Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where David Lazar is active.

Publication


Featured researches published by David Lazar.


asia pacific workshop on systems | 2014

Why does cryptographic software fail?: a case study and open problems

David Lazar; Haogang Chen; Xi Wang; Nickolai Zeldovich

Mistakes in cryptographic software implementations often undermine the strong security guarantees offered by cryptography. This paper presents a systematic study of cryptographic vulnerabilities in practice, an examination of state-of-the-art techniques to prevent such vulnerabilities, and a discussion of open problems and possible future research directions. Our study covers 269 cryptographic vulnerabilities reported in the CVE database from January 2011 to May 2014. The results show that just 17% of the bugs are in cryptographic libraries (which often have devastating consequences), and the remaining 83% are misuses of cryptographic libraries by individual applications. We observe that preventing bugs in different parts of a system requires different techniques, and that no effective techniques exist to deal with certain classes of mistakes, such as weak key generation.


Electronic Notes in Theoretical Computer Science | 2014

The K primer (version 3.3)

Traian Florin Şerbănuţă; Andrei Arusoaie; David Lazar; Chucky Ellison; Dorel Lucanu; Grigore Rosu

Abstract This paper serves as a brief introduction to the K tool, a system for formally defining programming languages. It is shown how sequential or concurrent languages can be defined in K simply and modularly. These formal definitions automatically yield an interpreter for the language, as well as program analysis tools such as a state-space explorer.


workshop on privacy in the electronic society | 2018

What's a Little Leakage Between Friends?

Sebastian Angel; David Lazar; Ioanna Tzialla

This paper introduces a new attack on recent messaging systems that protect communication metadata. The main observation is that if an adversary manages to compromise a users friend, it can use this compromised friend to learn information about the users other ongoing conversations. Specifically, the adversary learns whether a user is sending other messages or not, which opens the door to existing intersection and disclosure attacks. To formalize this compromised friend attack, we present an abstract scenario called the exclusive call center problem that captures the attacks root cause, and demonstrates that it is independent of the particular design or implementation of existing metadata-private messaging systems. We then introduce a new primitive called a private answering machine that can prevent the attack. Unfortunately, building a secure and efficient instance of this primitive under only computational hardness assumptions does not appear possible. Instead, we give a construction under the assumption that users can place a bound on their maximum number of friends and are okay leaking this information.


asia pacific workshop on systems | 2015

Mjölnir: The Magical Web Application Hammer

Jelle van den Hooff; David Lazar; James Mickens

Conventional wisdom suggests that rich, large-scale web applications are difficult to build and maintain. An implicit assumption behind this intuition is that a large web application requires massive numbers of servers, and complicated, one-off back-end architectures. We provide empirical evidence to disprove this intuition. We then propose new programming abstractions and a new deployment model that reduce the overhead of building and running web services.


usenix security symposium | 2015

Circuit fingerprinting attacks: passive deanonymization of tor hidden services

Albert Kwon; Mashael AlSabah; David Lazar; Marc Dacier; Srinivas Devadas


operating systems design and implementation | 2014

Jitk: a trustworthy in-kernel interpreter infrastructure

Xi Wang; David Lazar; Nickolai Zeldovich; Adam Chlipala; Zachary Tatlock


privacy enhancing technologies | 2015

Riffle : an efficient communication system with strong anonymity

Albert Kwon; David Lazar; Srinivas Devadas; Bryan Ford


operating systems design and implementation | 2016

Alpenhorn: bootstrapping secure communication without leaking metadata

David Lazar; Nickolai Zeldovich


formal methods | 2012

Executing Formal Semantics with the K Tool

David Lazar; Andrei Arusoaie; Traian-Florin Serbanuta; Chucky Ellison; Radu Mereuta; Dorel Lucanu; Grigore Rosu


Archive | 2014

The K Primer (version 3.3) http://k-framework.org

Traian Florin S; Andrei Arusoaie; David Lazar

Collaboration


Dive into the David Lazar's collaboration.

Top Co-Authors

Avatar

Nickolai Zeldovich

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Andrei Arusoaie

Alexandru Ioan Cuza University

View shared research outputs
Top Co-Authors

Avatar

Albert Kwon

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Srinivas Devadas

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Xi Wang

University of Washington

View shared research outputs
Top Co-Authors

Avatar

Dorel Lucanu

Alexandru Ioan Cuza University

View shared research outputs
Top Co-Authors

Avatar

Adam Chlipala

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Haogang Chen

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge