karim eldefrawy

"the first principle is that you must not fool yourself - and you are the easiest person to fool." - richard feynman

what i do

identify and solve security and privacy challenges in networked and distributed systems.

last updated: august 2016

pubs@googlescholar

pubs@dblp

pubs@researchgate

at hrl: from 2011 to 2016

- Shlomi Dolev, Karim ElDefrawy, Joshua Lampkins, Rafail Ostrovsky, Moti Yung, ``Proactive Secret Sharing with a Dishonest Majority," in proceedings of the 10th Conference Security and Cryptography in Networks (SCN), 2016. [PDF]

- Shlomi Dolev, Karim ElDefrawy, Joshua Lampkins, Rafail Ostrovsky, Moti Yung, ``Brief Announcement: Proactive Secret Sharing with a Dishonest Majority," in proceedings of the ACM Symposium on Principles of Distributed Computing (PODC), 2016. [PDF]

- Karim ElDefrawy, Tiffany Kim, Pape Sylla, ``Automated Identification of Network Service Dependencies via Transfer Entropy," in proceedings of the 40th IEEE Computer Society International Conference on Computers, Software and Applications (COMPSAC'16), ADMNET: The 4th IEEE International Workshop on Architecture, Design, Deployment and Management of Networks and Applications, 2016. [PDF]

- Karim ElDefrawy, Tyler Kazcmarek, ``Byzantine Fault Tolerant Software-Defined Network (SDN) Controllers," in proceedings of the 40th IEEE Computer Society International Conference on Computers, Software and Applications (COMPSAC'16), MidCCI: The 2nd IEEE International Workshop on Middleware for Cyber Security, Cloud Computing and Internetworking, 2016. [PDF]

- Joshua Baron, Karim ElDefrawy, Joshua Lampkins, Rafail Ostrovsky, "Communication-Optimal Proactive Secret Sharing for Dynamic Groups" in proceedings of the 13th International Conference on Applied Cryptography and Network Security (ACNS), 2015. [PDF]

- Karim ElDefrawy, Gavin Holland, Gene Tsudik, ``(Extended Abstract) Remote Attestation of Heterogeneous Cyber-Physical Systems: The Automotive Use Case" presented at the 2015 Embedded Security in Cars USA (escar USA) Workshop. [PDF]

- Karim ElDefrawy and Joshua Lampkins, "Founding Digital Currency on Secure Computation" in proceedings of the 2014 ACM Conference on Computer and Communications Security (CCS'14). [PDF]

- Karim ElDefrawy and Joshua Lampkins, "Disincentivizing/Incentivizing Malicious/Honest Behavior on the Internet Via Privacy-preserving AppCoins" in proceedings of the 2014 Workshop on Secure Network Protocols (NPSec'14). [PDF]

- Joshua Baron, Karim ElDefrawy, Joshua Lampkins, Rafail Ostrovsky, "How to Withstand Mobile Virus Attacks, Revisited" in proceedings of the 2014 ACM Principles of Distributed Computing (PODC'14). [eprint] [PDF]

- Joshua Baron, Karim ElDefrawy, Aleksey Nogin, Rafail Ostrovsky, "An Architecture for Resilient Cloud Operations" in proceedings of the IEEE International Conference on Technologies for Homeland Security (HST) 2013. [PDF]

- Martin Strohmeier‚ Ivan Martinovic‚ Utz Roedig‚ Karim ElDefrawy, Jens Schmitt "Neighborhood Watch: On Network Coding Throughput and Key Sharing" in proceedings of the IEEE Global Communications Conference (GLOBECOM)‚ 2013. [PDF]

- Joshua Baron, Karim ElDefrawy, Kirill Minkovich, Rafail Ostrovsky, Eric Tressler, 5PM: Secure Pattern Matching, the SCN'12 special issue of Journal of Computer Security. [eprint]

- Karim ElDefrawy, Sky Faber, “Blindfolded Searching of Data via Secure Pattern Matching”, in IEEE Computer Magazine’s Special Issue on Cyber Security December 2013. [PDF]

- Joshua Baron, Karim ElDefrawy, Kirill Minkovich, Rafail Ostrovsky, Eric Tressler, "5PM: Secure Pattern Matching" in proceedings of the 8th conference on Security and Cryptography for Networks (SCN) 2012. [PDF] [eprint]

- Karim ElDefrawy, Gavin Holland, "Secure and Privcay-preserving Querying of Content in MANETs" in proceedings of the IEEE International Conference on Technologies for Homeland Security (HST) 2012. [PDF]

- Mishari Al Mishari, Emiliano De Cristofaro, Karim ElDefrawy and Gene Tsudik, "Harvesting SSL Certificate Data to Mitigate Web-Fraud", pin International Journal of Network Security (IJNS), June 2012. [Technical Report]

- Karim ElDefrawy, Aurelien Francillon, Daniele Perito and Gene Tsudik, "SMART: Secure and Minimal Architecture for (Establishing Dynamic) Root of Trust" in proceedings of the Network and Distributed System Security Symposium (NDSS) 2012. [PDF]

