Journal Publications:
- Joseph I. Choi and Kevin R. B. Butler. Secure Multiparty Computation and Trusted Hardware: Examining Adoption Challenges and Opportunities. Security and Communication Networks (SCN), Vol 2019, Article ID 1368905, Apr 2, 2019. Link
- Dave (Jing) Tian, Kevin R. B. Butler, Joseph I Choi, Patrick D. McDaniel, and Padma Krishnaswamy. Securing ARP/NDP From the Ground Up. IEEE Transactions on Information Forensics and Security (TIFS), Vol. 12, No. 9, pp. 2131-2143, Sep 2017. Link
Conference Publications:
- Joseph I. Choi, Dave (Jing) Tian, Grant Hernandez, Christopher Patton, Benjamin Mood, Thomas Shrimpton, Kevin R. B. Butler, and Patrick Traynor. A Hybrid Approach to Secure Function Evaluation using SGX. In Proceedings of the ACM Asia Conference on Information, Computer, and Communications Security (ASIACCS), 2019. Link arXiv version (full version with proofs)
- Dave (Jing) Tian, Grant Hernandez, Joseph I. Choi, Vanessa Frost, Peter C. Johnson, and Kevin R. B. Butler. LBM: A Security Framework for Peripherals within the Linux Kernel. In Proceedings of the IEEE Symposium on Security and Privacy (S&P), 2019. Link
- Lianying Zhao, Joseph I. Choi, Didem Demirag, Kevin R. B. Butler, Mohammad Mannan, Erman Ayday, and Jeremy Clark. One-Time Programs made Practical. In Proceedings of Financial Cryptography and Data Security (FC), 2019. Link arXiv version (full version)
- Dave (Jing) Tian, Joseph I. Choi, Grant Hernandez, Patrick Traynor, and Kevin R. B. Butler. A Practical Intel SGX Setting for Linux Containers in the Cloud. In Proceedings of the ACM Conference on Data and Application Security and Privacy (CODASPY), 2019. Link
- Dave (Jing) Tian, Joseph I. Choi, Vanessa Frost, Christie Ruales, Patrick Traynor, Hayawardh Vijayakumar, Lee Harrison, Amir Rahmati, Michael Grace, and Kevin R. B. Butler. ATtention Spanned: Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem. In Proceedings of the USENIX Security Symposium, 2018. Link atcommands.org
- Tyler Ward, Joseph I. Choi, Kevin Butler, John M. Shea, Patrick Traynor, and Tan F. Wong. Privacy Preserving Localization Using a Distributed Particle Filtering Protocol. In Proceedings of IEEE MILCOM, 2017. Link
Other:
- Washington Garcia, Joseph I. Choi, Suman K. Adari, Somesh Jha, and Kevin R. B. Butler. Explainable Black-Box Attacks Against Model-based Authentication. arXiv preprint, arXiv:1810.00024. 2018. Link
Poster Presentations:
- Grounding Privacy-Preserving Computation in Enclaves. Poster session during Computing@SEC Meeting, Tuscaloosa, AL, 2019.
- Enclave-Based Privacy-Preserving Localization. Poster session during the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), Miami, FL, 2019.
- A Hybrid Approach to Secure Function Evaluation using SGX and A Practical Intel SGX Setting for Linux Containers in the Cloud. Poster session during the AFOSR Center of Excellence in Assured Autonomy in Contested Environments Kickoff, Gainesville, FL, 2019.
- A Practical Intel SGX Setting for Linux Containers in the Cloud. Poster session during the ACM Conference on Data and Application Security and Privacy (CODASPY), Dallas, TX, 2019. Won Distinguished Poster Award.
- A Practical Intel SGX Setting for Linux Containers in the Cloud. Poster session during the FICS Research Conference on Cybersecurity, Gainesville, FL, 2019.
- Excavating TrustZone from Device Firmware. Poster session during the USENIX Security Symposium, Baltimore, MD, 2018.
- One-Time Programs Made Practical. Poster session during the FICS Research Conference on Cybersecurity, Gainesville, FL, 2018.
- A Hybrid Approach to Secure Function Evaluation using SGX. Poster session during the Florida Institute for National Security (FINS) Conference, Gainesville, FL, 2017.
- A Hybrid Approach to Secure Function Evaluation using SGX. Poster session during the FICS Research Conference on Cybersecurity, Gainesville, FL, 2017.
Delivered Talks:
- A Hybrid Approach to Secure Function Evaluation using SGX. Delivered at the ACM Asia Conference on Information, Computer, and Communications Security (ASIACCS), Auckland, New Zealand, 2019.
- A Practical Intel SGX Setting for Linux Containers in the Cloud. Delivered at the ACM Conference on Data and Application Security and Privacy (CODASPY), Dallas, TX, 2019.
- A Practical Intel SGX Setting for Linux Containers in the Cloud. Delivered at the FICS Research Conference on Cybersecurity as part of CyberGatorz Student Highlights (short talk), Gainesville, FL, 2019.
- Securing Arduino Micro Communications. End-of-semester research presentation in the Department of Computer Science at the University of Miami, Miami, FL, 2014.