Riad S. Wahby
Stanford University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Riad S. Wahby.
ieee symposium on security and privacy | 2017
Fraser Brown; Shravan Narayan; Riad S. Wahby; Dawson R. Engler; Ranjit Jhala; Deian Stefan
JavaScript, like many high-level languages, relies on runtime systemswritten in low-level C and C++. For example, the Node.js runtime systemgives JavaScript code access to the underlying filesystem, networking, and I/O by implementing utility functions in C++. Since C++s typesystem, memory model, and execution model differ significantly fromJavaScripts, JavaScript code must call these runtime functions viaintermediate binding layer code that translates type, state, and failure between the two languages. Unfortunately, binding code isboth hard to avoid and hard to get right. This paper describes several types of exploitable errors that bindingcode creates, and develops both a suite of easily-to-build static checkersto detect such errors and a backwards-compatible, low-overhead API toprevent them. We show that binding flaws are a serious security problem byusing our checkers to craft 81 proof-of-concept exploits forsecurity flaws in the binding layers of the Node.js and Chrome, runtimesystems that support hundreds of millions of users. As one practical measure of binding bug severity, we were awarded
international conference on mobile systems, applications, and services | 2017
Judson Wilson; Riad S. Wahby; Henry Corrigan-Gibbs; Dan Boneh; Philip Levis; Keith Winstein
6,000 in bounties for just two Chrome bug reports.
computer and communications security | 2017
Riad S. Wahby; Ye Ji; Andrew J. Blumberg; Abhi Shelat; Justin Thaler; Michael Walfish; Thomas Wies
Internet-of-Things devices often collect and transmit sensitive information like camera footage, health monitoring data, or whether someone is home. These devices protect data in transit with end-to-end encryption, typically using TLS connections between devices and associated cloud services. But these TLS connections also prevent device owners from observing what their own devices are saying about them. Unlike in traditional Internet applications, where the end user controls one end of a connection (e.g., their web browser) and can observe its communication, Internet-of-Things vendors typically control the software in both the device and the cloud. As a result, owners have no way to audit the behavior of their own devices, leaving them little choice but to hope that these devices are transmitting only what they should. This paper presents TLS--Rotate and Release (TLS-RaR), a system that allows device owners (e.g., consumers, security researchers, and consumer watchdogs) to authorize devices, called auditors, to decrypt and verify recent TLS traffic without compromising future traffic. Unlike prior work, TLS-RaR requires no changes to TLSs wire format or cipher suites, and it allows the devices owner to conduct a surprise inspection of recent traffic, without prior notice to the device that its communications will be audited.
international conference on embedded networked sensor systems | 2016
Ben Lampert; Riad S. Wahby; Shane Leonard; Philip Levis
Systems for verifiable outsourcing incur costs for a prover, a verifier, and precomputation; outsourcing makes sense when the combination of these costs is cheaper than not outsourcing. Yet, when prior works impose quantitative thresholds to analyze whether outsourcing is justified, they generally ignore prover costs. Verifiable ASICs (VA)---in which the prover is a custom chip---is the other way around: its cost calculations ignore precomputation. This paper describes a new VA system, called Giraffe; charges Giraffe for all three costs; and identifies regimes where outsourcing is worthwhile. Giraffes base is an interactive proof geared to data-parallel computation. Giraffe makes this protocol asymptotically optimal for the prover and improves the verifiers main bottleneck by almost 3x, both of which are of independent interest. Giraffe also develops a design template that produces hardware designs automatically for a wide range of parameters, introduces hardware primitives molded to the protocols data flows, and incorporates program analyses that expand applicability. Giraffe wins even when outsourcing several tens of sub-computations, scales to 500x larger computations than prior work, and can profitably outsource parts of programs that are not worthwhile to outsource in full.
network and distributed system security symposium | 2015
Riad S. Wahby; Srinath T. V. Setty; Zuocheng Ren; Andrew J. Blumberg; Michael Walfish
This paper presents an architecture for a discrete, high-entropy hardware random number generator. Because it is constructed out of simple hardware components, its operation is transparent and auditable. Using avalanche noise, a non-deterministic physical phenomenon, the circuit is inherently probabilistic and resists adversarial control. Furthermore, because it compares the outputs from two matched noise sources, it rejects environmental disturbances like RF energy and power supply ripple. The resulting hardware produces more than 0.98 bits of entropy per sample, is inexpensive, has a small footprint, and can be disabled to conserve power when not in use.
ieee symposium on security and privacy | 2016
Riad S. Wahby; Max Howald; Siddharth Garg; Abhi Shelat; Michael Walfish
networked systems design and implementation | 2017
Sadjad Fouladi; Riad S. Wahby; Brennan Shacklett; Karthikeyan Balasubramaniam; William Zeng; Rahul Bhalerao; Anirudh Sivaraman; George Porter; Keith Winstein
usenix security symposium | 2016
Sebastian Angel; Riad S. Wahby; Max Howald; Joshua B. Leners; Michael Spilo; Zhen Sun; Andrew J. Blumberg; Michael Walfish
IACR Cryptology ePrint Archive | 2014
Riad S. Wahby; Srinath T. V. Setty; Zuocheng Ren; Andrew J. Blumberg; Michael Walfish
usenix annual technical conference | 2018
Francis Y. Yan; Jestin Ma; Greg D. Hill; Deepti Raghavan; Riad S. Wahby; Philip Levis; Keith Winstein