- Srdjan Capkun, Karim ElDefrawy and Gene Tsudik, "Group Distance Bounding Protocols", The 4th International Conference on Trust and Trustworthy Computing (TRUST 2011). [PDF]

- Karim ElDefrawy, Gene Tsudik, "Privacy-Preserving Location-Based On-Demand Routing in MANETs", IEEE Journal of Selected Areas of Communication (IEEE JSAC), Vol. 29 No. 10, December 2011. [PDF]

- Karim ElDefrawy, Gene Tsudik, "Anonymous Location Aided Routing in Suspicious MANETs", IEEE Transactions on Mobile Computing (IEEE TMC), Vol. 10 No. 9, September 2011. [PDF]

at uci: from 2006 to 2010

- Claude Catellucia, Karim ElDefrawy and Gene Tsudik, "Link-Layer Encryption Effect on the Capacity of Network Coding in Wireless Networks", in proceedings of the IEEE INFOCOM Work in Progress (WiP), March 2010. [PDF]

- Boris Danev, Heinrich Luecken, Srdjan Capkun, Karim ElDefrawy, "Attacks on Physical-layer Identification", ACM Conference on Wireless Network Security (WiSec), March 2010. [PDF]

- Karim ElDefrawy, John Solis, Gene Tsudik, "Leveraging Social Contacts for Message Confidentiality in Delay Tolerant Networks", presented in the 33rd Annual IEEE International Computer Software and Applications Conference (COMPSAC'09), Seattle,Washington, July 20 - July 24, 2009. [PDF]

- Karim ElDefrawy and Gene Tsudik, "PRISM: Privacy-friendly Routing In Suspicious MANETs (and VANETs)", The 2008 IEEE International Conference of Network Protocols (ICNP'08), October 19-22, Florida, USA. [PDF]

- F.Soldo, K.ElDefrawy, A.Markopoulou, B.Krishnamurthy, K.van der Merwe, "Filtering Sources of Unwanted Traffic Based on Blacklists", The 2008 Information Theory and Applications Workshop (ITA), San Diego, CA, Jan.2008. [PDF]

- Karim ElDefrawy, Gene Tsudik, "ALARM: Anonymous Location Aided Routing in Suspicious MANETS", The 2007 IEEE International Conference of Network Protocols (ICNP'07), October 16-19, Beijing, China. [PDF]

- Karim ElDefrawy, Athina Markopoulou, Katerina Argyraki, "Optimal Filter Allocation Against Distributed Denial-of-Service Attacks", The 2007 Information Theory and Applications Workshop (ITA), Jan. 2007, San Diego, California. [PDF]

- Karim ElDefrawy, Minas Gjoka, Athina Markopoulou, "BotTorrent: Misusing BitTorrent to Launch DDoS Attacks", USENIX SRUTI, in conjucntion with USENIX'07, Santa Clara, June 2007. [PDF]

- Karim ElDefrawy, Magda El Zarki, Gene Tsudik, "Incentive-Based Cooperative and Secure Inter-Personal Networking", ACM MobiOpp, in conjucntion with ACM MobiSys'07, June 2007. [PDF]

- Karim ElDefrawy and Claudio Soriente, "PEUC-WiN: Privacy Enhancement by User Cooperation in Wireless Networks", Second Workshop on Secure Network Protocols NPSEC'06, in conjucntion with IEEE ICNP'06, Nov. 2006, Santa Barbara, California. [PDF]

- Karim ElDefrawy , Magda El Zarki , Mohamed Khairy, "Proposal for a cross-layer coordination framework for next generation wireless systems", Proceeding of the 2006 international conference on Communications and mobile computing, IWCMC '06, July 2006, Vancouver, British Columbia, Canada. [PDF]

- Karim El Defrawy, Mohamed Khairy and Amin Nassar, "Sub-Carrier Allocation using Channel Prediction for OFDMA systems based on IEEE 802.16 Standard", International Conference on Computer Engineering and Systems, ICCES'06, Sep. 2006, Cairo Egypt. [PDF]

granted patents

- "System and Method for Mobile Proactive Secret Sharing " U.S. Patent Number US9443089.

- "System and Method for Deep Packet Inspection and Intrusion Detection " U.S. Patent Number US9336239.

- "Secure Pattern Matching" U.S. Patent Number US9009089.

- "Ensuring Promises are Kept in an Anonymous System" U.S. Patent Number US9026786.

- "Wireless Network Security" U.S. Patent Number US8612743.

- "Filtering Unwanted Data Traffic via a Per-Customer Blacklist" U.S. Patent Number US8161155.

- "System and Method for Filtering Unwanted IP Traffic based on Blacklists" U.S. Patent Number US8539576.

other

- Karim ElDefrawy, "Security and Privacy in Location-based Mobile Ad-Hoc Networks", Ph.D. Thesis. [PDF] [Amazon]

- Srdjan Capkun, Karim ElDefrawy and Gene Tsudik, "Group Distance Bounding Protocols", [Technical Report]

- Karim ElDefrawy, Athina Markopoulou, Katerina Argyraki, "Optimal Filter Allocation during a DDoS Attack", Technical Report arXiv:cs.NI/0612066 at arXiv.org, Dec. 2006. [PDF]