David Lazar
Massachusetts Institute of Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by David Lazar.
asia pacific workshop on systems | 2014
David Lazar; Haogang Chen; Xi Wang; Nickolai Zeldovich
Mistakes in cryptographic software implementations often undermine the strong security guarantees offered by cryptography. This paper presents a systematic study of cryptographic vulnerabilities in practice, an examination of state-of-the-art techniques to prevent such vulnerabilities, and a discussion of open problems and possible future research directions. Our study covers 269 cryptographic vulnerabilities reported in the CVE database from January 2011 to May 2014. The results show that just 17% of the bugs are in cryptographic libraries (which often have devastating consequences), and the remaining 83% are misuses of cryptographic libraries by individual applications. We observe that preventing bugs in different parts of a system requires different techniques, and that no effective techniques exist to deal with certain classes of mistakes, such as weak key generation.
Electronic Notes in Theoretical Computer Science | 2014
Traian Florin Şerbănuţă; Andrei Arusoaie; David Lazar; Chucky Ellison; Dorel Lucanu; Grigore Rosu
Abstract This paper serves as a brief introduction to the K tool, a system for formally defining programming languages. It is shown how sequential or concurrent languages can be defined in K simply and modularly. These formal definitions automatically yield an interpreter for the language, as well as program analysis tools such as a state-space explorer.
workshop on privacy in the electronic society | 2018
Sebastian Angel; David Lazar; Ioanna Tzialla
This paper introduces a new attack on recent messaging systems that protect communication metadata. The main observation is that if an adversary manages to compromise a users friend, it can use this compromised friend to learn information about the users other ongoing conversations. Specifically, the adversary learns whether a user is sending other messages or not, which opens the door to existing intersection and disclosure attacks. To formalize this compromised friend attack, we present an abstract scenario called the exclusive call center problem that captures the attacks root cause, and demonstrates that it is independent of the particular design or implementation of existing metadata-private messaging systems. We then introduce a new primitive called a private answering machine that can prevent the attack. Unfortunately, building a secure and efficient instance of this primitive under only computational hardness assumptions does not appear possible. Instead, we give a construction under the assumption that users can place a bound on their maximum number of friends and are okay leaking this information.
asia pacific workshop on systems | 2015
Jelle van den Hooff; David Lazar; James Mickens
Conventional wisdom suggests that rich, large-scale web applications are difficult to build and maintain. An implicit assumption behind this intuition is that a large web application requires massive numbers of servers, and complicated, one-off back-end architectures. We provide empirical evidence to disprove this intuition. We then propose new programming abstractions and a new deployment model that reduce the overhead of building and running web services.
usenix security symposium | 2015
Albert Kwon; Mashael AlSabah; David Lazar; Marc Dacier; Srinivas Devadas
operating systems design and implementation | 2014
Xi Wang; David Lazar; Nickolai Zeldovich; Adam Chlipala; Zachary Tatlock
privacy enhancing technologies | 2015
Albert Kwon; David Lazar; Srinivas Devadas; Bryan Ford
operating systems design and implementation | 2016
David Lazar; Nickolai Zeldovich
formal methods | 2012
David Lazar; Andrei Arusoaie; Traian-Florin Serbanuta; Chucky Ellison; Radu Mereuta; Dorel Lucanu; Grigore Rosu
Archive | 2014
Traian Florin S; Andrei Arusoaie; David Lazar