|
|
Naveen K. Sastry
[home]
|
I graduated from the UC Berkeley Computer Science department in 2007. I
was advised by David Wagner and
will always appreciate his excellent guidance.
Papers:
- Verifiable Functional Purity in Java
- Matthew Finifter, Adrian Mettler, Naveen Sastry, and David Wagner.
15th ACM Conference on Computer and Communication Security (CCS 2008),
October 27-31, 2008. [bibtex]
- Source Code Review of
the Sequoia Voting System
- Matt Blaze, Arel Cordero, Sophie Engle, Chris Karlof, Naveen Sastry,
Micah Sherr, Till Stegers, Ka-Ping Yee.
- This report was part of the California
Secretary of State's "Top to Bottom Review" of electronic voting
systems conducted during the summer of 2007. July 20, 2007.
[bibtex]
-
Verifying Security Properties in Electronic Voting Machines
- Naveen Sastry.
Ph.D. dissertation, May 2007, University of California Berkeley.
[bibtex]
- Also available as UC Berkeley Tech Report, UCB/EECS-2007-61, May
2007
-
Designing voting machines for verification.
- Naveen Sastry, Tadayoshi Kohno, David Wagner.
Proceedings of the
Fifteenth USENIX Security Symposium
(USENIX Security 2006). August 2006.
[ps]
[bibtex]
-
Tamper-Evident, History-Independent, Subliminal-Free Data
Structures on PROM Storage -or- How to Store Ballots on a Voting
Machine (Extended Abstract).
- David Molnar, Tadayoshi Kohno, Naveen Sastry, David Wagner.
Extended Abstract, IEEE Security and Privacy (Oakland) 2006.
[ps]
[bibtex]
[eprint long version]
-
Security Analysis of the Diebold AccuBasic Interpreter
- David Wagner, David Jefferson, Matt Bishop, Chris Karlof,
and Naveen Sastry.
Report of the
California Secretary of State's Voting Systems Technology Assessment
Advisory Board (VSTAAB). February 14, 2006.
[bibtex]
[LATimes article]
- Our report contains a detailed technical analysis of the
security issues associated with the AccuBasic interpreter in
Diebold voting machines. The California Secretary of State's office
commissioned the report.
-
Fixing Races for Fun and Profit: How to abuse atime
- Nikita Borisov, Rob Johnson, Naveen Sastry, and David Wagner.
Proceedings of the
Fourteenth USENIX Security Symposium (USENIX Security
2005), August 2005.
[ps]
[bibtex]
-
Cryptographic Voting Protocols: A Systems Perspective
- Chris Karlof, Naveen Sastry, and David Wagner.
Proceedings of the
Fourteenth USENIX Security Symposium (USENIX Security
2005), August 2005.
[ps]
[bibtex]
-
The Promise of Cryptographic Voting Protocols
- This piece presents our opinions on cryptographic voting protocols
based on our USENIX 2005 paper.
- Chris Karlof, Naveen Sastry, and David Wagner.
June 2005.
[ps]
[bibtex]
-
Design and Implementation of a Sensor Network System for Vehicle
Tracking and Autonomous Interception
- Cory Sharp, Shawn Schaffert, Alec Woo, Naveen Sastry, Chris Karlof,
Shankar Sastry, and David Culler.
Second European Workshop on Wireless
Sensor Networks (EWSN'05). January 31 - February 2, 2005.
[ps]
[bibtex]
-
Security Considerations for IEEE 802.15.4 Networks
- Naveen Sastry and David Wagner.
ACM Workshop on Wireless Security (WiSE 2004). October 1, 2004.
[ps]
[bibtex] I won best student paper.
-
TinySec: A Link Layer Security Architecture for Wireless Sensor
Networks.
- Chris Karlof, Naveen Sastry, and David Wagner.
Proceedings of the
Second ACM Conference on Embedded Networked Sensor Systems
(SenSys 2004). November 2004.
[ps]
[bibtex]
-
Secure Verification of Location Claims
- Naveen Sastry, Umesh Shankar, and David Wagner.
CryptoBytes volume 6, no. 1, Spring 2004
RSA Labs. Shortened version of our WiSe conference paper (below).
[ps]
[bibtex]
-
Secure Verification of Location Claims
- Naveen Sastry, Umesh Shankar, and David Wagner.
ACM Workshop on Wireless Security (WiSe 2003), pages 1-10,
September 19, 2003.
[ps]
[bibtex]
-
Distillation Codes and Applications to DoS Resistant
Multicast Authentication
- Chris Karlof, Naveen Sastry, Yaping Li, Adrian Perrig, and J.D. Tygar.
Proceedings of the
Eleventh Annual Network and Distributed Systems Security Symposium
(NDSS 2004), pages 37-56, February 2004.
[ps]
[bibtex]
-
Scrash: A System for Generating Secure Crash Information
- Pete Broadwell, Matt Harren, Naveen Sastry.
Usenix Security 2003,
pages 273-284, August 2003.
[ps]
[presentation]
[old website]
[bibtex]
-
FIG: A Prototype Tool for Online Verification of Recovery Mechanisms
- Pete Broadwell, Naveen Sastry, and Jonathan Traupman.
Workshop on Self-Healing, Adaptive and Self-MANaged Systems (SHAMAN).
New York. June 2002.
[ps]
[presentation
I won best student presentation.]
[website]
[bibtex]
-
Recovery-Oriented Computing (ROC): Motivation, Definition, Techniques,
and Case Studies.
- Patterson, D. A., A. Brown, P. Broadwell, G. Candea, M. Chen,
J. Cutler, P. Enriquez, A. Fox, E. Kiciman, M. Merzbacher,
D. Oppenheimer, N. Sastry, W. Tetzlaff, J. Traupman, N. Treuhaft. UC
Berkeley Computer Science Technical Report UCB||CSD-02-1175
[ps]
[bibtex]
- see also Self-Repairing Computers. Armando Fox, David
Patterson. Scientific American. June 2003. that mentions FIG.