eldefrawy, Magda El Zarki , Mohamed Khairy, “Proposal for a cross-layer coordination framework for next generation wireless systems”, in proceedings of the International Conference on Communications and Mobile Computing (IWCMC), 2006. [PDF]
1- Karim Eldefrawy, Mohamed Khairy, Amin Nassar, “Sub-Carrier Allocation using Channel Prediction for OFDMA systems based on IEEE 802.16 Standard”, in proceedings International Conference on Computer Engineering and Systems (ICCES), 2006. [PDF]