Town crier: An authenticated data feed for smart contracts F Zhang, E Cecchetti, K Croman, A Juels, E Shi Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016 | 842 | 2016 |
Solidus: Confidential distributed ledger transactions via PVORM E Cecchetti, F Zhang, Y Ji, A Kosba, A Juels, E Shi Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 172 | 2017 |
Obladi: Oblivious serializable transactions in the cloud N Crooks, M Burke, E Cecchetti, S Harel, R Agarwal, L Alvisi 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2018 | 92 | 2018 |
Nonmalleable information flow control E Cecchetti, AC Myers, O Arden Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 69 | 2017 |
Compositional Security for Reentrant Applications E Cecchetti, S Yao, H Ni, AC Myers Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021 | 44 | 2021 |
Pies: Public incompressible encodings for decentralized storage E Cecchetti, B Fisch, I Miers, A Juels Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 17 | 2019 |
Securing Smart Contracts with Information Flow E Cecchetti, S Yao, H Ni, AC Myers 3rd International Symposium on Foundations and Applications of Blockchain 2020, 2020 | 14 | 2020 |
One File for the Price of Three: Catching Cheating Servers in Decentralized Storage Networks E Cecchetti Hacking Distributed blog, 2018 | 11 | 2018 |
Giving semantics to program-counter labels via secure effects AK Hirsch, E Cecchetti Proceedings of the ACM on Programming Languages 5 (POPL), 1-29, 2021 | 9 | 2021 |
Semantics for Noninterference with Interaction Trees L Silver, P He, E Cecchetti, AK Hirsch, S Zdancewic 37th European Conference on Object-Oriented Programming (ECOOP 2023), 2023 | 5 | 2023 |
Universal composability is robust compilation M Patrignani, R Künnemann, RS Wahby, E Cecchetti ACM Transactions on Programming Languages and Systems, 2022 | 5 | 2022 |
First-Order Logic for Flow-Limited Authorization AK Hirsch, PHA de Amorim, E Cecchetti, R Tate, O Arden 2020 IEEE 33rd Computer Security Foundations Symposium (CSF), 123-138, 2020 | 5 | 2020 |
Semantics for Noninterference with Interaction Trees (Artifact) L Silver, P He, E Cecchetti, AK Hirsch, S Zdancewic Schloss-Dagstuhl-Leibniz Zentrum für Informatik, 2023 | 2 | 2023 |
Computationally Bounded Robust Compilation and Universally Composable Security R Künnemann, M Patrignani, E Cecchetti arXiv preprint arXiv:2401.15041, 2024 | 1 | 2024 |
Mechanisms for Provable Integrity Protection in Decentralized Systems EB Cecchetti Cornell University, 2021 | 1 | 2021 |
System-Level Defense against Indirect Prompt Injection Attacks: An Information Flow Control Perspective F Wu, E Cecchetti, C Xiao arXiv preprint arXiv:2409.19091, 2024 | | 2024 |
Authenticated data feed for blockchains F Zhang, E Cecchetti, K Croman, A Juels, R Shi US Patent App. 18/497,407, 2024 | | 2024 |
Authenticated data feed for blockchains F Zhang, E Cecchetti, K Croman, A Juels, R Shi US Patent 11,829,998, 2023 | | 2023 |
SCIF: A Language for Compositional Smart Contract Security S Yao, H Ni, AC Myers, E Cecchetti | | |