Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Riad S. Wahby is active.

Publication


Featured researches published by Riad S. Wahby.


ieee symposium on security and privacy | 2017

Finding and Preventing Bugs in JavaScript Bindings

Fraser Brown; Shravan Narayan; Riad S. Wahby; Dawson R. Engler; Ranjit Jhala; Deian Stefan

JavaScript, like many high-level languages, relies on runtime systemswritten in low-level C and C++. For example, the Node.js runtime systemgives JavaScript code access to the underlying filesystem, networking, and I/O by implementing utility functions in C++. Since C++s typesystem, memory model, and execution model differ significantly fromJavaScripts, JavaScript code must call these runtime functions viaintermediate binding layer code that translates type, state, and failure between the two languages. Unfortunately, binding code isboth hard to avoid and hard to get right. This paper describes several types of exploitable errors that bindingcode creates, and develops both a suite of easily-to-build static checkersto detect such errors and a backwards-compatible, low-overhead API toprevent them. We show that binding flaws are a serious security problem byusing our checkers to craft 81 proof-of-concept exploits forsecurity flaws in the binding layers of the Node.js and Chrome, runtimesystems that support hundreds of millions of users. As one practical measure of binding bug severity, we were awarded


international conference on mobile systems, applications, and services | 2017

Trust but Verify: Auditing the Secure Internet of Things

Judson Wilson; Riad S. Wahby; Henry Corrigan-Gibbs; Dan Boneh; Philip Levis; Keith Winstein

6,000 in bounties for just two Chrome bug reports.


computer and communications security | 2017

Full Accounting for Verifiable Outsourcing

Riad S. Wahby; Ye Ji; Andrew J. Blumberg; Abhi Shelat; Justin Thaler; Michael Walfish; Thomas Wies

Internet-of-Things devices often collect and transmit sensitive information like camera footage, health monitoring data, or whether someone is home. These devices protect data in transit with end-to-end encryption, typically using TLS connections between devices and associated cloud services. But these TLS connections also prevent device owners from observing what their own devices are saying about them. Unlike in traditional Internet applications, where the end user controls one end of a connection (e.g., their web browser) and can observe its communication, Internet-of-Things vendors typically control the software in both the device and the cloud. As a result, owners have no way to audit the behavior of their own devices, leaving them little choice but to hope that these devices are transmitting only what they should. This paper presents TLS--Rotate and Release (TLS-RaR), a system that allows device owners (e.g., consumers, security researchers, and consumer watchdogs) to authorize devices, called auditors, to decrypt and verify recent TLS traffic without compromising future traffic. Unlike prior work, TLS-RaR requires no changes to TLSs wire format or cipher suites, and it allows the devices owner to conduct a surprise inspection of recent traffic, without prior notice to the device that its communications will be audited.


international conference on embedded networked sensor systems | 2016

Robust, low-cost, auditable random number generation for embedded system security

Ben Lampert; Riad S. Wahby; Shane Leonard; Philip Levis

Systems for verifiable outsourcing incur costs for a prover, a verifier, and precomputation; outsourcing makes sense when the combination of these costs is cheaper than not outsourcing. Yet, when prior works impose quantitative thresholds to analyze whether outsourcing is justified, they generally ignore prover costs. Verifiable ASICs (VA)---in which the prover is a custom chip---is the other way around: its cost calculations ignore precomputation. This paper describes a new VA system, called Giraffe; charges Giraffe for all three costs; and identifies regimes where outsourcing is worthwhile. Giraffes base is an interactive proof geared to data-parallel computation. Giraffe makes this protocol asymptotically optimal for the prover and improves the verifiers main bottleneck by almost 3x, both of which are of independent interest. Giraffe also develops a design template that produces hardware designs automatically for a wide range of parameters, introduces hardware primitives molded to the protocols data flows, and incorporates program analyses that expand applicability. Giraffe wins even when outsourcing several tens of sub-computations, scales to 500x larger computations than prior work, and can profitably outsource parts of programs that are not worthwhile to outsource in full.


network and distributed system security symposium | 2015

Efficient RAM and Control Flow in Verifiable Outsourced Computation

Riad S. Wahby; Srinath T. V. Setty; Zuocheng Ren; Andrew J. Blumberg; Michael Walfish

This paper presents an architecture for a discrete, high-entropy hardware random number generator. Because it is constructed out of simple hardware components, its operation is transparent and auditable. Using avalanche noise, a non-deterministic physical phenomenon, the circuit is inherently probabilistic and resists adversarial control. Furthermore, because it compares the outputs from two matched noise sources, it rejects environmental disturbances like RF energy and power supply ripple. The resulting hardware produces more than 0.98 bits of entropy per sample, is inexpensive, has a small footprint, and can be disabled to conserve power when not in use.


ieee symposium on security and privacy | 2016

Verifiable ASICs

Riad S. Wahby; Max Howald; Siddharth Garg; Abhi Shelat; Michael Walfish


networked systems design and implementation | 2017

Encoding, Fast and Slow: Low-Latency Video Processing Using Thousands of Tiny Threads.

Sadjad Fouladi; Riad S. Wahby; Brennan Shacklett; Karthikeyan Balasubramaniam; William Zeng; Rahul Bhalerao; Anirudh Sivaraman; George Porter; Keith Winstein


usenix security symposium | 2016

Defending against malicious peripherals with Cinch

Sebastian Angel; Riad S. Wahby; Max Howald; Joshua B. Leners; Michael Spilo; Zhen Sun; Andrew J. Blumberg; Michael Walfish


IACR Cryptology ePrint Archive | 2014

Efficient RAM and control flow in verifiable outsourced computation.

Riad S. Wahby; Srinath T. V. Setty; Zuocheng Ren; Andrew J. Blumberg; Michael Walfish


usenix annual technical conference | 2018

Pantheon: the training ground for Internet congestion-control research.

Francis Y. Yan; Jestin Ma; Greg D. Hill; Deepti Raghavan; Riad S. Wahby; Philip Levis; Keith Winstein

Collaboration


Dive into the Riad S. Wahby's collaboration.

Top Co-Authors

Avatar

Michael Walfish

University of Texas at Austin

View shared research outputs
Top Co-Authors

Avatar

Andrew J. Blumberg

University of Texas at Austin

View shared research outputs
Top Co-Authors

Avatar

Abhi Shelat

Northeastern University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Joshua B. Leners

University of Texas at Austin

View shared research outputs
Top Co-Authors

Avatar

Sebastian Angel

University of Texas at Austin

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge